Unformatted text preview:

Incentive Based Routing Protocols In Ad Hoc NetworksOverviewBasics…Ad Hoc NetworksMotivationDefinition: Incentive based SchemesEngineering Incentive based ProtocolsSlide 7AnalysisDesignEvaluationSome definitionsIncentive SchemesSORI A Secure Objective Reputation based Incentive schemeSlide 14AssumptionsBasic SchemeBasic Scheme continued …SORI: Basic Scheme continued …Basic Scheme: Summary & RemarksSecurity EnhancementsSlide 21Slide 22Simulation ResultsSlide 24PerformanceSPRITE Simple Cheat Proof Credit Based System for Mobile Ad hoc NetworksFeaturesBasic SchemeSlide 29Cheating actions in the submission gameMotivation nodes to forward the messageMotivation nodes to report ReceiptsPreventing false ReceiptsMessage Forwarding Protocol: SpecificationsSlide 35Slide 36Slide 37Slide 38Slide 39ConclusionReferencesIncentive Based Routing Protocols InAd Hoc NetworksVinay ShahCSE 620OverviewBasics…Ad Hoc NetworksMotivationDefinitionSteps for Engineering Incentive Schemes in a protocolIncentive based Routing ProtocolsReputation based: SORICredit Based: SPRITEBasics…Ad Hoc NetworksSet of nodes who wish to communicate without any network infrastructure.All nodes equipped with transmission and receiving capabilityNot every node is in the range of every other node.Thus the node has to take assistance of intermediate nodes if it want to transmit packets to other nodes not in its range of transmission.Usage: E.g. For communication during emergency and military situations (Cooperative ad hoc networks) or in general when nodes want to communicate in a civilian domain (Non-Cooperative ad hoc network)MotivationOverview: An ad hoc routing protocol The routing function is distributed among the participating nodes Current ad hoc routing protocols assumes that all the nodes are cooperativeHowever, forwarding of packets consumes resources such as battery power which are scarce. If the nodes in an non cooperative network belong to different users, they don’t have any incentive to cooperateThe routing component of any such protocol will not work if the nodes are selfish as the information provided by nodes may not be correctThus to prevent this, protocols should have an incentive scheme associated with them.Definition: Incentive based SchemesIn ad hoc networks, devices have to cooperate. Autonomous devices tend to abstain from cooperation. Incentive schemes have been proposed as a means of fostering cooperation under these circumstances Note: In order to work effectively, incentive schemes need to be carefully tailored to the characteristics of the cooperation protocol they should support.E.g. If Node A wants to Communicate with Node Z (Z not in its radio range). The intermediate nodes B, C … Y need some kind of incentive to use their resources to forward packets. BA C …………...ZEngineering Incentive based ProtocolsThe systematic design of incentive schemes comprises several steps.Analysis: The engineer analyzes and adjusts the cooperation protocol that requires an incentive scheme.Design: Design decisions have to be made regarding the choice of incentives, who should get the incentives and the means of implementing them.Evaluate: The resulting cooperation protocol is evaluated by applying an appropriate evaluation method.Analysis Questions that need to be answeredWhat kinds of inter-entity cooperation exist? Determined by the cooperation protocol the entities run. Which steps of the cooperation protocol are not beneficial to the executing entity? Is the behavior perceptible? If yes, how costly and reliable is such perception? Adjustments needed to make protocol more perceptible? There are several Perception mechanisms: Digital signatures: Check the authenticity of the sender and If entities of the forwarding path altered the packet. Redundancy: E.g. Extend the protocol to accommodate the issuance of receipts Over Hearing: Over hear to check if the entity is behaving as it shouldDesignDesign decisionsWhich type of behavior should be remunerated and which type should be taken as granted.How should a defecting entity be punished?Choice of appropriate incentives An incentive pattern induces that an entity enters into a otherwise detrimental commitmentIncentive patterns fall into two classes:Trust based: Entity may believe that its peers will reciprocate by entering into future commitments. Trade based: Entity is convinced to enter into a commitment if its peers enter into commitments that are beneficial for itself. Notes/Credits is a trade based approachIf exchange protocols are not viable, use distributed reputation systemsEvaluationSimulations provide the only cost-efficient means for such evaluationEvaluations focused on the total utility of the participating entitiesEvaluate the fairness of the incentive scheme with respect to the individual utility/costs that arise from cooperationHigh degrees of fairness indicate that entities have to exhibit cooperative behavior in order to benefit from the behavior of other entities.Cooperation protocol has to be modeled appropriately in order to obtain meaningful simulation results.Objectives of the evaluation: The engineer has to measure the total utility u and the total costs c that arise from cooperation. If the objectives of the evaluation include fairness, the individual utility ui and individual costs ci have to be measured separately for every entityA straightforward means of correlation is the calculation of a regression line between the individual utilities and costs.In case of good linear correlation, the slope of the regression line indicates the magnitude of the incentive effects.Some definitionsMalicious Entity: Aims at breaking the co operative paradigm to intentionally damage othersSelf-Interested Entity: Unwilling to spend its resources on behalf of others. Does not intend to damage the overall functioningIncentive SchemesReputation based schemeSORI: A Secure Objective Reputation based Incentive scheme Pricing/Credit Based SchemeSPRITE: Simple Cheat Proof Credit Based System for Mobile Ad hoc NetworksSome DefinitionsMalicious Entity: Aims at breaking the co operative paradigm to intentionally damage othersSelf-Interested Entity: Unwilling to spend its resources on behalf of others. Does not intend to damage the overall functioningSORIA Secure Objective


View Full Document

UB CSE 620 - Incentive Based Routing Protocols In Ad Hoc Networks

Download Incentive Based Routing Protocols In Ad Hoc Networks
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Incentive Based Routing Protocols In Ad Hoc Networks and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Incentive Based Routing Protocols In Ad Hoc Networks 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?