Detecting Selfish Behavior in a Cooperative Commons

A cooperative commons is a type of ad hoc network in which all devices are required to communicate and carry each other's traffic, even when those devices are associated with different owners and different administrative domains. Thus, infrastructure is constructed at little cost to each owner. One unusual feature of the cooperative commons is that as more devices join, total communication capacity increases. These advantages are possible when devices are willing to cooperate and use their own resources to carry traffic of others, but are undermined by selfish behavior, where a device's action increases benefit for that device while decreasing the average benefit for all devices. This paper demonstrates that selfish behavior cannot be detected with the prominent routing protocols currently used in ad hoc networks, and proposes a novel approach that includes use of routing protocols in which selfish behavior cannot be concealed, and watchdog algorithms that observe behavior of neighbors for signs of selfishness. We prove that our approach reliably detects all acts of selfishness by individual devices in a network where devices are fixed and there are no packet collisions. We demonstrate that our watchdog algorithms work with a general class of routing protocols, and show how existing routing protocols can be extended to fit in that class.

[1]  Khaled Ben Letaief,et al.  Cooperative Communications for Cognitive Radio Networks , 2009, Proceedings of the IEEE.

[2]  Marco Conti,et al.  Mesh networks: commodity multihop ad hoc networks , 2005, IEEE Communications Magazine.

[3]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[4]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[5]  Panganamala Ramana Kumar,et al.  Capacity bounds for ad hoc and hybrid wireless networks , 2004, CCRV.

[6]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[7]  D. Djenouri,et al.  New approach for selfish nodes detection in mobile ad hoc networks , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..

[8]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[9]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[10]  T. Fujii,et al.  Ad-hoc cognitive radio - development to frequency sharing system by using multi-hop network , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[11]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[12]  Younghwan Yoo,et al.  Why does it pay to be selfish in a MANET? , 2006, IEEE Wireless Communications.

[13]  Khaled Ben Letaief,et al.  Joint Beamforming and Scheduling in Cognitive Radio Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[14]  Steve Sheng,et al.  Finding an Effective Sustainable Model for a Wireless Metropolitan-Area Network: Analyzing the Case of Pittsburgh , 2007 .

[15]  Jon M. Peha,et al.  Sharing Spectrum Through Spectrum Policy Reform and Cognitive Radio , 2009, Proceedings of the IEEE.

[16]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[17]  J. Peha,et al.  Emerging Technology and Spectrum Policy Reform , 2007 .

[18]  Jean-Yves Le Boudec,et al.  A test-bed for misbehavior detection in mobile ad-hoc networks - how much can watchdogs really do? , 2004, Sixth IEEE Workshop on Mobile Computing Systems and Applications.

[19]  A. Laouiti,et al.  Optimized link state routing protocol for ad hoc networks , 2001, Proceedings. IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century..

[20]  S. M. Heemstra de Groot,et al.  Power-aware routing in mobile ad hoc networks , 1998, MobiCom '98.

[21]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[22]  Qi He,et al.  SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[23]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[24]  Pramod K. Varshney,et al.  TWOACK: preventing selfishness in mobile ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[25]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[26]  Ratul Mahajan,et al.  Sustaining cooperation in multi-hop wireless networks , 2005, NSDI.

[27]  Yacine Rebahi,et al.  A reputation-based trust mechanism for ad hoc networks , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).

[28]  Jean-Yves Le Boudec,et al.  Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.