Detection of Selfish Nodes in Networks Using CoopMAC Protocol with ARQ

CoopMAC has been recently proposed as a possible implementation of cooperation protocols in the medium access control (MAC) layer of a wireless network. However, some nodes may refrain from cooperation for selfish purposes, e.g. in order to save energy, in what is called selfish behavior or misbehavior. This protocol violation worsens other nodes' performance and can be avoided if other nodes detect and punish (e.g. banning from the network) misbehaving nodes. However, fading and interference may prevent nodes from cooperating even if they are willing, therefore it is not trivial to identify misbehaving nodes. In a fading scenario where an automatic repeat request (ARQ) protocol is used, we propose a mechanism that allows to detect misbehaving nodes. Two approaches, either based on the uniformly most powerful (UMP) test or on the sequential probability ratio test (SPRT) are considered. The two techniques are characterized and compared in terms of their average detection delay and resulting network performance.

[1]  X. Rong Li,et al.  Sequential detection of targets in multichannel systems , 2003, IEEE Trans. Inf. Theory.

[2]  E. Chang,et al.  State of the art review of the existing bayesian-network based approaches to trust and reputation computation , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).

[3]  Vikram Srinivasan,et al.  An analytical approach to the study of cooperation in wireless ad hoc networks , 2005, IEEE Transactions on Wireless Communications.

[4]  M. Melamed Detection , 2021, SETI: Astronomy as a Contact Sport.

[5]  Steven Kay,et al.  Fundamentals Of Statistical Signal Processing , 2001 .

[6]  Marco Levorato,et al.  Analysis of Outage Probability for Cooperative Networks with HARQ , 2007, 2007 IEEE International Symposium on Information Theory.

[7]  Zhu Han,et al.  Coalition Games with Cooperative Transmission: A Cure for the Curse of Boundary Nodes in Selfish Packet-Forwarding Wireless Networks , 2007, 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops.

[8]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[9]  R. Srikant,et al.  Achieving cooperation in multihop wireless networks of selfish nodes , 2006, GameNets '06.

[10]  Jean-Yves Le Boudec,et al.  Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.

[11]  S. Tomasin,et al.  Detection of Selfish Partners by Control Packets in ARQ-Based CSMA Cooperative Networks , 2008, 2008 IEEE 10th International Symposium on Spread Spectrum Techniques and Applications.

[12]  Shivendra S. Panwar,et al.  A Cooperative MAC Protocol for Ad Hoc Wireless Networks , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[13]  Deniz Gündüz,et al.  Opportunistic cooperation by dynamic resource allocation , 2007, IEEE Transactions on Wireless Communications.

[14]  Richard E. Blahut,et al.  Principles and practice of information theory , 1987 .

[15]  Djamel Djenouri,et al.  Convergence analysis of distributed fixed-step power control algorithm for cellular mobile systems , 2008 .

[16]  J. Andel Sequential Analysis , 2022, The SAGE Encyclopedia of Research Design.

[17]  Sathya Narayanan,et al.  CoopMAC: A Cooperative MAC for Wireless LANs , 2007, IEEE Journal on Selected Areas in Communications.

[18]  I. Good Maximum Entropy for Hypothesis Formulation, Especially for Multidimensional Contingency Tables , 1963 .

[19]  Raviraj S. Adve,et al.  Stimulating Cooperative Diversity in Wireless Ad Hoc Networks through Pricing , 2006, 2006 IEEE International Conference on Communications.

[20]  John S. Baras,et al.  Application of sequential detection schemes for obtaining performance bounds of greedy users in the IEEE 802.11 MAC , 2008, IEEE Communications Magazine.

[21]  R. Srikant,et al.  DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks , 2007, MobiCom '07.

[22]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[23]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[24]  E. Lehmann Testing Statistical Hypotheses , 1960 .

[25]  Elza Erkip,et al.  User cooperation diversity. Part II. Implementation aspects and performance analysis , 2003, IEEE Trans. Commun..

[26]  Elza Erkip,et al.  User cooperation diversity. Part I. System description , 2003, IEEE Trans. Commun..

[27]  Narayan B. Mandayam,et al.  Pricing for enabling forwarding in self-configuring ad hoc networks , 2004, WCNC.

[28]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[29]  Xiaodong Wang,et al.  Robust detection of selfish misbehavior in wireless networks , 2007, IEEE Journal on Selected Areas in Communications.