This paper presents a simple but efficient scheme incorporating a reputation-based approach and a cross-layer approach, called the SIM scheme, for maintaining reliable connectivity and high performance in ad-hoc wireless networks. The SIM scheme incorporates the following two things: an ad-hoc routing scheme with a reputation-based approach exploiting the game theory concept based on an evolutionarily stable strategy, and a cross-layer approach between the network layer and the transport layer employing a reputation-based approach.
In traditional ad-hoc routing protocols, dynamic source routing (DSR)  and ad-hoc on demand distance vector (AODV) , mobile nodes need to fully cooperate with other mobile nodes as a function of routing and forwarding packets. Unfortunately, when some mobile nodes in ad-hoc wireless networks become selfish nodes to save power, network throughput is dramatically decreased. Additionally, transport protocols may perform poorly due to their inability to distinguish packet losses caused by network congestion from those attributed to intended packet drops by selfish nodes. In this paper, we consider a reputation scheme exploiting the game theory concept based on an evolutionarily stable strategy, called the SIM scheme (a"SIMple" but efficient scheme incorporating a reputation-based approach and a cross-layer approach). Mobile nodes exploiting the SIM scheme monitor and rate the behavior of other mobile nodes in routing and forwarding packets in order to cope with selfish nodes in ad-hoc wireless networks.
Several trust-based approaches have been proposed to reduce the impact of selfish nodes in various networks [3-8]. In particular, the reputation-based cooperation mechanisms presented in [3-5] exploit the reputation evaluation of the mobile nodes derived from the trust model to decide which of them to punish. Additionally, game theory  provides us with a method for analyzing an ad-hoc wireless network where selfish and cooperative mobile nodes coexist. In game theory, the best action for each individual decision maker can be found. The game whose objective goal is to isolate selfish mobile nodes belongs to a repeated noncooperation game, where each mobile node takes selfishness into account. The trust-based approach presented in  evaluates mobile nodes’ behavior in terms of a non-cooperative game. The packet forward strategy presented in  is that each mobile node chooses the action that maximizes its payoff and adjusts the packet forward strategy through the genetic algorithm. However, the genetic algorithm has a heavy computational burden. The work addressed in  models an ad-hoc network by a cooperative game, where a group of mobile nodes interacts in order to provide packet routing and forwarding services. In the cooperative game, strategies are negotiated and agreed among all the mobile nodes to form a coalition, set up a routing path, and forward packets over the routing path. Consequently, all mobile nodes in the cooperative game are required to negotiate and adopt the agreed strategy but do not take account of misbehaving node issues including no forwarding, free riding, and false feedback.
The SIM scheme proposed in this paper considers three performance deterioration factors in ad-hoc wireless networks, which are no forwarding, free riding, and false feedback, caused by selfish nodes in ad-hoc wireless networks. The performance degradation by no forwarding is that intermediate mobile nodes between source and destination mobile nodes do not forward the received packet to the next hop but drop it. Since this problem has occurred at intermediate mobile nodes, the source node cannot directly detect whether a mobile node is a selfish node or not. The performance degradation by free riding results from free riders, which take advantage of ad-hoc networks without contributing to them. The performance degradation by false feedback results from liars in ad-hoc wireless networks. Liars respond to a successful transaction with a bad reputation or a misbehaving transaction with a good reputation.
In previous research work, the collaborative reputation mechanism  was proposed as a reputation technique in order to enforce cooperation among mobile nodes and to prevent passive denial of service attacks due to node selfishness. The cooperation mechanism of mobile nodes presented in  employs a reputation system in order to isolate selfish nodes. The mechanism presented in  does not consider a liar that generates false feedback to be a major weakness. The approach presented in  only detects a liar by the timeout and revocation of reputation values; therefore, it is not robust to collaborative attacks such as a false feedback problem. The reputation scheme presented in assumes that mobile nodes do not lie when sharing their network observations with other mobile nodes and it ignores possible mobile node collusion when aggregating the reputation information from other mobile nodes.
