Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Detection of selfish nodes in networks using CoopMAC protocol with ARQ

Published: 01 July 2010 Publication History

Abstract

CoopMAC has been recently proposed as a possible implementation of cooperation protocols in the medium access control (MAC) layer of a wireless network. However, some nodes may refrain from cooperation for selfish purposes, e.g. in order to save energy, in what is called selfish behavior or misbehavior. This protocol violation worsens other nodes' performance and can be avoided if other nodes detect and punish (e.g. banning from the network) misbehaving nodes. However, fading and interference may prevent nodes from cooperating even if they are willing, therefore it is not trivial to identify misbehaving nodes. In a fading scenario where an automatic repeat request (ARQ) protocol is used, we propose a mechanism that allows to detect misbehaving nodes. Two approaches, either based on the uniformly most powerful (UMP) test or on the sequential probability ratio test (SPRT) are considered. The two techniques are characterized and compared in terms of their average detection delay and resulting network performance.

References

[1]
A. Sendonaris, E. Erkip, and B. Aazhang, "User cooperation diversity-- part I: system description," IEEE Trans. Commun., vol. 51, no. 11, pp. 1927-1938, Nov. 2003.
[2]
A. Sendonaris, E. Erkip, and B. Aazhang, "User cooperation diversity--part II: implementation aspects and performance analysis," IEEE Trans. Commun., vol. 51, no. 11, pp. 1939- 1948, Nov. 2003.
[3]
P. Liu, Z. Tao, S. Narayanan, T. Korakis, and S. S. Panwar, "CoopMAC: a cooperative MAC for wireless LANs," IEEE J. Sel. Areas Commun., vol. 25, no. 2, pp. 340-354, Feb. 2007.
[4]
T. K. amd Z. Tao, Y. Slutskiy, and S. Panwar, "A cooperative MAC protocol for ad hoc wireless networks," in Proc. 5th Annual IEEE Int. Conf. on Pervasive Computing and Commun. Workshops (PerComW), 2007.
[5]
F. Milan, J. J. Jaramillo, and R. Srikant, "Achieving cooperation in multihop wireless networks of selfish nodes," in Proc. ACM Workshop on Game Theory for Communications and Networks (GAMENETS 2006), Oct. 2006.
[6]
V. Srinivasan, P. Nuggehalli, F. Chiasserini, and R. R. Rao, "An analytical approach to the study of cooperation in wireless ad hoc networks," IEEE Trans. Wireless Commun., vol. 4, no. 2, pp. 722-733, Mar. 2005.
[7]
N. Shastry and R. S. Adve, "Stimulating cooperative diversity in wireless ad hoc networks through pricing," in Proc. IEEE Int. Conf. Commun. (ICC), vol. 8, June 2006, pp. 3747-3752.
[8]
O. Ileri, S.-C. Mau, and N. B. Mandayam, "Pricing for enabling forwarding in self-configuring ad hoc networks," IEEE J. Sel. Areas Commun., vol. 23, no. 1, pp. 151-162, Jan. 2005.
[9]
A. L. Toledo and X. Wang, "Robust detection of selfish misbehavior in wireless networks," IEEE J. Sel. Areas Commun., vol. 25, no. 6, pp. 1124-1134, Aug. 2007.
[10]
S. Radosavac and J. S. Baras, "Appliatication of sequential detection schemes for obtaining performance bounds of greedy users in the IEEE 802.11 MAC," IEEE Commun. Mag., pp. 148-154, Feb. 2008.
[11]
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, "The eigentrust algorithm for reputation management in p2p netowkrs," in ACM International Conference on World Wide Web, 2003, pp. 640-651.
[12]
S. Buchegger and J.-Y. Le Boudec, "Performance analysis of the confidant protocol: cooperation of nodes--fairness in distributed ad hoc networks," in Proc. Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2002, pp. 226-236.
[13]
F. K. Hussain, E. Chang, and O. K. Hussain, "State of the art review of the existing bayesian-network based approaches to trust and reputation computation," in Proc. 2nd Int. Conf. on Internet Monitoring and Protection (ICIMP), July 2007.
[14]
S. Buchegger and J.-Y. Le Boudec, "Self-policing mobile a hoc networks by reputation systems," IEEE Commun. Mag., pp. 101-107, July 2005.
[15]
D. Djenouri and N. Badache, "Struggling against selfishness and black hole attacks in MANETs," Wireless Commun. and Mobile Computing, no. 8, pp. 689-704, 2008.
[16]
D. Djenouri, L. Khgelladi, and N. Badache, "A survey of security issues in mobile ad hoc and sensor networks," IEEE Commun. Surveys & Tutorials, pp. 2-28, Fourth Quarter 2005.
[17]
Z. Han and H. V. Poor, "Coalition games with cooperative transmission: a cure for the curse of boundary nodes in selfish packet-forwarding wireless networks," IEEE Trans. Commun., no. 1, pp. 203-213, Jan. 2009.
[18]
S. Dehnie and S. Tomasin, "Detection of selfish partners by control packets in ARQ-based CSMA cooperative networks," in Proc. Int. Symp. Spread Spectrum Tech. and Applications (ISSTA), Bologna, Italy, Aug. 2008.
[19]
J. Jaramillo and R. Srikant, "DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks," in Proc 13th Annual ACM International Conference on Mobile Computing and Networking (MobiCom'07), Montreal, Quebec, Canada, Sep. 2007.
[20]
S. M. Kay, Fundamentals of Statistical Signal Processing, Volume 2: Detection Theory. Prentice Hall, 1998.
[21]
D. Gündüz and E. Erkip, "Opportunistic cooperation by dynamic resource allocation," IEEE Trans. Wireless Commun., vol. 6, no. 4, pp. 1146-1154, Apr. 2007.
[22]
S. Tomasin, M. Levorato, and M. Zorzi, "Analysis of outage probability for cooperative networks with HARQ," in Proc. Int. Symp. On Information Theory (ISIT) 2007, Nice, France, June 2007.
[23]
E. L. Lehmann, Testing Statistical Hypotheses. New York: J. Wiley & Sons, 1959.
[24]
T. M. Cover and J. A. Thomas, Elements of Information Theory. Chichester, UK: Wiley, July 2006.
[25]
A. Wald, Sequential Analysis. Dover Publications, 1947.
[26]
H. L. Van Trees, Detection, Estimation and Modulation Theory, Part I. Hoboken, NJ: Wiley, 2001, vol. I.
[27]
E. B. Richard, Principles and Practice of Information Theory. Addison-Wesley, 1991.
[28]
I. Good, "Maximum entropy for hypothesis formulation," The Annals of Mathematical Statistics, pp. 911-934, 1963.
[29]
A. G. Tartakovsky, L. X. Rong, and G. Yaralove, "Sequential detection of targets in multichannel systems," IEEE Trans. Inf. Theory, vol. 49, no. 2, Feb. 2003.

