DocumentCode :
1788626
Title :
Bayesian mechanisms for wireless network security
Author :
Chorppath, Anil Kumar ; Alpcan, Tansu ; Boche, Holger
Author_Institution :
Tech. Univ. of Munich, Munich, Germany
fYear :
2014
fDate :
10-14 June 2014
Firstpage :
865
Lastpage :
870
Abstract :
Strategic users in a wireless network cannot be assumed to follow the network algorithms blindly. Moreover, some of these users could be controlled by powerful Botnets, which aim to use their knowledge about network algorithms to maliciously gain more resources and also to create interference to other users. We consider a scenario; in which a mechanism designer and legitimate users together, in a wireless network, gather probabilistic information about the presence of malicious users and modify their actions accordingly. The probabilistic information is gathered by observing the network over a long time period. We study Bayesian mechanisms, both pricing schemes and auctions, and obtain the Nash Equilibrium (NE) points of the underlying Bayesian games. The NE points provide conditions indicating when it is better for users to to hide or reveal their nature (types). The prices and allocations in the mechanisms are later modified using the Bayesian information about the type of the users. The numerical studies show the NE points and illustrate the results.
Keywords :
Bayes methods; game theory; radio networks; radiofrequency interference; telecommunication security; Bayesian games; Bayesian mechanisms; Nash equilibrium points; auctions; botnets; interference creation; network algorithms; pricing schemes; probabilistic information; wireless network security; Bayes methods; Cost function; Interference; Jamming; Pricing; Probabilistic logic; Resource management;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications (ICC), 2014 IEEE International Conference on
Conference_Location :
Sydney, NSW
Type :
conf
DOI :
10.1109/ICC.2014.6883428
Filename :
6883428
Link To Document :
بازگشت