Detection and mitigation of misbehavior in cooperative wireless communications

Cooperative diversity protocols are designed with the assumption that wireless users always cooperate in a socially efficient manner. This assumption may not be valid in commercial wireless networks where users may violate rules of cooperation for malicious or selfish reasons. In the presence of misbehavior, it is difficult to ensure a socially efficient cooperation without techniques to enforce cooperation. In this dissertation, we develop techniques to detect and mitigate misbehavior in cooperative wireless networks. We first examine effects of misbehavior on performance of existing cooperative protocols. We show both analytically and by simulation the incurred performance degradation. We show based on game theoretic arguments that existing cooperative schemes are characterized by a non-cooperative Nash equilibrium. We examine using evolutionary game dynamics effects of a small number of mutants on the behavior of a population of cooperators. We then propose two classes of misbehavior detection techniques. The first class of detectors determine behavior of relay nodes using signals transmitted over source-destination channel as a side information. The second class of detectors are developed for cooperative networks with hybrid automatic repeat request (HARQ) protocol. We develop optimal detection techniques (1) based on uniformly most powerful (UMP) test; (2) based on sequential probability ratio test (SPRT). Misbehavior is determined based on control packets exchanged to reveal status of transmissions. Performance of the proposed detection techniques is evaluated based on detection delay, computational complexity and memory requirement. The proposed detection techniques provide only a localized view of the cooperative system. However, to mitigate further effects of misbehavior a mechanism is required to give each node a global view of the network. To this end, we formulate cooperative communications as a dynamic game with incomplete information, which provides a framework (1) to develop a model for selfish behavior and (2) for designing a reliable partner selection scheme in the presence of uncertainty. We show that the proposed dynamic Bayesian game model captures vital aspects of cooperative communications. We show that the proposed dynamic Bayesian game satisfies the requirements for the existence of Perfect Bayesian Equilibrium.

[1]  H.T. Sencar,et al.  Cooperative diversity in the presence of a misbehaving relay : Performance analysis , 2007, 2007 IEEE Sarnoff Symposium.

[2]  Nasir D. Memon,et al.  Cooperative diversity with selfish users , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.

[3]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[4]  S. Tomasin,et al.  Detection of Selfish Partners by Control Packets in ARQ-Based CSMA Cooperative Networks , 2008, 2008 IEEE 10th International Symposium on Spread Spectrum Techniques and Applications.

[5]  Elza Erkip,et al.  User cooperation diversity. Part I. System description , 2003, IEEE Trans. Commun..

[6]  Zhu Han,et al.  Multi-node cooperative resource allocation to improve coverage area in wireless networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[7]  Nasir D. Memon,et al.  Modeling Misbehavior in Cooperative Diversity: A Dynamic Game Approach , 2009, EURASIP J. Adv. Signal Process..

[8]  M. Nowak,et al.  Evolution of indirect reciprocity , 2005, Nature.

[9]  Yuhong Yang Elements of Information Theory (2nd ed.). Thomas M. Cover and Joy A. Thomas , 2008 .

[10]  Shalinee Kishore,et al.  A Game-Theoretic Analysis of Decode-and-Forward Cooperation in Rayleigh Fading Channels , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[11]  Nasir D. Memon,et al.  Detecting Malicious Behavior in Cooperative Diversity , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[12]  E. Lehmann Testing Statistical Hypotheses , 1960 .

[13]  Elza Erkip,et al.  User cooperation diversity. Part II. Implementation aspects and performance analysis , 2003, IEEE Trans. Commun..

[14]  Margaret M. Blair,et al.  Trust, Trustworthiness, and the Behavioral Foundations of Corporate Law , 2001 .

[15]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[16]  Pietro Michiardi,et al.  Game theoretic analysis of security in mobile ad hoc networks , 2002 .

[17]  Harry L. Van Trees,et al.  Detection, Estimation, and Modulation Theory, Part I , 1968 .

[18]  X. Rong Li,et al.  Sequential detection of targets in multichannel systems , 2003, IEEE Trans. Inf. Theory.

[19]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[20]  Leonard E. Miller,et al.  Distribution of Link Distances in a Wireless Network , 2001, Journal of research of the National Institute of Standards and Technology.

