A Reputation-Based Mechanism For Isolating Selfish Nodes in Ad Hoc Networks
A Reputation-Based Mechanism For Isolating Selfish Nodes in Ad Hoc Networks
r ,
of a neighbors reputation index as a result of packet
delivery events also affect the performance of our
mechanism. One way to compare reputation
functions is by using the ratio
+
r r / . The higher the
ratio
+
r r / , the faster the isolation of selfish nodes,
but also the higher the number of false positives.
Next, we present three heuristics for reputation
functions.
i. Double Decrement/Single Increment Ratio
(DDSIR)
In this scheme, for each successfully delivered
packet, a node increments the reputation index of the
next-hop neighbor that forwarded the packet by
n r =
+
, where n is a positive constant. For each
failed delivery a node decrements the reputation index
of the neighbor by n r 2 =
and
n r =
+
, where n and m are positive constants. The
number of hops from the source of the dropped packet
could be estimated from the intermediate nodes
routing table. Thus, on a route where a packet
delivery failure event occurs, the reputation index of
the node closest to where the event occurred is
decremented the most. The motivation of the
algorithm is to avoid draining the reputation of nodes
along a route that includes a selfish node before
isolation takes place. This could occur if nodes along
that route are penalized equally by their previous hop
neighbors (as in the example discussed in figure 1).
iii. Random Early Probation (REP)
This scheme rewards and penalizes nodes
similarly to DDSIR. Additionally, a node randomly
rejects participation in a route with neighbors whose
reputation is between
0
r and
thresh
r . As a neighbors
reputation approaches
thresh
r in a nodes table, the
probability of the nodes participation in a route with
this neighbor decreases.
III. Evaluation
Using ns-2, we study the performance of our
mechanism. and compare the three proposed
reputation functions. We simulate different static ad
hoc networks of
2
N nodes arranged as an N N
grid. The communication range is set such that each
node has 4 neighbors, with the exception of edge
nodes, which have 3 neighbors, and corner nodes,
which have 2 neighbors.
We randomly generate sets of 80, 100, 120, and
140 CBR (Constant Bit Rate) TCP flows, each
sending 500Kbits of data. For each set, 25
simulations are executed with flow source and
destination pairs selected at random for each run. We
rely on TCP acknowledgements and retransmissions
as indications of successful and failed packet delivery
events, respectively.
Our scheme is routing protocol independent, and
we choose to apply it to AODV for the current set of
simulations. AODVs specifications allow a node to
maintain a blacklist of neighbors [9]. Neighbors
identified as selfish (i.e. nodes whose reputation index
is below the threshold) are included in this blacklist.
All route requests (RREQs) and route replies (RREPs)
forwarded by such neighbors will be ignored.
Moreover, our protocol allows a node to trigger a
RREQ if it detects a route entry in its routing table
with a blacklisted next-hop neighbor, thus eliminating
all selfish nodes from routes. Eventually, selfish
nodes will be identified, eliminated from all routes,
and isolated from the network.
1. Comparing the proposed reputation functions
To compare the performance of the three
proposed schemes, we use a 4x4 topology with 3
selfish nodes, and an 8x8 topology with 5 selfish
nodes, as illustrated in figure 3. For each simulation
run, data is collected for selfish nodes exposure
(fraction of the neighbors of a selfish node that
identified it as such) and false positives (fraction of
links removed from the network due to a node falsely
identifying one of its neighbors as selfish). For all
simulation, we set constants n = 1 and m = 0.5.
A
B
C
D
E
F
G
A
B
C
D
E
F
G
Figure 3. Topologies used in our simulations: 8x8
with 5 selfish nodes (c, d, e, f, and g); the lower
left quadrant shows a 4x4 topology with 3
selfish nodes (a, b, and c)
a) Observations
Results for a 4x4 topology shown in figures 4 and
5 demonstrate that the exposure value is consistently
lower for REP than for the other two reputation
schemes tested. This is expected since REP is the
least aggressive scheme among all three. Our results
also show that DDSIR and HAFS achieve comparable
values of exposure. The results for false positives are
ordered based on the aggressiveness of the scheme,
with REP achieving the lowest values, followed by
DDSIR and then HAFS.
