The Community for Technology Leaders
RSS Icon
Issue No.05 - May (2010 vol.59)
pp: 707-719
Mohamed Tamer Refaei , MITRE Corporation, McLean, VA, USA
Luiz A. DaSilva , Virginia Polytechnic Institute, Arlington, VA, USA
Mohamed Eltoweissy , Virginia Polytechnic Institute, Arlington, VA, USA
Tamer Nadeem , Siemens Corporate Research, Princeton, NJ, USA
Reputation management systems have been proposed as a cooperation enforcement solution in ad hoc networks. Typically, the functions of reputation management (evaluation, detection, and reaction) are carried out homogeneously across time and space. However, the dynamic nature of ad hoc networks causes node behavior to vary both spatially and temporally due to changes in local and network-wide conditions. When reputation management functions do not adapt to such changes, their effectiveness, measured in terms of accuracy (correct identification of node behavior) and promptness (timely identification of node misbehavior), may be compromised. We propose an adaptive reputation management system that realizes that changes in node behavior may be driven by changes in network conditions and that accommodates such changes by adapting its operating parameters. We introduce a time-slotted approach to allow the evaluation function to quickly and accurately capture changes in node behavior. We show how the duration of an evaluation slot can adapt according to the network's activity to enhance the system accuracy and promptness. We then show how the detection function can utilize a Sequential Probability Ratio Test (SPRT) to distinguish between cooperative and misbehaving neighbors. The SPRT adapts to changes in neighbors' behavior that are a by-product of changing network conditions, by using the node's own behavior as a benchmark. We compare our proposed solution to a nonadaptive system, showing the ability of our system to achieve high accuracy and promptness in dynamic environments. To the best of our knowledge, this is the first work to explore the adaptation of the reputation management functions to changes in network conditions.
Reputation management, ad hoc networks, cooperation, adaptation, node misbehavior.
Mohamed Tamer Refaei, Luiz A. DaSilva, Mohamed Eltoweissy, Tamer Nadeem, "Adaptation of Reputation Management Systems to Dynamic Network Conditions in Ad Hoc Networks", IEEE Transactions on Computers, vol.59, no. 5, pp. 707-719, May 2010, doi:10.1109/TC.2010.34
[1] M.T. Refaei, "Adaptation in Reputation Management Systems for Ad hoc Networks," PhD dissertation, Virginia Polytechnic Inst. and State Univ., 2007.
[2] X. Yingqi and L. Wang-Chien, "Exploring Spatial Correlation for Link Quality Estimation in Wireless Sensor Networks," Proc. Fourth Ann. IEEE Int'l Conf. Pervasive Computing and Comm., 2006.
[3] T.K. Forde, L.E. Doyle, and D. O'Mahony, "Ad Hoc Innovation: Distributed Decision Making in Ad Hoc Networks," IEEE Comm. Magazine, vol. 44, no. 4, pp. 131-137, Apr. 2006.
[4] A. Wald, Sequential Analysis. J. Wiley & Sons, 1947.
[5] Y.-C. Hu, A. Perrig, and D.B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Proc. MobiCom '02, pp. 12-23, 2002.
[6] W. Yu and K.J.R. Liu, "Attack-Resistant Cooperation Stimulation in Autonomous Ad Hoc Networks," IEEE J. Selected Areas in Comm., vol. 23, no. 12, pp. 2260-2271, Dec. 2005.
[7] S. Buchegger, C. Tissieres, and J.-Y.L. Boudec, "A Test-Bed for Misbehavior Detection in Mobile Ad-Hoc Networks—How Much Can Watchdogs Really Do?" Proc. Sixth IEEE Workshop Mobile Computing Systems and Applications (WMCSA), pp. 102-111, 2004.
[8] M.T. Refaei, Y. Rong, L. DaSilva, and H.-A. Choi, "Detecting Node Misbehavior in Ad Hoc Networks," Proc. IEEE Int'l Conf. Comm. (ICC '07), pp. 3425-3430, 2007.
[9] J. Liu and V. Issarny, "Enhanced Reputation Mechanism for Mobile Ad Hoc Networks," Proc. Second Int'l Conf. Trust Management (iTrust), 2004.
[10] K. Pahlavan, Wireless Information Networks. J. Wiley & Sons, 2005.
[11] S. Buchegger, J. Mundinger, and J.-Y.L. Boudec, "Reputation Systems for Self-Organized Networks: Lessons Learned," IEEE Technology and Soc. Magazine, vol. 27, no. 1, pp. 41-47, Mar. 2008.
[12] L. Buttyan and J.-P. Hubaux, Security and Cooperation in Wireless Networks. Cambridge Univ. Press, 2007.
[13] K. Balakrishnan, J. Deng, and P. Varshney, "TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks," Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), vol. 4, pp. 2137-2142, 2005.
[14] S. Buchegger and J.-Y.L. Boudec, "A Robust Reputation System for Mobile Ad Hoc Networks," EPFL Technical Report No. IC/2003/50, July 2003.
[15] S. Buchegger and J.-Y.L. Boudec, "The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-Hoc Networks," Proc. Modeling and Optimization in Mobile Ad Hoc and Wireless Networks (WiOpt), Mar. 2003.
[16] S. Buchegger and J.Y. LeBoudec, "Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes—Fairness In Dynamic Ad-hoc NeTworks)," Proc. ACM MobiHoc, pp. 226-236, June 2002.
[17] M. Conti, E. Gregori, and G. Maselli, "Towards Reliable Forwarding for Ad Hoc Networks," Proc. Personal Wireless Comm. (PWC), pp. 790-804, 2003.
[18] P. Dewan, P. Dasgupta, and A. Bhattacharya, "On Using Reputations in Ad Hoc Networks to Counter Malicious Nodes," Proc. 10th Int'l Conf. Parallel and Distributed Systems (ICPADS), pp. 665-672, July 2004.
[19] Q. He, D. Wu, and P. Khosla, "SORI: A Secure and Objective Reputation-Based Incentive Scheme for Ad Hoc Networks," Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), vol. 2, pp. 825-830, 2004.
[20] S. Marti, T.J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. MobiCom, pp. 255-265, Apr. 2000.
[21] M.T. Refaei, V. Srivastava, L. DaSilva, and M. Eltoweissy, "A Reputation-Based Mechanism for Isolating Selfish Nodes in Ad Hoc Networks," Proc. Second Int'l Conf. Mobile and Ubiquitous Systems: Networking and Services (Mobiquitous), pp. 3-11, July 2005.
[22] P. Michiardi and R. Molva, "CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks," Proc. IFIP TC6/TC11 Sixth Joint Working Conf. Comm. and Multimedia Security, pp. 107-121, 2002.
[23] P.-W. Yau and C.J. Mitchell, "Reputation Methods for Routing Security for Mobile Ad Hoc Networks," Proc. Joint First Workshop Mobile Future and Symp. Trends in Comm. (SympoTIC), pp. 130-137, Oct. 2003.
[24] K. Aberer, Z. Despotovic, W. Galuba, and W. Kellerer, "The Complex Facets of Reputation and Trust," Computational Intelligence, Theory and Application, Springer, 2006.
[25] J. Sabater and C. Sierra, "Review on Computational Trust and Reputation Models," Artificial Intelligence Rev., vol. 24, pp. 33-60, 2005.
[26] Y. Rong, S.K. Lee, and H.-A. Choi, "Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis," Proc. 25th Joint Conf. IEEE Computer and Comm. Soc., 2006.
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool