Standard

Sybil-Resistant Meta Strategies for the Forwarder's Dilemma. / Durmus, Yunus; Loukas, Andreas; Langendoen, Koen; Onur, Ertan.

2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems. ed. / R. Bilof. Piscataway, NJ : IEEE, 2014. p. 90-99 (SASO).

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Harvard

Durmus, Y, Loukas, A, Langendoen, K & Onur, E 2014, Sybil-Resistant Meta Strategies for the Forwarder's Dilemma. in R Bilof (ed.), 2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems. SASO, IEEE, Piscataway, NJ, pp. 90-99, 2014 IEEE 8th International Conference on Self-Adaptive and Self-Organizing Systems, London, United Kingdom, 8/09/14. https://doi.org/10.1109/SASO.2014.21

APA

Durmus, Y., Loukas, A., Langendoen, K., & Onur, E. (2014). Sybil-Resistant Meta Strategies for the Forwarder's Dilemma. In R. Bilof (Ed.), 2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems (pp. 90-99). (SASO). Piscataway, NJ: IEEE. https://doi.org/10.1109/SASO.2014.21

Vancouver

Durmus Y, Loukas A, Langendoen K, Onur E. Sybil-Resistant Meta Strategies for the Forwarder's Dilemma. In Bilof R, editor, 2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems. Piscataway, NJ: IEEE. 2014. p. 90-99. (SASO). https://doi.org/10.1109/SASO.2014.21

Author

Durmus, Yunus ; Loukas, Andreas ; Langendoen, Koen ; Onur, Ertan. / Sybil-Resistant Meta Strategies for the Forwarder's Dilemma. 2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems. editor / R. Bilof. Piscataway, NJ : IEEE, 2014. pp. 90-99 (SASO).

BibTeX

@inproceedings{81cccf63f1c8427787df33f77f33830b,
title = "Sybil-Resistant Meta Strategies for the Forwarder's Dilemma",
abstract = "Cooperation is the foundation of wireless ad hoc networks with nodes forwarding their neighbors' packets for the common good. However, energy and bandwidth constraints combined with selfish behaviour lead to collapsed networks where all nodes defect. Researchers have tried to incentivize or enforce the nodes for cooperation in various ways. However, these techniques do not consider the heterogeneous networks in which a diverse set of nodes with different cognitive capabilities exist. Furthermore, in ad hoc networks identity is a fuzzy concept. It is easy to forge multiple identities and hide defective behaviour. Moreover, the nature of the wireless medium is always ambiguous due to collisions, interference and asymmetric links. In all this uncertainty, having complete information about the intentions of the nodes and acting on it is not straightforward. Backed by evolutionary game theory and multi-agent systems research, we adapt and modify two meta strategies to embrace this uncertainty. These modified meta strategies, Win Stay Loose Shift and Stochastic Imitate Best Strategy, do not require strict identity information and only depend on nodes' own capabilities. Nodes monitor the traffic in their neighbourhood by using a two-hop overhearing method, and decide whether they should be cooperative or defective. We show that nodes are able to discover and use the best strategy in their locality and protect themselves against the exploitation by free riders who devise Sybil attacks by changing their identities.",
keywords = "Wireless Ad Hoc Networks, Forwarder’s Dilemma, Cooperation, Evolutionary Game Theory, Network Reciprocity, WinStay Loose Shift, Imitate Best Strategy",
author = "Yunus Durmus and Andreas Loukas and Koen Langendoen and Ertan Onur",
year = "2014",
month = "9",
day = "1",
doi = "10.1109/SASO.2014.21",
language = "English",
series = "SASO",
publisher = "IEEE",
pages = "90--99",
editor = "R. Bilof",
booktitle = "2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems",
address = "United States",

}

RIS

TY - GEN

T1 - Sybil-Resistant Meta Strategies for the Forwarder's Dilemma

AU - Durmus, Yunus

AU - Loukas, Andreas

AU - Langendoen, Koen

AU - Onur, Ertan

PY - 2014/9/1

Y1 - 2014/9/1

N2 - Cooperation is the foundation of wireless ad hoc networks with nodes forwarding their neighbors' packets for the common good. However, energy and bandwidth constraints combined with selfish behaviour lead to collapsed networks where all nodes defect. Researchers have tried to incentivize or enforce the nodes for cooperation in various ways. However, these techniques do not consider the heterogeneous networks in which a diverse set of nodes with different cognitive capabilities exist. Furthermore, in ad hoc networks identity is a fuzzy concept. It is easy to forge multiple identities and hide defective behaviour. Moreover, the nature of the wireless medium is always ambiguous due to collisions, interference and asymmetric links. In all this uncertainty, having complete information about the intentions of the nodes and acting on it is not straightforward. Backed by evolutionary game theory and multi-agent systems research, we adapt and modify two meta strategies to embrace this uncertainty. These modified meta strategies, Win Stay Loose Shift and Stochastic Imitate Best Strategy, do not require strict identity information and only depend on nodes' own capabilities. Nodes monitor the traffic in their neighbourhood by using a two-hop overhearing method, and decide whether they should be cooperative or defective. We show that nodes are able to discover and use the best strategy in their locality and protect themselves against the exploitation by free riders who devise Sybil attacks by changing their identities.

AB - Cooperation is the foundation of wireless ad hoc networks with nodes forwarding their neighbors' packets for the common good. However, energy and bandwidth constraints combined with selfish behaviour lead to collapsed networks where all nodes defect. Researchers have tried to incentivize or enforce the nodes for cooperation in various ways. However, these techniques do not consider the heterogeneous networks in which a diverse set of nodes with different cognitive capabilities exist. Furthermore, in ad hoc networks identity is a fuzzy concept. It is easy to forge multiple identities and hide defective behaviour. Moreover, the nature of the wireless medium is always ambiguous due to collisions, interference and asymmetric links. In all this uncertainty, having complete information about the intentions of the nodes and acting on it is not straightforward. Backed by evolutionary game theory and multi-agent systems research, we adapt and modify two meta strategies to embrace this uncertainty. These modified meta strategies, Win Stay Loose Shift and Stochastic Imitate Best Strategy, do not require strict identity information and only depend on nodes' own capabilities. Nodes monitor the traffic in their neighbourhood by using a two-hop overhearing method, and decide whether they should be cooperative or defective. We show that nodes are able to discover and use the best strategy in their locality and protect themselves against the exploitation by free riders who devise Sybil attacks by changing their identities.

KW - Wireless Ad Hoc Networks

KW - Forwarder’s Dilemma

KW - Cooperation

KW - Evolutionary Game Theory

KW - Network Reciprocity

KW - WinStay Loose Shift

KW - Imitate Best Strategy

U2 - 10.1109/SASO.2014.21

DO - 10.1109/SASO.2014.21

M3 - Conference contribution

T3 - SASO

SP - 90

EP - 99

BT - 2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems

A2 - Bilof, R.

PB - IEEE

CY - Piscataway, NJ

ER -

ID: 36675203