Design and Optimization of Reputation Mechanisms for Centralized Clustered Ad Hoc Networks

In this paper, we present and analyze a reputation scheme aiming at reinforcing node cooperation in clustered Mobile Ad hoc Networks with centralized control. The main goal of this scheme is to differentiate between intentional misbehavior and apparent failure to cooperate due to wireless channel conditions or mobility. To this end, a statistical decision method based on the notion of a random walk is employed. Selecting the optimal parameters for this random walk is investigated in the context of time dependent events. Special care has been given to issues such as probability of detection of a misbehaving mobile node, probability of falsely accusing a legitimate node due to nonintentional failures to cooperate and fast detection of misbehaving nodes in the light of time varying behavior of such nodes.

[1]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[2]  Bharat K. Bhargava,et al.  Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad Hoc Network (CAMA) , 2004, Mob. Networks Appl..

[3]  Markus Jakobsson,et al.  A charging and rewarding scheme for packet forwarding in multi-hop cellular networks , 2003, MobiHoc '03.

[4]  Torsten Braun,et al.  Heterogeneous Network Establishment Assisted by Cellular operators , 2003, MWCN.

[5]  Philipp Obreiter,et al.  A Taxonomy of Incentive Patterns - The Design Space of Incentives for Cooperation , 2003, AP2PC.

[6]  Ioannis Stavrakakis,et al.  A centralized ad-hoc network architecture (CANA) based on enhanced HiperLAN/2 , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..

[7]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[8]  Jean-Yves Le Boudec,et al.  The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[9]  Robert G. Gallager,et al.  Discrete Stochastic Processes , 1995 .

[10]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[11]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[12]  T. Dimitriou,et al.  Security considerations for the centralized ad-hoc network architecture (CANA) , 2004, International Workshop on Wireless Ad-Hoc Networks, 2004..

[13]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[14]  Luís E. T. Rodrigues,et al.  Friends and foes: preventing selfishness in open mobile ad hoc networks , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..

[15]  Refik Molva,et al.  Analysis of coalition formation and cooperation strategies in mobile ad hoc networks , 2005, Ad Hoc Networks.