Coexistence with Malicious Nodes: A Game Theoretic Approach

被引:17
|
作者
Wang, Wenjing [1 ]
Chatterjee, Mainak [1 ]
Kwiat, Kevin [2 ]
机构
[1] Univ Cent Florida, Orlando, FL 32816 USA
[2] Informat Directorate, Air Force Res lab, Griffiss AFB, NY 13441 USA
关键词
D O I
10.1109/GAMENETS.2009.5137411
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we use game theory to study the interactions between a malicious node and a regular node in wireless networks with unreliable channels. Since the malicious nodes do not reveal their identities to others, it is crucial for the regular nodes to detect them through monitoring and observation. We model the malicious node detection process as a Bayesian game with imperfect information and show that a mixed strategy perfect Bayesian Nash Equilibrium (also a sequential equilibrium) is attainable. While the equilibrium in the detection game ensures the identification of the malicious nodes, we argue that it might not be profitable to isolate the malicious nodes upon detection. As a matter of fact, malicious nodes and regular nodes can co-exist as long as the destruction they bring is less than the contribution they make. To show how we can utilize the malicious nodes, a post-detection game between the malicious and regular nodes is formalized. Solution to this game shows the existence of a subgame perfect Nash Equilibrium and the conditions that achieve the equilibrium. Simulation results and their discussions are also provided to illustrate the properties of the derived equilibria.
引用
收藏
页码:277 / +
页数:2
相关论文
共 50 条
  • [1] A Game Theoretic Malicious Nodes Detection Model in MANETs
    Wang, Xiao
    Feng, Renjian
    Wu, Yinfeng
    Che, Shenyun
    Ren, Yongji
    2012 IEEE 9TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS): WORKSHOPS, 2012,
  • [2] A game theoretic approach to detect and co-exist with malicious nodes in wireless networks
    Wang, Wenjing
    Chatterjee, Mainak
    Kwiat, Kevin
    Li, Qing
    COMPUTER NETWORKS, 2014, 71 : 63 - 83
  • [3] A Game Theoretic Approach to DSRC and WiFi Coexistence
    Gopal, Sneihil
    Kaul, Sanjit K.
    IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 565 - 570
  • [4] A Game Theoretic Approach for the Cooperative Network with the Presence of Malicious Relays
    Chen, Meng-Hsi
    Lin, Shih-Chun
    Hong, Y. -W. Peter
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [5] Coexistence of Age and Throughput Optimizing Networks: A Game Theoretic Approach
    Gopal, Sneihil
    Kaul, Sanjit K.
    Chaturvedi, Rakesh
    2019 IEEE 30TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2019, : 972 - 977
  • [6] Coexistence in Millimeter-Wave WBAN: A Game Theoretic Approach
    Anjum, Md Nashid
    Fang, Hua
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 571 - 576
  • [7] A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks
    Reddy, Yenumula B.
    2009 3RD INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM 2009), 2009, : 462 - 468
  • [8] Game-Theoretic Approach to Malicious Controller Detection in Software Defined Networks
    Sridharan, Vignesh
    Gurusamy, Mohan
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [9] A Game-Theoretic Approach on Resource Allocation With Colluding Nodes in MANETs
    Njilla, Laurent Yamen
    Echual, Patricia
    Pissinou, Niki
    Makki, Kia
    2016 ANNUAL IEEE SYSTEMS CONFERENCE (SYSCON), 2016, : 763 - 770
  • [10] Inducing Cooperation for Optimal Coexistence in Cognitive Radio Networks: A Game Theoretic Approach
    Amjad, Muhammad Faisal
    Chatterjee, Mainak
    Zou, Cliff C.
    2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, : 955 - 961