Advertisement

Modeling and Analysis of Trust Management Protocols: Altruism versus Selfishness in MANETs

  • Jin-Hee Cho
  • Ananthram Swami
  • Ing-Ray Chen
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 321)

Abstract

Mobile ad hoc and sensor networks often contain a mixture of nodes, some of which may be selfish and non-cooperative in providing network services such as forwarding packets in order to conserve energy. Existing trust management protocols for mobile ad hoc networks (MANETs) advocate isolating selfish nodes as soon as they are detected. Further, altruistic behaviors are encouraged with incentive mechanisms. In this paper, we propose and analyze a trust management protocol based on the demand and pricing theory for managing group communication systems where system survivability is highly critical to mission execution. Rather than always encouraging altruistic behaviors, we consider the tradeoff between a node’s individual welfare (e.g., saving energy for survivability) versus global welfare (e.g., providing service availability) and identify the best design condition so that the system lifetime is maximized while the mission requirements are satisfied.

Keywords

Trust trust metrics trust management mobile ad hoc networks demand and pricing theory altruism selfishness 

References

  1. 1.
    Adams, W.J., Hadjichristofi, G.C., Davis, N.J.: Calculating a node’s reputation in a mobile ad hoc network. In: Proc. of the 24th IEEE Int’l Performance Computing and Communications Conf. (IPCCC 2005), Phoenix, AX, April 2005, pp. 303–307 (2005)Google Scholar
  2. 2.
    Aldebert, M., Ivaldi, M., Roucolle, C.: Telecommunications demand and pricing structure: an economic analysis. Telecommunication Systems 25(1-2), 89–115 (2004)CrossRefGoogle Scholar
  3. 3.
    Capra, L.: Toward a human trust model for mobile ad-hoc networks. In: Proc. of the 2nd UK-UbiNet Workshop. Cambridge University, Cambridge (May 2004)Google Scholar
  4. 4.
    Case, K.E., Fair, R.C.: Principles of Economics, 5th edn. Prentice-Hall, Englewood Cliffs (1999)Google Scholar
  5. 5.
    Cho, J.H., Swami, A., Chen, I.R.: Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks. In: 2009 IEEE/IFIP Int’l Symposium on Trusted Computing and Communications, Vancouver, Canada (August 2009)Google Scholar
  6. 6.
    Cho, J.H., Swami, A.: Towards trust-based cognitive networks: a survey on trust management for mobile ad hoc networks. In: 14th Int’l Command and Control Research and Technology Symposium, Washington D.C., USA (June 2009)Google Scholar
  7. 7.
    Falcone, R., Castelfranci, C.: Social trust: a cognitive approach. Trust and Deception in Virtual Societies, pp. 55–90. Kluwer Academic Publishers, Dordrecht (2001)Google Scholar
  8. 8.
    Josang, A., LoPresti, S.: Analyzing the relationship between risk and trust. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 135–145. Springer, Heidelberg (2004)Google Scholar
  9. 9.
    Li, M., Kamioka, E., Yanada, S.: Pricing to stimulate node cooperation in wireless ad hoc networks. IEICE Transactions on Communications E90-B (7), 1640–1650 (2007)Google Scholar
  10. 10.
    Marbach, P., Qiu, Y.: Cooperation in wireless ad hoc networks: a market-based approach. IEEE/ACM Transactions on Networking 13(6), 1325–1338 (2005)CrossRefGoogle Scholar
  11. 11.
    Miranda, H., Rodrigues, L.: Friends and foes: preventing selfishness in open mobile ad hoc networks. In: Proc. of the 23rd Int’l Conf. on Distributed Computing Systems Workshops, May 2003, pp. 440–445 (2003)Google Scholar
  12. 12.
    Moe, M.E.G., Helvik, B.E., Knapskog, S.J.: TSR: Trust-based secure MANET routing using HMMs. In: Proc. of the 4th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Vancouver, Canada, October 2008, pp. 83–90 (2008)Google Scholar
  13. 13.
    Papadimitriou, C.H.: Algorithms, games, and the Internet. In: Proc. of the 33rd Annual ACM Symposium on Theory of Computing, Hersonissos, Crete, Greece, July 2001, pp. 749–753 (2001)Google Scholar
  14. 14.
    Rappaport, P., Alleman, J., Taylor, L.D.: Household demand for wireless telephony: an empirical analysis. In: Proc. of the 31st Annual Telecommunications Policy Research Conf., Arlington, VA (September 2003)Google Scholar
  15. 15.
    Roughgarden, T.: Selfish routing and the price of anarchy. The MIT Press, Cambridge (2005)Google Scholar
  16. 16.
    Soltanali, S., Pirahesh, S., Niksefat, S., Sabaei, M.: An efficient scheme to motivate cooperation in mobile ad hoc networks. In: Int’l Conf. on Networking and Services (ICNS 2007), Athens, Greece, June 2007, pp. 98–103 (2007)Google Scholar
  17. 17.
    Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman key distribution extended to group communication. In: CCS 1996 Proc. 3rd ACM Conf. on Computer and Communications Security, New York, NY, USA, pp. 31–37 (1996)Google Scholar
  18. 18.
    Thomas, R.W., Friend, D.H., DaSilva, L.A., MacKenzie, A.B.: Cognitive networks: adaptation and learning to achieve end-to-end performance objectives. IEEE Communications Magazine: Topics in Radio Communications 44(12), 51–57 (2006)CrossRefGoogle Scholar
  19. 19.
    Virendra, M., Jadliwala, M., Chandrasekaran, M., Upadhyaya, S.: Quantifying trust in mobile ad-hoc networks. In: Proc. of the Int’l Conf. Integration of Knowledge Intensive Multi-Agent Systems (KIMAS), April 2005, pp. 65–70 (2005)Google Scholar
  20. 20.
    Wang, Y., Giruka, V.C., Singhal, M.: Truthful multipath routing for ad hoc networks with selfish nodes. Journal of Parallel and Distributed Computing 68(6), 778–789 (2008)CrossRefGoogle Scholar
  21. 21.
    Yan, L., Hailes, S.: Designing incentive packet relaying strategies for wireless ad hoc networks with game theory. In: IFIP Int’l Federation for Information Processing: Wireless Sensor and Actor Networks II, vol. 264, pp. 137–148 (2008)Google Scholar
  22. 22.
    Yilmaz, O., Chen, I.R.: Elastic threshold-based admission control for QoS satisfaction with reward optimization for servicing multiple priority classes in wireless networks. Information Processing Letters 109(15), 868–875 (2009)CrossRefMathSciNetGoogle Scholar
  23. 23.
    Zhao, D.: Access control in ad hoc networks with selfish nodes. Wireless Communications and Mobile Computing 6(6), 761–772 (2006)CrossRefGoogle Scholar
  24. 24.
    Zhang, Q., Agrawal, D.P.: Impact of selfish nodes on route discovery in mobile ad hoc networks. In: IEEE Global Telecommunications Conf. (GLOBECOM 2004), December 2004, vol. 5, pp. 2914–2918 (2004)Google Scholar

Copyright information

© IFIP 2010

Authors and Affiliations

  • Jin-Hee Cho
    • 1
  • Ananthram Swami
    • 1
  • Ing-Ray Chen
    • 2
  1. 1.U.S. Army Research LaboratoryComputational and Information Sciences Directorate 
  2. 2.Department of Computer ScienceVirginia Tech 

Personalised recommendations