The results for an 8x8 topology are also shown in
figures 4 and 5. The exposure results are sorted based
Proceedings of the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous05)
0-7695-2375-7/05 $20.00 2005 IEEE
on the aggressiveness of the scheme: REP achieved
the lowest exposure, followed by DDSIR and HAFS.
For a higher number of flows the exposure of DDSIR
approached that of HAFS. On the other hand, the
results for false positives exhibit a different trend
from those for the 4x4 topology. HAFS was the most
aggressive and it had the highest number of false
positives. However, the number of false positives
generated by REP was either higher or comparable to
that of DDSIR. A discussion of these results follows.
b) Analysis
i) Effect of average number of hops on the
performance of HAFS
The simulation results for the 4x4 topology
indicate that HAFS and DDSIR achieve comparable
results in terms of exposure. This is somewhat
surprising, since HAFS is a more aggressive scheme
than DDSIR. However, looking at the results for the
8x8 topology, HAFS outperforms DDSIR in terms of
isolation. These results show the dependency of
the performance of HAFS on the average number of
hops that a flow traverses. The results also explain
why the effect of HAFS can not be seen for networks
with a short radius, such as our 4x4 topology (the
average number of hops for this topology is 2.67,
compared to 5.36 for the 8x8 topology).
It is also apparent from figure 5 that the exposure
results for DDSIR approach those of HAFS as the
traffic load increases. However, HAFS will reach the
same level of exposure faster than DDSIR, as shown
in figure 6. This also explains the comparable
exposure results of HAFS and DDSIR for the 4x4
topology, since 80 flows is a high traffic load for such
a network.
ii) Effect of asymmetric routes on the performance
of REP
Simulation results for REP on a 4x4 topology
showed the lowest false positives amongst the three
algorithms. However, the same results for the 8x8
topology showed unexpectedly high false positives for
REP as compared to DDSIR for some of the flow sets
simulated. We noticed an increase in the number of
asymmetric routes with REP as compared to DDSIR.
Since in our protocol symmetric routes lead to a more
accurate assessment of neighbors cooperation, such
an increase in the number of asymmetric routes
resulted in an increase in the number of false
positives.
Figure 4. Comparison of false positives
for the 3 proposed schemes
Figure 5. Comparison of exposure
for the 3 proposed schemes
Figure 6. Comparing the 3 schemes based on
packets dropped by selfish nodes at each level of
exposure. (Results shown are for 120 flows in an
8x8 topology. Similar trend was seen for all other
simulations)
0.0000
0.0500
0.1000
0.1500
0.2000
0.2500
0.3000
Comparison of Proposed Algorithms
False Positives
80 Flows 100 Flows 120 Flows 140 Flows
80 Flows 0.0230 0.0565 0.0378 0.1964 0.2182 0.1527
100 Flows 0.0391 0.0948 0.0491 0.1927 0.2291 0.1455
120 Flows 0.0648 0.1135 0.0578 0.2073 0.2545 0.1855
140 Flows 0.0709 0.1430 0.0683 0.2509 0.2836 0.1818
8X8 DDIR 8X8 HAFS 8X8 REP 4X4 DDIR 4X4 HAFS 4X4 REP
False positives
0.0000
0.1000
0.2000
0.3000
0.4000
0.5000
0.6000
0.7000
0.8000
0.9000
1.0000
Comparison Of Proposed Algorithms
Exposure
80 Flows 100 Flows 120 Flows 140 Flows
80 Flows 0.3820 0.5940 0.1580 0.8883 0.8667 0.6000
100 Flows 0.6360 0.8140 0.2800 0.8917 0.9167 0.6867
120 Flows 0.8080 0.8920 0.3360 0.9433 0.9300 0.6933
140 Flows 0.9260 0.9520 0.4700 0.9667 0.9683 0.7517
8X8 DDIR 8X8 HAFS 8X8 REP 4X4 DDIR 4X4 HAFS 4X4 REP
Exposure
Proceedings of the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous05)
0-7695-2375-7/05 $20.00 2005 IEEE
Based on these results, we adopted DDSIR for
our reputation function, as it consistently generated
low false positives and high exposure.
