SLIDE 11 Architecture of RFSN
Watchdog mechanism Reputation Trust Behavior Second hand
Watchdog mechanism: Gather first hand information
Second hand information
- Watchdog mechanism: Gather first hand information
- Second hand information: Share experiences to facilitate
community growth y g
- Reputation: Develop a perception of other nodes over time
- Trust: Predict their future behavior
B h i C /N i h d i i
- Behavior: Cooperate/Non-cooperate with node in question
41
Reputation Representation
) (
- Probabilistic formulation
– Use beta distribution to represent reputation of a node.
, , 1 ) 1 ( ) ( ) ( ) ( ) , (
1 1
x x x Beta Rij
R t ti f d j f th ti f d i Reputation of node j from the perspective of node i
Simple to store: Just characterized by 2 parameters – Simple to store: Just characterized by 2 parameters. – Intuitive: α and β represents magnitude of cooperation and non-cooperation. – Efficient: Easy reputation updates, integration, trust formulation.
- Maintain reputation for just neighboring nodes
– Use locality – Provides scalability
42
Design of Beta Reputation System
Propagated data:
- Information about good nodes – Saves from bad mouthing attacks
- Independent information (direct experience) – Critical to derivation in
Independent information (direct experience) Critical to derivation in earlier slide
Trust Trust Trust Trust Trust Trust Trust
Reputation table based on only direct information of
Reputa RT iNC Watch RTD iNC Reputa RT iNC Watch Reputa RT iNC Watch RTD iNC Reputa RT iNC Watch Reputa RT iNC Watch RTD iNC Reputa RT iNC Watch Reputa RT iNC Watch RTD iNC
information of cooperative and non- cooperative nodes
tion RT iC Behavior RTD iC hdog tion RT iC Behavior RTD iC hdog tion RT iC Behavior RTD iC hdog tion RT iC Behavior RTD iC hdog tion RT iC Behavior RTD iC hdog tion RT iC Behavior RTD iC hdog tion RT iC Behavior RTD iC hdog
Reputation table of cooperative and non- cooperative nodes
Second Hand Info Second Hand Info
Second Hand Info
Second Hand Info Second Hand Info Second Hand Info
Second Hand Info
Propagating data
43
Comparison
Metric Confidant Core RFSN Architecture Distributed Distributed Distributed Context Ad-hoc Networks Ad-hoc Networks Sensor Networks Scope Routing Routing Compromised / Scope Routing misbehavior Routing Misbehavior Compromised / Faulty nodes Formulation Heuristics/ Bayesian Heuristics based
Bayesian formulation Bayesian formulation based on game theory
formulation based on decision theory Reputation propagation Only bad Only good Only good Maintenance Local Local Local
44