Hit and Run: A Bayesian Game between Regular and Malicious Nodes in MANETs

In mobile ad hoc networks (MANETs), nodes can move freely. Besides conducting attacks to maximize their utility and cooperating with regular nodes to deceive them, malicious nodes get better payoffs with the ability to move. In this paper, we propose a game theoretic framework to analyze the strategy profiles for regular and malicious nodes. We model the situation as a dynamic Bayesian signaling game, and analyze and present the underlining connection between nodes' best combination of actions and the cost and gain of the individual strategy. Regular nodes consistently update their beliefs based on the opponents' behavior, while malicious nodes evaluate their risk of being caught to decide when to flee. Some possible countermeasures for regular nodes that can impact malicious nodes' decisions are pre- sented as well. An extensive analysis and simulation study shows that the proposed equilibrium strategy profile outperforms other pure or mixed strategies, and proves the importance of restricting malicious node's advantages brought by the flee option. I. INTRODUCTION Mobile ad hoc networks (MANETs) rely on collaboration between the participants to achieve the aimed functionalities. Their topologies dynamically change because of node move- ment. Nodes in MANETs usually have no pre-defined trust between each other. Moreover, all nodes tend to maximize their own utility (also referred to aspayoff ) in activities. Among existing research, different mechanisms (e.g. virtual currency, barter economy) have been developed to stimulate cooperation and mitigate nodes' selfish behavior. Besides regular nodes' selfish behavior, malicious nodes, which have different interests, also exist in the network. The common objective of malicious nodes is to maximize the damage to the network while avoiding being caught. Their utility comes from activities that disrupt the operation of the network and waste the resources of regular nodes. To counter malicious nodes and stimulate cooperation, reg- ular nodes monitor and continuously evaluate their neighbors. Certain criteria are set to distinguish a node's trust level towards others. Regular nodes will focus their resources on cooperating with neighbors they trust, decline requests from suspicious neighbors, and report when a neighbor is considered to be malicious. However, in this case, intelligent malicious nodes would elaborately choose a frequency at which they cooperate to deceive regular nodes. Moreover, in MANETs, malicious nodes have the strategy of fleeing to avoid punishment. Therefore, a malicious node can start its malicious behavior all over again with a clean history in a new location by fleeing before being caught. However, this additional strategy does not imply that malicious nodes should continuously hit and run, since fleeing is also associated with a cost (e.g. the energy spent to move to the selected destination). We can instinctively describe malicious nodes' optimal strategy as follows: cooperate to deceive reg- ular nodes' trust; attack to cause damage and maximize their own utility; flee before regular nodes accumulate enough evi- dence and decide to report. Now the critical questions become:

[1]  Lin Chen,et al.  Selfishness, Not Always A Nightmare: Modeling Selfish MAC Behaviors in Wireless Mobile Ad Hoc Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[2]  S. Buchegger,et al.  A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .

[3]  Alberto Blanc,et al.  Designing incentives for peer-to-peer routing , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[4]  Peng Liu,et al.  Incentive-based modeling and inference of attacker intent, objectives, and strategies , 2005, ACM Trans. Inf. Syst. Secur..

[5]  Jie Wu,et al.  Uncertainty Mitigation for Utility-Oriented Routing in Wireless Ad Hoc Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[6]  Ahmed Helmy,et al.  Modeling Time-Variant User Mobility in Wireless Mobile Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[7]  Vikram Srinivasan,et al.  Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[8]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[9]  Eitan Altman,et al.  Non-cooperative Forwarding in Ad-Hoc Networks , 2005, NETWORKING.

[10]  Drew Fudenberg,et al.  Game theory (3. pr.) , 1991 .

[11]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[12]  Levente Buttyán,et al.  Nash equilibria of packet forwarding strategies in wireless ad hoc networks , 2006, IEEE Transactions on Mobile Computing.

[13]  Peng Liu,et al.  Incentive-based modeling and inference of attacker intent, objectives, and strategies , 2003, CCS '03.

[14]  Jie Wu,et al.  Mobility Reduces Uncertainty in MANETs , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[15]  Xin Liu,et al.  SPREAD: Foiling Smart Jammers Using Multi-Layer Agility , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[16]  John S. Baras,et al.  Malicious Users in Unstructured Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[17]  Edgar A. Guest Selfishness , 1925 .

[18]  Cristina Comaniciu,et al.  A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.