2. Impact on Network Goodput
Using simulations, we calculated the average
network goodput in a network with selfish nodes but
no reputation mechanism (defenseless network), and
another with no selfish nodes and no reputation
mechanism in place (safe network). We use the 8x8
topology with 5 selfish nodes simulation setup
described previously. Our simulation results
presented in figure 7 show, as expected, that DDSIR
achieves higher goodput than obtained in a
defenseless network. A defenseless network will
experience a high number of retransmissions and a
high number of flows (around double the number
observed in DDSIR) that were unable to deliver any
packets to their intended destinations. This is due to
the presence of selfish nodes in the network that:
- Drop many packets, resulting in timeouts and
high retransmission rates for these flows; and
- Affect the establishment of credible routes to
their intended destinations.
Our mechanism was able to avoid such problems by
isolating selfish nodes from all routes, resulting in a
higher goodput. The presence of selfish nodes
decreases goodput by over 11% when no reputation
mechanism is employed, while our mechanism limits
that decrease to less than 5.5%.
3. Effect of Mobility
In order to asses the effect of node mobility on the
performance of the proposed scheme, we ran a
number of ns-2 simulations using the random way
point mobility model. We used three sets of
simulations of 64 nodes with varying average node
speed and pause time. For each simulation, we
calculated the exposure of selfish nodes and the
number of packets dropped by each selfish node for
each of its neighbors. Our results show that the
average number of packets dropped by a selfish node
per neighbor decreased as the average node speed
increases (figure 8), which led to slower isolation
(table 2). This is expected due to the decrease of the
average interaction time between nodes as their speed
increases. As a result, a node will forward fewer
packets through a single neighbor. Thus, the impact
of the selfish behavior of a node is minimized. This
leads to the conclusion that, for mobile nodes,
isolation is inversely proportional to speed and
mobility tends to reduce the impact of selfishness on
the network.
Table 2.
Effect of average node speed and pause
time on isolation of selfish nodes.
Each value represents percentage of selfish nodes
isolated averaged over 10, 600-sec. simulations.
Pause/
Avg.Speed
0.1 meter/s 5 meter/s 15 meter/s
Pause 0 24% 1% 0.35%
Pause 1 28% 0.97% 0.21%
Pause 2 29% 0.5% 0.42%
4. Improvements to Current Mechanism
a) Storage overhead
The fact that nodes have to store packet traces in
order to distinguish between delivered and
retransmitted packets results in storage overhead. We
ran a number of simulations in order to observe the
impact of limiting the size of the lookup table on the
overall protocol performance (isolation time). We
tested against two heuristics:
Use a FIFO lookup table of 1000 entries; and
Assign an expiration time per table entry, which
is based on estimated flow round-trip time (RTT)
at each node. Upon timing out, the entry is
eliminated from the lookup table.
Our results indicate that there is a tradeoff
between the lookup table size and the isolation time.
By setting an upper limit on the lookup table size,
there was a slight increase in the isolation time.
As stated earlier, the size of the lookup table
could be further minimized by using hashing
algorithms. For 1000 table entries, the size of the
table is about 20Kbytes. By using a hash value of
2bytes (1/2
16
collision probability), the table size
could be further reduced to 2Kbytes.
b) Reliance on TCP
As the protocol relies on acknowledgement
produced by the destination, there is the question of
its applicability to flows employing UDP. We believe
that we can rely on some application layer end-to-end
acknowledgement mechanism for such scenarios,
such as provided by the Real-Time Streaming
Protocol (RTSP).