In this paper, the proposed SIM scheme intends to cope with three misbehaviors of selfish nodes - no forwarding,free riding, and false feedback - through a reputation-based approach exploiting a game theory concept based on an evolutionarily stable strategy. Consequently, the SIM scheme leads to maintaining reliable connectivity and high performance in ad-hoc wireless networks. The SIM scheme also attempts to take advantage of a cross-layer approach, where the reputation knowledge dealt with in the network layer is shared with the transport layer. Such a cross-layer approach is useful for improving the efficiency of end-to-end communication performance among mobile nodes in ad-hoc wireless networks. Therefore, the proposed SIM scheme exploits a cross-layer approach for high network performance by interacting with the network layer and the TCP running on the transport layer. This paper is organized as follows. Section II presents the SIM scheme. In Section III, the SIM scheme is evaluated. Section IV concludes this paper.
The idea of an evolutionarily stable strategy addressed by [12, 13] is that conflict situations will often arise because individual members of many different species have similar needs, and resources are limited. It is especially applicable to the study of selfish nodes in ad-hoc wireless networks. In such a conflict situation, there are several different behavior strategies that an individual mobile node might follow. To resolve a conflict situation, we exploit a game-theoretic model.
According to the selfish gene model presented in , a pure strategy is an
Mobile nodes of ad-hoc wireless networks will engage in repeated random conflicts over packet transmission to the destination node and packet forwarding to the next hop. In the simple evolutionarily stable strategy model, each conflict is between two kinds of nodes, selfish and virtuous nodes in ad-hoc wireless networks. Mobile nodes are typically constrained by power and computing resources. Thus, a selfish node is not willing to use its computing and energy resources to forward packets that are not directly beneficial to it even though it expects virtuous nodes to forward packets on its behalf. A selfish node uses the network but does not cooperate, saving battery life for its own communications. In this game, the winner who successfully transmits a packet to the destination will get 10 points for taking advantage of the network while the loser who fails to transmit a packet to the destination will get -20 points for being injured calculated as 2 (for power consumption) times -10 (for a packet loss). If both relay nodes adopt the selfish behaving strategy during random periods, they will contend until one mobile node finally takes advantage of the network and the other mobile node is injured. If a selfish node meets a virtuous node, the selfish node will take advantage of the network without sacrificing its battery power and there will be no injury. If two virtuous nodes meet, there will be no injury but both will get -2 points owing to power consumption, waiting for a packet to be processed and delivered.
Table 1 shows the payoff matrix of the evolutionarily stable strategy based on the game model where there are two players, mobile node
In Table 1, a population of selfish nodes is not evolutionarily stable because virtuous nodes would be advantages, wining an average of 0 points per encounter compared to an average of -5 points for selfish nodes. Similarly, a population of virtuous nodes is not an evolutionarily stable strategy. A small group of selfish nodes would decrease the population size of virtuous nodes. In Table 1, a mixed strategy consisting of the probability
of being a selfish node and the probability
of being virtuous node is an evolutionarily stable strategy for this game. The strategy leading to this outcome is the best response to each other. Mobile node
We now introduce a new possible node type, a cheating node. The cheating node first pretends to be a selfish node and continues to be a selfish node if its opponent remains a virtuous node. If its opponent becomes a selfish node, it stops being a selfish node. Table 2 shows the payoff matrix including the cheating node where there are two players,mobile node
of being a selfish node and the probability
of being cheating node is the best response of the nodes to each other for this game. Selfish and cheating nodes behave selfishly, looking out for only their own node’s interest. Namely, selfish and cheating nodes behave maliciously, seeking to ruin network performance. In Table 2, a great deal of greedy and cowardly behavior may occur in ad-hoc wireless networks. To cope with the cheating node, we introduce an additional node type, a self-defense node. The self-defense node first behaves like a virtuous node. However, if the selfdefense node is attacked by a selfish node, it changes into a selfish node with reasonable force.