[21]  Sathya Narayanan,et al.  CoopMAC: A Cooperative MAC for Wireless LANs , 2007, IEEE Journal on Selected Areas in Communications.

[22]  Min Wu,et al.  Security Issues in Cooperative Communications: Tracing Adversarial Relays , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[23]  David M. Kreps,et al.  Sequential Equilibria Author ( s ) : , 1982 .

[24]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[25]  J. Nicholas Laneman,et al.  Cooperative diversity in wireless networks: algorithms and architectures , 2002 .

[26]  Marco Levorato,et al.  Analysis of Outage Probability for Cooperative Networks with HARQ , 2007, 2007 IEEE International Symposium on Information Theory.

[27]  Yeheskel Bar-Ness,et al.  Diversity combining with imperfect channel estimation , 2005, IEEE Transactions on Communications.

[28]  Roger B. Myerson,et al.  Game theory - Analysis of Conflict , 1991 .

[29]  Mohamed-Slim Alouini,et al.  Digital Communication over Fading Channels: Simon/Digital Communications 2e , 2004 .

[30]  Jean-Pierre Hubaux,et al.  Game Theory in Wireless Networks: A Tutorial , 2006 .

[31]  K. Cook Trust in Society , 2001 .

[32]  Gerhard Fettweis,et al.  Relay-based deployment concepts for wireless and mobile broadband radio , 2004, IEEE Communications Magazine.

[33]  N. Memon,et al.  Detection of misbehavior in cooperative diversity , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[34]  Norman C. Beaulieu,et al.  On first-order Markov modeling for the Rayleigh fading channel , 2000, IEEE Trans. Commun..

[35]  N. Memon,et al.  Cooperative diversity as a dynamic game with incomplete information , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[36]  Aria Nosratinia,et al.  Cooperative communication in wireless networks , 2004, IEEE Communications Magazine.

[37]  S. Buchegger,et al.  Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[38]  John G. Proakis,et al.  Digital Communications , 1983 .

[39]  Desmond P. Taylor,et al.  On the irreducible error floor in fast fading channels , 2000, IEEE Trans. Veh. Technol..

[40]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[41]  Raviraj S. Adve,et al.  Stimulating Cooperative Diversity in Wireless Ad Hoc Networks through Pricing , 2006, 2006 IEEE International Conference on Communications.

[42]  W. Hamilton,et al.  The evolution of cooperation. , 1984, Science.

[43]  Helmut Bölcskei,et al.  Fading relay channels: performance limits and space-time signal design , 2004, IEEE Journal on Selected Areas in Communications.

[44]  Vivek P. Mhatre,et al.  WiMAX relay networks: opportunistic scheduling to exploit multiuser diversity and frequency selectivity , 2008, MobiCom '08.

[45]  John S. Baras,et al.  Application of sequential detection schemes for obtaining performance bounds of greedy users in the IEEE 802.11 MAC , 2008, IEEE Communications Magazine.

[46]  Maxim Raya,et al.  DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.

[47]  David J. Goodman,et al.  Power control for wireless data , 1999, 1999 IEEE International Workshop on Mobile Multimedia Communications (MoMuC'99) (Cat. No.99EX384).

[48]  R. Srikant,et al.  DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks , 2007, MobiCom '07.

[49]  Xiaodong Wang,et al.  Robust detection of selfish misbehavior in wireless networks , 2007, IEEE Journal on Selected Areas in Communications.

[50]  Lee Trepanier,et al.  Trust in Society , 2004 .

[51]  J. Hofbauer,et al.  Evolutionary game dynamics , 2011 .

[52]  Nasir D. Memon,et al.  A dynamic game model for Amplify-and-Forward cooperative communications , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[53]  Mia Hubert,et al.  LIBRA: a MATLAB library for robust analysis , 2005 .

[54]  P. Kollock SOCIAL DILEMMAS: The Anatomy of Cooperation , 1998 .

[55]  R. Gibbons An Introduction to Applicable Game Theory , 1997 .

[56]  Nasir D. Memon,et al.  A Stochastic Model for Misbehaving Relays in Cooperative Diversity , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[57]  Narayan B. Mandayam,et al.  Pricing for enabling forwarding in self-configuring ad hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[58]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[59]  M. Nowak Five Rules for the Evolution of Cooperation , 2006, Science.