Security and Cooperation in Wireless Networks
Georg-August University Göttingen
Selfishness in packet forwarding/ Secure protocols for behavior - - PowerPoint PPT Presentation
Selfishness in packet forwarding/ Secure protocols for behavior enforcement Security and Cooperation in Wireless Networks Georg-August University Gttingen Part I: Selfishness in packet forwarding the operation of multi-hop wireless networks
Security and Cooperation in Wireless Networks
Georg-August University Göttingen
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
forward data packets on behalf of other nodes
forwarding node, and it consumes valuable resources (battery)
jeopardized
– When a node is requested to forward a packet by one of its neighbors, will it do so, if no mechanism enforces this cooperation behavior?
2
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
3
time time slot: 1 t
Strategy: cooperation level
mC(0) mC(1) mC(t)
represents full defection and 1 means full cooperation. Benefit (of node i as the source on route r): proportion of packets sent by node i (as the source) on route r reaching their destination = the throughput experienced by i as a source
through i at time t that i cooperatively forwards.
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
4
A E C
1
k
l s f k
where: s – source
r – route on which s is a source t – time slot fk – forwarders for s mfk – cooperation level of forwarder fk bi – benefit function
Experienced throughput :
A E C D
TA mE(t) mC(t) r (A→D): Example : benefit function :
bS Normalized throughput:
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
5
Example :
{ , }
k
C f E C k E C
C A j
A E C D
TA mE(t) mC(t) r (A→D):
1
k
j j f k
Normalized throughput at forwarder fj :
where: r – route on which fk is a forwarder
t – time slot fk – forwarders on route r mfk – cooperation level of forwarder fk
j
f s j
Cost for forwarder fj on route r:
where:
Ts(r) – traffic sent by source s on route r C – unit cost of forwarding (cost of forwarding one packet)
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
6
( ) ( )
i i
i i i q S t r F t
The goal of each node is to maximize its total payoff over the game: Payoff = Benefit - Cost where: Si(t) – set of routes on which i is a source
Fi(t) – set of routes on which i is a forwarder
t i t
where: – discounting factor
t – time
time time slot: 1 t Payoff: uA(0) uA(1). uA(t). t
Example :
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
7
mi(0)
throughput it experienced in time slot t-1 on the route where it is a source
yi xi A-i i
Strategy function for node i:
where: (r,t) – experienced throughput of route r at time t
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
8
i i y
i i i
i i y
Strategy Function Initial cooperation level AllD (always defect) AllC (always cooperate)
TFT (Tit-For-Tat) (mimics the strategy of its
time slot)
1 1
the output of the strategy function is independent of the input (example: AllD and AllC)
the output of the strategy function depends on the input (example: TFT) where yi stands for the input
i i i
y y ) (
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
9
dependency: the benefit of each source is dependent on the behavior of its forwarders
(an arrow from I to j means behavior of I has an effect on the benefit of j = I is an intermediate node for source j)
dependency loop
A Dependency loop L of node I is a sequence (I,v1),(v1,v2),…,(v(l-1),vl),(vl,i)
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
– Reactive dependency loop:
reactive strategies. – Non-Reactive dependency loop
reactive strategies.
– In such strategy profiles the nodes would be better off by cooperating
10
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
11
) ( I
F
Theorem 1: If node i does not have any dependency loops, then its best strategy is AllD. Theorem 2: If node i has only non- reactive dependency loops, then its best strategy is AllD. Corollary 1: If every node plays AllD, it is a Nash-equilibrium.
