• DocumentCode
    2370352
  • Title

    Indirect reciprocity game modelling for secure wireless networks

  • Author

    Xiao, Liang ; Lin, W. Sabrina ; Chen, Yan ; Liu, K. J Ray

  • Author_Institution
    Dept. of Commun. Eng., Xiamen Univ., Xiamen, China
  • fYear
    2012
  • fDate
    10-15 June 2012
  • Firstpage
    928
  • Lastpage
    933
  • Abstract
    We formulate the wireless security problem as an indirect reciprocity game, and propose a security mechanism that applies the indirect reciprocity principle to suppress attacks in wireless networks. In this system, a large number of nodes cooperate to reject the network access requests from attackers during the punishment periods. If the punishment time is so long that the cost due to the loss of network services exceeds the illegal security gains of the attack, rational nodes do not have incentive to attack, and hence our system can reduce the attacking probability in the network. We develop a social norm and reputation updating process to build such an indirect reciprocity mechanism for the network. We evaluate the evolutionarily stable strategy (ESS) in the game, and provide the optimal action strategy and its corresponding stationary reputation distribution. Our system is robust against collusion attacks, and can significantly reduce the attacking rate for a wide range of attacks. Simulation results show that our system has much better security performance than the direct reciprocity mechanism, especially in the large-scale wireless network with terminal mobility. Our system can be applied to many wireless networks including cognitive radio networks to improve their security performance.
  • Keywords
    evolutionary computation; game theory; losses; probability; radio access networks; telecommunication security; ESS; attack suppression; cognitive radio network; evolutionarily stable strategy; indirect reciprocity game modelling; large-scale wireless network security problem; network access request rejection; network service loss; probability; reputation updating process; social norm process; stationary reputation distribution; terminal mobility; Games; Peer to peer computing; Relays; Security; Transmitters; Vectors; Wireless networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications (ICC), 2012 IEEE International Conference on
  • Conference_Location
    Ottawa, ON
  • ISSN
    1550-3607
  • Print_ISBN
    978-1-4577-2052-9
  • Electronic_ISBN
    1550-3607
  • Type

    conf

  • DOI
    10.1109/ICC.2012.6364034
  • Filename
    6364034