Proceedings of the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous05)
0-7695-2375-7/05 $20.00 2005 IEEE
Figure 7. Impact of the use DDSIR
on the network goodput
Effect of Mobility on Selfishly Dropped Packets
100
150
200
250
300
350
Pause Time in Seconds
P
a
c
k
e
t
s
D
r
o
p
p
e
d
0.5 meters/s 5 meters/s 15 meters/s
0.5 meters/s 277.9 313.14 308.5
5 meters/s 128.96 138.58 137.8
15 meters/s 117.02 124.52 126.04
pause 0 pause 1 pause 2
Figure 8. Effect of average node speed and pause
time on packets dropped by selfish nodes
Figure 9. An ad hoc-network with
colluding nodes (B and X)
5. Possible Attacks
Since our mechanism was designed to handle
primarily selfish behavior, it is susceptible to a
number of malicious attacks. We plan to investigate
possible extensions to this work, including
mechanisms for providing authentication,
confidentiality, and message integrity in order to
deter, detect, and isolate malicious behavior.
One of the advantages of our mechanism, as
compared to other mechanisms, is its robustness to
collusion. Schemes that rely on sharing reputation
information require intermediate nodes to inform
other nodes in the network about a neighbors
selfish/malicious behavior. Consider the simple ad
hoc network shown in figure 9. If nodes B and X are
in collusion, node B could either not broadcast
information regarding bad behavior by X (a problem
in schemes that only maintain negative reputation
values), or falsely report good behavior by X (a
problem in schemes that increase reputation based on
positive reporting). Since our mechanism does not
involve exchange of reputation information, it is
robust against colluding nodes.
IV. Related Work
The use of a reputation scheme to judge a nodes
intent is one of the techniques adopted to detect and
isolate selfish nodes in an ad hoc network. Different
reputation mechanisms appear in the literature. We
can broadly classify these into two categories:
1. Mechanisms in which nodes exchange reputation
among themselves; and
2. Mechanisms in which nodes independently assess
their neighbors reputation based on direct
interactions.
A large number of schemes [1] [2] [3] [4] [5] [7]
[8] belong to the first category, with varying
implementations. One advantage of such schemes
could be their quick convergence in detecting node
misbehavior, especially in a large ad hoc network, due
to increased information regarding a particular nodes
behavior. However, this approach has two potential
drawbacks: they often assume that nodes that send
reputation information about their peers are
themselves trustworthy; and they are subject to
collusion among nodes that misreport reputation
information. The algorithm proposed in [6] belongs to
the second category and deals with establishing
reputation only via direct interactions with other
nodes. This is similar in concept to our proposed
mechanism, but the analysis and inferences reached
are limited as compared to the work reported here.
In schemes based on exchange of reputation
information, the reputation index a node assigns to
others in the network is based on a combination of
directly observed behavior (direct interaction) and
reported behavior (indirect interactions). In order to
overcome the problem of trust in the reporting of
reputation information, [1] and [5] propose an
approach that maintains a reputation value for every
function in the ad hoc network, including the
F
S
B
X
D
L
M
C
P
E
A
F
S
B
X
D
L
M
C
P
E
A
Proceedings of the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous05)
0-7695-2375-7/05 $20.00 2005 IEEE
reporting function itself. The information obtained
from the various reporting nodes is then individually
weighted based on the reputation of the reporting
node. This solution addresses the problem of trusting
indirectly observed behavior, but introduces
complexity in maintaining different reputation values
for each network functionality. It also does not fully
address the problem of collusion. Two malicious
nodes, say A and B, can mount a denial of service
attack where A systematically reports positive
reputation information about B, ensuring that B
remains in the routing tables for other nodes in the
network, while B systematically drops any packets
routed through it. Such collusion scenarios are
difficult to prevent unless the reputation mechanism
relies primarily on assessing reputation based on
direct interaction with other nodes, as is the case of
the mechanism reported in this paper.
