A novel reputation computation model based on subjective logic for mobile ad hoc networks

https://doi.org/10.1016/j.future.2010.03.006Get rights and content

Abstract

Mobile ad hoc networks are deployed under the assumption that participating nodes are willing to forward other nodes’ packets. However, for civilian applications where nodes are not owned by a single entity but are profit-oriented independent agents, cooperation cannot be taken for granted. In this paper, we present a novel reputation computation model to discover and prevent selfish behaviors by combining familiarity values with subjective opinions. The familiarity value represents a node’s familiar degree with another individual node. In our model, a node that queries another’s reputation first accumulates subjective opinions from their common neighbors. The familiarity values are used to calculate the weighting factor that determines how much a node’s recommending opinion impacts on the reputation computation result. The utilization of this familiarity allows nodes to obtain opinions with lower uncertainty values, which helps nodes to recognize selfish nodes much earlier and can decrease the convergence time for isolating selfish nodes. We evaluate the performance of our model based on ns-2 simulations to analyze the impact of different parameters on the network performance. The simulation results show that our model outperforms the pure subjective logic-based model and achieves up to a 25% improvement in the convergence time.

Introduction

Mobile ad-hoc networks have been the subject of intense research efforts for the last several years. Such networks consist of a set of mobile nodes that act both as terminals and routers, and do not rely on any infrastructure to communicate. A source node communicates with distant destinations using intermediate nodes as relays. Minimal configuration and quick deployment make ad hoc networks suitable for emergent situations, natural disasters or military conflicts, and it can also be used for temporary networks for conferences or expeditions. Since forwarding data for other nodes can drain the battery of a node, for civilian applications where nodes are not owned by a single entity but are profit-oriented independent agents, cooperation cannot be taken for granted. Users that want to maximize their own welfare and do not contribute to the network are defined as selfish nodes or free riders [1]. For the existence of such selfish nodes in the network, it is necessary to develop incentive mechanisms that avoid nodes that behave selfishly.

Currently, the incentive mechanisms can be divided into two categories: credit-exchange systems and reputation-based systems. In credit-exchange schemes [2], [3], [4], [5], [6], [7], [8], [9], nodes are awarded credits for forwarding messages, and these credits can later be used by these nodes to stimulate others to cooperate. The proposed systems that rely on the use of tamper-proof hardware to store credit information may hinder their ability to find wide-spread acceptance. While the system with a central control requires an infrastructure, which limits its wide application. In reputation-based schemes [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], a node’s behavior is measured by its neighbors using a watchdog mechanism [21], [22], and nodes can be punished for non-cooperation. However, detecting whether a given node actually forwarded a packet is not possible due to unreliable transmission in wireless networks. So cooperative nodes sometimes are perceived as being selfish, which causes a retaliation situation that can potentially decrease the throughput of cooperative nodes. To deal with this issue, Jøsang and Hayward [23] proposed a method based on subjective logic for discovering trust networks between specific parties. Subjective logic uses subjective opinions to express subjective beliefs about the truth of propositions with degrees of uncertainty and Kane and Browne [24] successfully transplanted and applied subjective logic to a wireless network environment. However, in wireless networks, a node’s behavior may be observed differently over time due to low connection reliability or nodes’ selfishness. Also a high uncertainty value leads to a longer convergence time for cooperative nodes isolating selfish nodes, which may encourage selfish behaviors since a long convergence time could make selfish nodes get as much of the benefit that could compensate them for their isolation.

To overcome the above deficiencies, this paper presents a novel reputation computation model which combines familiarity values with subjective opinions. The familiarity represents a node’s familiar degree with another individual node. In our model, a node that queries another’s reputation first accumulates subjective opinions from their common neighbors; then it combines the recommended opinions into one reputation opinion. The familiarity value is used to calculate the weighting factor that determines how much a node’s recommending opinion impacts on the reputation computation result. The utilization of this familiarity allows nodes to obtain opinions with lower uncertainty values, which helps nodes to recognize selfish nodes much earlier and can decrease the convergence time for isolating selfish nodes. We evaluate the performance of our model based on ns-2 simulations to analyze the impact of different parameters on the network performance, and we also compare our model with two other reputation models. The simulation results show that our model outperforms the pure subjective logic-based model and achieves up to a 25% improvement in the convergence time.

The rest of this paper is organized as follows. We first discuss some preliminaries in Section 2. We present our familiarity-based reputation model in Section 3. In Section 4, we demonstrate the simulation scenarios, for which Section 5 gives the analysis and provides the results. Section 6 presents the concluding remarks.

Section snippets

Subjective logic

Subjective logic is a logic which operates on subjective beliefs about the world, and uses the term opinion to denote the representation of a subjective belief [25], [26]. The opinion denoted by wy:x is a tuple defined in (1). ωy:x(by:x,dy:x,uy:x,ay:x) where by:x[0.0,1.0] and dy:x[0.0,1.0] represent node y’s belief and disbelief in node x, respectively, uy:x[0.0,1.0] is y’s uncertainty on node x, and ay:x[0.0,1.0] is the relative atomicity. We also have the following relationship among by:x

Our model

Now we present our techniques to integrate familiarity into subjective logic based reputation computation model. In our model, we only discuss the case where there are selfish nodes in the network, which is different from the case with malicious nodes. We assume that every node has a unique identification in the network and cannot change their identification, and there is no discrimination when nodes interact with others in the network. When a node needs to send messages through one of its

Simulation model

Our model can be used for any type of service which need nodes cooperation in wireless networks, such as forwarding packets, to evaluate whether a node is cooperative or not. We used ns-2 for our simulation to study the performance of our model in a mobile wireless environment.