Table 3 shows the payoff matrix including the self-defense node. In Table 3, the pure self-defense strategy is an evolutionarily stable strategy because the diagonal entry for the pure strategy, the self-defense strategy of both
In the previous section, the problem of routing in an ad-hoc wireless network is well explained by a game theory concept based on the evolutionarily stable strategy. Traditional ad-hoc wireless routing protocols are composed of routing and forwarding phases. Unfortunately, some selfish nodes might intend not to forward packets in order to save resources for their own use. To detect selfish nodes, an ad-hoc routing protocol enables a mobile node to determine the trustworthiness of other mobile nodes with respect to reliable packet delivery by combining trustworthiness information directly obtained from its neighbor mobile nodes and trustworthiness information indirectly obtained from other mobile nodes. Hence, in ad-hoc wireless networks where individual mobile nodes are expected to perform services on behalf of other mobile nodes, the question of trust and reputation management becomes important.
In the analysis results from section II-A, the pure self-defense node strategy is an evolutionarily stable strategy. We apply the concept of the self-defense node strategy to the SIM scheme proposed in this paper. The basic idea of the SIM scheme is for each mobile node to assign a reputation value to all other mobile nodes with which it comes into contact in an ad-hoc wireless network. As a mobile node’s perceived reputation decreases, its neighbors may refuse to perform service for it as a self-defense strategy, leading to its gradual exclusion from the network. The proposed SIM scheme evaluates the trust between two neighbor nodes from first-hand observation data. After each mobile node forwards a packet to the next hop node, it monitors and rates the behavior of the next hop node in forwarding, and responds according to its opinion about the next hop node. The opinion that a mobile node has of another is called reputation. Additionally, the SIM scheme uses reputation measurement in the routing phase to detour selfish nodes and encourage the cooperation of mobile nodes. A routing path between a source node and its destination node is found via the SIM scheme exploiting reputation management. The reputation management of the SIM scheme technically deals with how and what evidence is gathered for the trustworthiness of each mobile node, how trustworthiness is calculated, and how trust values are updated to maintain a reliable ad-hoc wireless network.
We first describe the reputation management of the SIM scheme used in the network layer. The mobile node
The confidence value of mobile node
We now describe the procedure of deriving
In Eq. (2), if the reputation values of the previous transaction (
If mobile node
In Eq. (4),
The value of
Generally, ad-hoc wireless networks consider the node mobility problem. However, due to high error rates and low bandwidth in the wireless domain, there obviously needs to be a higher layer abstraction that would perform three control mechanisms: error control, congestion control, and flow control.
The classical transport protocol, TCP, has been widely exploited to guarantee in-order and reliable delivery in wired networks. TCP is a reliable, end-to-end, and connection-oriented transport layer protocol that provides a byte-stream-based service. Since the transition to the wireless domain should be compatible with the existing infrastructure, there is a need for modifications of the TCP protocol. This is the correct approach, rather than resorting to a completely new set of protocols. We first analyze interdependencies among communications layers, which are the IEEE802.11-based physical and link layers, the network layer, and the TCP-based transport layer to determine the correct approach. As illustrated in Fig. 1, the TCP in ad-hoc wireless networks performs poorly due to its inability to distinguish packet losses caused by network congestion from those attributed to packet drops intended by selfish nodes. To resolve this problem, we propose two feasible but independent TCP approaches exploiting the SIM scheme.One is that we apply the concept of trustworthiness of a forwarding path to the TCP fast recovery technique. The other approach is that we apply the concept of trustworthiness of a forwarding path to the TCP rate adaptive congestion control. In the TCP rate adaptive congestion control exploiting the trustworthiness value described in section II-B, a mobile node controls the TCP sending rate based on the trustworthiness value of a forwarding path before many packets are dropped by selfish nodes. For example, the trustworthiness value of a forwarding path at transaction
Eq. (5) implies an implicit notification of packet drops by a selfish node over the end-to-end forwarding path. Note that the TCP sets the value of the SLOW START THRESHOLD to half of the current CONGESTION WINDOW value when the third duplicate ACK is received . In the TCP rate adaptive congestion control exploiting the reputation value, the TCP congestion window is decreased as follows:
The first term in Eq. (6) represents the additive increase part of the TCP, where the TCP congestion window size will be increased by one per the round trip time. The second term in Eq. (6) represents the multiplicative decrease part. When a packet drop occurs, it halves the TCP congestion window size at the instant of the packet loss as a multiplicative decrease. We assume that packet drops will be caused by selfish nodes not network congestion. The packet loss rate is affected by TCP throughput and TRUSTWORTHINESS PATH VALUE. The value of the TRUSTWORTHINESS PATH VALUE is determined by the trustworthiness value of a forwarding path.