Both [2] and [4] rely on nodes operating in the
promiscuous mode in order to assess whether their
neighbors are correctly forwarding packets. However,
it is difficult to constantly switch the network
interface between the transmit/receive and
promiscuous modes. In addition, the wireless nature
of the medium makes the method error prone. Our
reputation scheme relies on feedback from the
destination to assess node behavior and, therefore, the
interfaces do not have to be switched to a
promiscuous mode of operation.
Our reputation mechanism, though developed
independently, is similar in some respects to the work
reported in [6]. In [6], only a single reputation
function (simple increment/decrement by a constant)
is used, and its effectiveness in the fast isolation of
selfish nodes or the reduction of false positives is not
reported. Our mechanism uses more sophisticated
reputation functions and we provide a detailed
comparative analysis of three heuristics for the
selection of an appropriate reputation function. We
demonstrate that the reputation function has a major
impact on the node isolation time and the percentage
of false positives. A focus of our current research is
the optimization of the reputation function. Another
major difference is the impact of mobility on isolating
selfish nodes. We evaluated our work under different
mobility scenarios and observed using simulation that
a highly mobile environment leads to a higher
isolation time.
V. Conclusions and Future Work
In this paper, we proposed and described the design
and evaluation of a reputation-based mechanism that
isolates selfish nodes in an ad hoc network. Our
results indicate that the mechanism is successful in
achieving fast isolation of selfish nodes while
maintaining false positives at a reasonably low level.
We are currently investigating extensions to the
protocol to detect and isolate various forms of
malicious behavior emphasizing autonomous
decisions by individual nodes. We are also
interested in investigating the effect of congestion on
the protocols performance. Additionally, we will
explore reputation rebuilding mechanisms, which
allow a node that was labeled selfish and isolated
from the network to be re-evaluated and reinstituted
into the network.
VI. References
[1] P. Michiardi and R. Molva, CORE: A collaborative
reputation mechanism to enforce node cooperation in
mobile ad hoc networks, Proceedings of the 6th Joint
Working Conference on Communications and Multimedia
Security, September 2002, pp. 107-121.
[2] S. Buchegger and J.Y. LeBoudec, Performance analysis
of the CONFIDANT protocol: cooperation of nodes
fairness in dynamic ad hoc networks, Proceedings of the
ACM MobiHoc, June 2002.
[3] P. Dewan and P. Dasgupta, Trusting routers and relays
in ad hoc networks, Proceedings of the International
Conference on Parallel Processing Workshops, October
2003, pp. 351-359.
[4] S. Marti et al., Mitigating routing misbehavior in
mobile ad hoc networks, Proceedings of Sixth Annual
IEEE/ACM Intl. Conference on Mobile Computing and
Networking, April 2000, pp. 255-265.
[5] J. Liu and V. Issarny, Enhanced reputation mechanism
for mobile ad hoc networks, Proceedings of the 2nd Intl.
Conference on Trust Management, April 2004.
[6] P. Dewan, P. Dasgupta and A. Bhattacharya, On using
reputations in ad hoc networks to counter malicious nodes,
Proceedings of the 10th Intl. Conference on Parallel and
Distributed Systems, July 2004, pp. 665-672.
[7] S. Buchegger and J.Y. LeBoudec, The effect of rumor
spreading in reputation systems for mobile ad hoc
networks, Proceedings of the Workshop on Modeling and
Optimization in Mobile, Ad hoc and Wireless Networks,
March 2003.
[8] Z. Despotovic and K. Aberer, A probabilistic approach
to predict peers performance in P2P networks,
Proceedings of the Intl. Workshop on Cooperative
Information Agents, September 2004.
[9] C. Perkins, E. Belding-Royer and S. Das, Ad hoc On-
demand Distance Vector (AODV) routing, IETF RFC
3561, July 2003; www.faqs.org/rfcs/rfc3561.html.
[10] P. Michiardi and R. Molva, Simulation based analysis
of security exposures in mobile ad hoc networks,
Proceedings of the European Wireless Conference, February
2002.
Proceedings of the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous05)
0-7695-2375-7/05 $20.00 2005 IEEE