E
node i node playing a non-reactive strategy
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
12
Corollary 2: If Theorem 3 holds for every node, it is a Nash-equilibrium. Theorem 3 (simplified): Assuming that node i is a forwarder, its best strategy will be to cooperate only if it has a dependency loop with each of its sources Example in which Corollary 2 holds: A B C A B C
Network Dependency graph
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
13
D: Set of scenarios, in which every node playing AllD is a Nash equilibrium
C: Set of scenarios, in which a Nash equilibrium based on cooperation is not excluded by Theorem 1 C2: Set of scenarios, in which cooperation is based on the conditions expressed in Corollary 2
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
14
Number of nodes 100, 150, 200 Area size 1500x1500m, 1850x1850m, 2150x2150m Radio range 200 m Distribution of the nodes random uniform Number of routes originating at each node 1-10 Route selection shortest path Number of simulation runs 1000
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
15
cooperation in realistic settings (i.e. for a reasonably low no. of routes per node)
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
16
– If everyone drops all packets, it is a Nash-equilibrium – In theory, given some conditions, a cooperative Nash-equilibrium can exist ( i.e., each forwarder forwards all packets )
– In practice, the conditions for cooperative Nash-equilibria are very restrictive : the likelihood that the conditions for cooperation hold for every node is extremely small
– Cooperation cannot be taken for granted – Mechanisms that stimulate cooperation are necessary
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
17
– Nodes are rational => Maximize their own payoff – We have seen that cooperation does not happen naturally for packet forwarding in self-organized networks – Cooperation must be encouraged
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
– Incentives – System Model
– Dominant action/subaction – Cooperation optimal protocol
– VCG payments with correct link cost establishment – Forwarding protocol with block confirmation
18
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
19
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
20
Incentive Punish Reward Internal External Internal External
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
i i i
21
– Pmin = minimum power to reach receiver
– bi = benefit (reward, by micro-payment) – ci = cost of forwarding (energy, overhead,…)
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
i i i i i i
22
Example: Joint packet forwarding game – Imperfect information – Message from S to D – Two players: p1 and p2
p1\p2 F D F (1-c,1-c) (-c,0) D (0,0) (0,0)
S P1 P2 D
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
r f i i i
23
is node i’s subaction in the routing stage (what it is supposed to do in the routing stage) is node i’s subaction in the forwarding stage (what it really does in the forwarding stage)
f i
a
r i
a
subactions :
r
f i
a
payoff that it achieves under the routing decision assuming that all nodes are faithful in their packet forwarding subaction to the one they have declared in the routing subaction, would be:
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
, ,
R r r R r r i i i i i i
u a a u a a
24
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
p1\p2 F D F (1-c,1-c) (-c,0) D (0,0) (0,0) 25
– All packets are forwarded to their destinations – Following the protocol is a subgame perfect equilibrium under R in the forwarding stage.
Node 1 Node 2 Last node
forward forward forward drop drop drop
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
26
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
1. To estimate how much should be paid for node’s cooperation each link of the route the appropriate reward level
spend to do the operation
node that what the price would be if that node was not included in the route 2. How to make sure that the nodes cannot cheat about these estimate
27
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
– declared cost + added value
– Incentive to declare the true price => Truthful
28
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
29
Least cost path from S to D: LCP(S,D) = S, v2, v3, D with cost(LCP(S,D)) = 5 + 2 + 3 = 10 Least cost path without node v2: LCP(S,D;−v2) = S, v1, v4, D with cost(LCP(S,D);−v2) = 7 + 3 + 4 = 14 Least cost path without node v3: LCP(S,D;−v3) = S, v2, v4, D with cost(LCP(S,D);−v3) = 5 + 3 + 4 = 12. VCG payments: bi=cost(LCP(S,D;-i))-cost(LCP(S,D)-{i})=cost(LCP(S,D;-i))-cost(LCP(S,D))+cost({i})
b2 = 14 − 10 + 2 = 6 b3 = 12 − 10 + 3 = 5 These values represent the unit payment (the payment for one forwarded data packet) to nodes v2 and v3, respectively.
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
– Nodes i and j both are involved in measuring Pi,j – Pi,j is the minimum power level required to transmit packets from i to j
– Node j is less likely to be on LCP – Node j’ s payment will decrease.
– Node j would be more likely to be on LCP – Node j increases its payment
30
i j Pi,j
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
nodes) using TESTSIGNAL messages
levels (in an increasing order)
than the minimum required power
destination) about the observed power levels by sending ROUTEINFO messages
cost path
31
i j [cost3]K¦HMAC D [cost2]K¦HMAC [cost1]K¦HMAC [cost4]K¦HMAC [cost3]K¦HMAC [cost4]K¦HMAC
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
pair) will perform the same operation for estimation of the power needed to reach its own neighbors.
prevent any forwarding nodes from altering the power levels
– Nodes share a symmetric key with D – Nodes send an encrypted and signed test signal at increasing power levels containing cost information – Messages are protected from forging with HMAC – The power information in TESTSIGNAL is encrypted by the node initiating it and will be re- encrypted by the neighbor receiving it and inserted in the ROUTEINFO message; therefore the second node can not modify the power level needed to reach it (can not increase it chance of being
– Complexity (computation at the destination): O(N^3)
along the path informing the intermediate nodes being on the path and also about the power with which each intermediate node must forward the data packets
32
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
33
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
3 2
34
the power levels identified in the routing phase
where n is the number of blocks
path
– For example, the destination should confirm block 2 by sending r5-2=r3 – Nodes can verify: r1 m1 m2 m3 m4 m5 m6 m7 m8 m9 b1 b2 b3 b4 b5
H
r0
H H
r2 r=r5
H
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
35
Georg-August University Göttingen
Selfishness in packet forwarding/behavior enforcement
– Routing dominant + Forwarding optimal – Routing based on VCG – Forwarding based on Reverse Hash Chain
36