We evaluated the performance verification of the SIM scheme on the NS-2 simulator. In the simulation, we deployed 50 mobile nodes randomly in a rectangular field (1,000 × 500 m). Each mobile node has an omni-directional antenna with a range of 100 m, and the random-way-point mobility model  is used to simulate the movements of the mobile nodes. Mobile nodes have pause times at either 10 or 5 seconds. The movements of the mobile nodes result in disconnecting the established routing paths. We select some nodes to be activated as selfish nodes. The percentage of selfish nodes ranges from 0% to 80%. With a probability of 0.3, they randomly misbehave in one of the following ways: no forwarding, free riding, and false feedback, which are caused by selfish nodes in ad-hoc wireless networks. During the simulation time of 20,000 seconds, a constant bit rate (CBR) of 50 connections was active and each mobile node transmited a 10 Kbps stream of data to its destination node. We ran AODV and DSR protocols with the reputation management of the SIM scheme. Table 4 shows the performance of the proposed SIM scheme.
In Table 4, the packet loss ratio increases as the percentage of selfish nodes increases. However, when the reputation management exploited in the SIM scheme is incorporated into each of two routing protocols (AODV and DSR protocols), they achieve a lower packet loss ratio than their original versions. As described in Table 4, the poor performance of the DSR protocol is mainly attributed to aggressive use of caching and the lack of any mechanism for removing stale routes or determining the freshness of routes when multiple choices are available . The connection setup delay of the DSR protocol is higher than the table-driven protocol, the AODV protocol. In order to maintain routes using the AODV protocol, the AODV protocol normally requires that each mobile node periodically transmit a HELLO message with a default rate of once per second. Failure to receive three consecutive HELLO messages from a neighbor is taken as an indication that the link to the neighbor in question is down. In our experimentation, we determine that a link breaks by observing three consecutive HELLO messages.
Table 5 shows the normalized TCP throughput over the ADOV protocol incorporating the SIM scheme. We compare the performance of the original TCP to the performance of the TCP fast recovery with the SIM scheme, and the TCP rate adaptive congestion control with the SIM scheme over varying selfish node proportions. The TCP regards packet drops by selfish nodes as network congestion due to the generic limitations of TCP in ad-hoc wireless network environments. Then the original TCP starts to halve the congestion window to avoid network congestion. In case of the TCP fast recovery with the SIM scheme, it can detect packet drops by selfish nodes implicitly and recover the TCP congestion window quickly up to the congestion window size just before packets drop. In case of the TCP rate adaptive congestion control with the SIM scheme, it controls its TCP sending rate in order to dynamically adapt the transient status of networks and minimize the number of packets dropped by selfish nodes. This does not result in the unnecessary decrease of the congestion window size. The TCP rate adaptive congestion control with the SIM scheme achieves better performance than the original TCP and the TCP fast recovery with the SIM scheme.
We propose a SIM scheme for reliable connectivity and high performance in ad-hoc wireless networks. The SIM scheme incorporates a reputation-based approach exploiting a game theory concept based on an evolutionarily stable strategy, and a cross-layer approach exploiting the proposed reputation management. We measure the performance of the SIM scheme and experimental outcomes show that the SIM scheme achieves efficient performance in terms of a low packet loss ratio and high network throughput.