Incentive Mechanism for Cooperative Intrusion Response: A Dynamic Game Approach

作者: Yunchuan Guo , Xiao Wang , Liang Fang , Yongjun Li , Fenghua Li

DOI: 10.1007/978-3-030-22734-0_43

关键词: Nash equilibriumSequential gameBlock (data storage)Intrusion detection systemComputer securityGame theoryIncentiveComputer science

摘要: Multi-hop D2D (Device-to-Device) communication is often exposed to many intrusions for its inherent properties, such as openness and weak security protection. To mitigate the in time, one of significant approaches establish a Cooperative Intrusion Response System (CIRS) respond intrusion activities during data transmission. In CIRS, user equipments that act relays (RUEs) are assumed actively help destination nodes activities. However, this assumption invalid multi-hop because RUEs selfish unwilling spend extra resources on undertaking response tasks. address problem, game approach proposed encourage cooperate. detail, we formulate an incentive mechanism CIRS dynamic achieve optimal solution decide whether participate detection or not. Theoretical analysis shows only Nash equilibrium exists game. Simulations demonstrate our can efficiently motivate potential response, it also block propagation time.

参考文章(29)
Xu Chen, Brian Proulx, Xiaowen Gong, Junshan Zhang, Exploiting Social Ties for Cooperative D2D Communications: A Mobile Social Networking Case IEEE/ACM Transactions on Networking. ,vol. 23, pp. 1471- 1484 ,(2015) , 10.1109/TNET.2014.2329956
Jian Tang, Guoliang Xue, Weiyi Zhang, Interference-aware topology control and QoS routing in multi-channel wireless mesh networks mobile ad hoc networking and computing. pp. 68- 77 ,(2005) , 10.1145/1062689.1062700
Dejun Yang, Guoliang Xue, Xi Fang, Jian Tang, Crowdsourcing to smartphones Proceedings of the 18th annual international conference on Mobile computing and networking - Mobicom '12. pp. 173- 184 ,(2012) , 10.1145/2348543.2348567
Yu Zhang, Mihaela van der Schaar, Reputation-based incentive protocols in crowdsourcing applications international conference on computer communications. pp. 2140- 2148 ,(2012) , 10.1109/INFCOM.2012.6195597
Chee-Wooi Ten, Chen-Ching Liu, Govindarasu Manimaran, Vulnerability Assessment of Cybersecurity for SCADA Systems IEEE Transactions on Power Systems. ,vol. 23, pp. 1836- 1846 ,(2008) , 10.1109/TPWRS.2008.2002298
Xiang Zhang, Guoliang Xue, Ruozhou Yu, Dejun Yang, Jian Tang, You better be honest: Discouraging free-riding and false-reporting in mobile crowdsourcing 2014 IEEE Global Communications Conference. pp. 4971- 4976 ,(2014) , 10.1109/GLOCOM.2014.7037593
Chi Zhang, Jinyuan Sun, Xiaoyan Zhu, Yuguang Fang, Privacy and security for online social networks: challenges and opportunities IEEE Network. ,vol. 24, pp. 13- 18 ,(2010) , 10.1109/MNET.2010.5510913
Alfred V. Aho, Margaret J. Corasick, Efficient string matching: an aid to bibliographic search Communications of The ACM. ,vol. 18, pp. 333- 340 ,(1975) , 10.1145/360825.360855
Xiang Zhang, Guoliang Xue, Ruozhou Yu, Dejun Yang, Jian Tang, Keep Your Promise: Mechanism Design Against Free-Riding and False-Reporting in Crowdsourcing IEEE Internet of Things Journal. ,vol. 2, pp. 562- 572 ,(2015) , 10.1109/JIOT.2015.2441031
Yuanwei Liu, Lifeng Wang, Syed Ali Raza Zaidi, Maged Elkashlan, Trung Q. Duong, Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model international conference on communications. ,vol. 64, pp. 329- 342 ,(2016) , 10.1109/TCOMM.2015.2498171