Performance evaluation

In this section, we analyze the impact of variation of parameters on the network. We compare our model against a traditional reputation computation model [28] and pure subjective logic-based reputation model proposed in [24], denoted by Familiarity-based Model (FM), Traditional Model (TM), and Uncertainty based Model (UM) in the following figures, respectively.

At present, a widely accepted model of computing trust and reputation is to use a linear trust computation approach [5], [14]. In such a

Conclusions

In this paper we studied how reputation-based mechanisms can help the network discover selfish nodes. We presented a novel reputation computation model which combines familiarity values with subjective opinions. In the reputation combination phase, each recommended opinion has its weight in affecting the combination result. The familiarity represents a node’s familiar degree with another individual node, and it is used to calculate the weighting factor that determines how much a node’s

Yining Liu received the B.A. degree in computer science from the Dalian University, Dalian, China, in 2007. He is currently pursuing the M.S. degree in computer science at Dalian University of Technology. His research interests include wireless networks and trusted computing.

References (30)

  • P. Michiardi et al.

    Analysis of coalition formation and cooperation strategies in mobile ad hoc networks

    Ad Hoc Networks

    (2005)
  • J.W. Lee et al.

    The performance of a watchdog protocol for wireless network security

    International Journal of Wireless and Mobile Computing

    (2007)
  • R. Krishnan, M.D. Smith, Z. Tang, R. Telang, The impact of free-riding on peer-to-peer networks, in: Proceedings of the...
  • L. Buttyán, J.-P. Hubaux, Enforcing service availability in mobile ad-hoc WANs, in: Proc. International Symposium on...
  • V. Srinivasan, P. Nuggehalli, C.F. Chiasserini, R.R. Rao, Energy efficiency of ad hoc wireless networks with selfish...
  • V. Srinivasan, P. Nuggehalli, C.F. Chiasserini, R.R. Rao, Cooperation in wireless ad hoc networks, in: Proc. IEEE...
  • S. Zhong, J. Chen, Y.R. Yang, Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks, in: Proc....
  • L. Buttyán et al.

    Stimulating cooperation in self-organizing mobile ad hoc networks

    ACM/Kluwer Mobile Networks and Applications

    (2003)
  • J. Crowcroft, R. Gibbens, F. Kelly, S. Östring, Modelling incentives for collaboration in mobile ad hoc networks, in:...
  • L. Anderegg, S. Eidenbenz, Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with...
  • F. Wu, T. Chen, S. Zhong, L.E. Li, Y.R. Yang, Incentive-compatible opportunistic routing for wireless networks, in:...
  • S. Marti, T.J. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proc. Sixth...
  • P. Michiardi, R. Molva, CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc...
  • S. Buchegger, J.-Y. Le Boudec, Performance analysis of the CONFIDANT protocol (cooperation of nodes: fairness in...
  • S. Bansal, M. Baker, Observation-based cooperation enforcement in ad hoc networks, Technical Report, Stanford...
  • Cited by (87)

    View all citing articles on Scopus

    Yining Liu received the B.A. degree in computer science from the Dalian University, Dalian, China, in 2007. He is currently pursuing the M.S. degree in computer science at Dalian University of Technology. His research interests include wireless networks and trusted computing.

    Keqiu Li is a Professor at the School of Computer Science and Engineering, Dalian University of Technology, China. He got both his bachelors and masters degree from Dalian University of Technology, China in 1994 and 1997, and his doctors degree from the Japan Advanced Institute of Science and Technology in 2005. He also has five-years experience in industry. Keqiu Li’s research interests include Web technology, distributed computing, computer networks, grid computing, and trusted computing. He has published more than 80 technical papers in international journals and conferences, such as IEEE TPDS, ACM TOIT, and ACM TOMAPP. He is on the committee board for several internationals and serves as the organization chair/program chair/publication chair/program committee member for a couple of international conferences. He is a member of IEEE.

    Yingwei Jin is a Professor at the School of Management, Dalian University of Technology, China. He got his doctor degree from Dalian University of Science and Technology in 2005.Yingwei Jin’s research interests include computer network and security, Internet technology, and artificial intelligence.

    Dr. Yong Zhang was born in 1975 in Langzhong City, Sichuan province, PR China. He received his M.S. in computer science from University of Shanghai for Science and Technology in 2002, and received his Ph.D. in computer science from Dalian University of Technology in 2008. Dr. Zhang’s research interests are focused on trusted computing, wireless sensors networks, intelligence computing. E-mail addresses: [email protected].

    Wenyu Qu a Professor at the School of Information and Technology, Dalian Maritime University, China. She got her bachelor and master degree both from Dalian University of Technology, China in 1994 and 1997, and her doctor degree from Japan Advanced Institute of Science and Technology in 2006. She was a lecturer in Dalian University of Technology from 1997 to 2003. Wenyu Qu’s research interests include mobile agent-based technology, distributed computing, computer networks, and grid computing. Wenyu Qu has published more than 50 technical papers in international journals and conferences. She is on the committee board for a couple of international conferences.

    This work is supported by NSFC under grant nos of 90718030, 60973116, and 90818002.

    View full text