Cited By

View all
  • (2015)Physical Integrity Check in Cooperative Relay CommunicationsIEEE Transactions on Wireless Communications10.1109/TWC.2015.245335314:11(6401-6413)Online publication date: 1-Nov-2015
  • (2015)A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networksFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-014-4212-59:2(280-296)Online publication date: 1-Apr-2015
  • (2015)Bayesian Coalitional Game in Physical Layer SecurityWireless Personal Communications: An International Journal10.1007/s11277-015-2837-985:3(1237-1250)Online publication date: 1-Dec-2015
  • Show More Cited By
  1. Detection of selfish nodes in networks using CoopMAC protocol with ARQ

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image IEEE Transactions on Wireless Communications
      IEEE Transactions on Wireless Communications  Volume 9, Issue 7
      July 2010
      288 pages

      Publisher

      IEEE Press

      Publication History

      Published: 01 July 2010
      Accepted: 24 February 2010
      Revised: 23 December 2009
      Received: 29 September 2009

      Author Tags

      1. Ad-hoc networks
      2. MIMO systems
      3. ad-hoc networks
      4. and authentication
      5. authentication
      6. cooperative diversity
      7. medium access control
      8. privacy
      9. security

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 27 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2015)Physical Integrity Check in Cooperative Relay CommunicationsIEEE Transactions on Wireless Communications10.1109/TWC.2015.245335314:11(6401-6413)Online publication date: 1-Nov-2015
      • (2015)A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networksFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-014-4212-59:2(280-296)Online publication date: 1-Apr-2015
      • (2015)Bayesian Coalitional Game in Physical Layer SecurityWireless Personal Communications: An International Journal10.1007/s11277-015-2837-985:3(1237-1250)Online publication date: 1-Dec-2015
      • (2014)Performance analysis of prioritized Automatic Repeat-request systems in the presence of self-similar trafficComputers and Electrical Engineering10.1016/j.compeleceng.2013.11.00740:2(704-713)Online publication date: 1-Feb-2014
      • (2014)Reputation based selfishness prevention techniques for mobile ad-hoc networksTelecommunications Systems10.1007/s11235-013-9786-y57:2(181-195)Online publication date: 1-Oct-2014

      View Options

      View options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media