Coexistence with Malicious Nodes: A Game Theoretic Approach

被引:17
|
作者
Wang, Wenjing [1 ]
Chatterjee, Mainak [1 ]
Kwiat, Kevin [2 ]
机构
[1] Univ Cent Florida, Orlando, FL 32816 USA
[2] Informat Directorate, Air Force Res lab, Griffiss AFB, NY 13441 USA
关键词
D O I
10.1109/GAMENETS.2009.5137411
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we use game theory to study the interactions between a malicious node and a regular node in wireless networks with unreliable channels. Since the malicious nodes do not reveal their identities to others, it is crucial for the regular nodes to detect them through monitoring and observation. We model the malicious node detection process as a Bayesian game with imperfect information and show that a mixed strategy perfect Bayesian Nash Equilibrium (also a sequential equilibrium) is attainable. While the equilibrium in the detection game ensures the identification of the malicious nodes, we argue that it might not be profitable to isolate the malicious nodes upon detection. As a matter of fact, malicious nodes and regular nodes can co-exist as long as the destruction they bring is less than the contribution they make. To show how we can utilize the malicious nodes, a post-detection game between the malicious and regular nodes is formalized. Solution to this game shows the existence of a subgame perfect Nash Equilibrium and the conditions that achieve the equilibrium. Simulation results and their discussions are also provided to illustrate the properties of the derived equilibria.
引用
收藏
页码:277 / +
页数:2
相关论文
共 50 条
  • [41] A GAME THEORETIC APPROACH TO COLLECTIONS AND DISBURSEMENTS
    ORGLER, YE
    TAUMAN, Y
    MANAGEMENT SCIENCE, 1986, 32 (08) : 1029 - 1039
  • [42] A Game Theoretical Approach to Microbial Coexistence
    Abrudan, Monica
    You, Li
    Stankova, Katerina
    Thuijsman, Frank
    ADVANCES IN DYNAMIC AND EVOLUTIONARY GAMES: THEORY, APPLICATIONS, AND NUMERICAL METHODS, 2016, 14 : 267 - 282
  • [43] A Game-Theoretic Approach for Fair Coexistence Between LTE-U and Wi-Fi Systems
    Bairagi, Anupam Kumar
    Tran, Nguyen H.
    Saad, Walid
    Han, Zhu
    Hong, Choong Seon
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (01) : 442 - 455
  • [44] Detecting malicious nodes using game theory and reinforcement learning in software-defined networksDetecting malicious nodes using game theory and reinforcement learning...A. Javadpour et al.
    Amir Javadpour
    Forough Ja’fari
    Tarik Taleb
    Chafika Benzaïd
    International Journal of Information Security, 2025, 24 (3)
  • [45] A Protocol Based on a Game-Theoretic Dilemma to Prevent Malicious Coalitions in Reputation Systems
    Bonnet, Gregory
    20TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE (ECAI 2012), 2012, 242 : 187 - 192
  • [46] A Game Theory Approach for Malicious Node Detection in MANETs
    Taheri, Yaser
    Garakani, Hossein Gharaee
    Mohammadzadeh, Naser
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (03) : 559 - 573
  • [47] Connectivity Re-establishment in the Presence of Dumb Nodes in Sensor-Cloud Infrastructure: A Game Theoretic Approach
    Roy, Arijit
    Mondal, Ayan
    Misra, Sudip
    2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, : 847 - 852
  • [48] A Game Theoretic Approach to Service Discovery and Selection
    Chen, Yi
    Khoussainov, Bakh
    Ye, Xinfeng
    2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, : 4072 - 4079
  • [49] A game theoretic approach to cooperative intrusion detection
    Guo, Yunchuan
    Zhang, Han
    Zhang, Lingcui
    Fang, Liang
    Li, Fenghua
    JOURNAL OF COMPUTATIONAL SCIENCE, 2019, 30 : 118 - 126
  • [50] Game Theoretic Approach to Global Climate Control
    Du Jinming
    Wang Long
    2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 9121 - 9126