DocumentCode
2370352
Title
Indirect reciprocity game modelling for secure wireless networks
Author
Xiao, Liang ; Lin, W. Sabrina ; Chen, Yan ; Liu, K. J Ray
Author_Institution
Dept. of Commun. Eng., Xiamen Univ., Xiamen, China
fYear
2012
fDate
10-15 June 2012
Firstpage
928
Lastpage
933
Abstract
We formulate the wireless security problem as an indirect reciprocity game, and propose a security mechanism that applies the indirect reciprocity principle to suppress attacks in wireless networks. In this system, a large number of nodes cooperate to reject the network access requests from attackers during the punishment periods. If the punishment time is so long that the cost due to the loss of network services exceeds the illegal security gains of the attack, rational nodes do not have incentive to attack, and hence our system can reduce the attacking probability in the network. We develop a social norm and reputation updating process to build such an indirect reciprocity mechanism for the network. We evaluate the evolutionarily stable strategy (ESS) in the game, and provide the optimal action strategy and its corresponding stationary reputation distribution. Our system is robust against collusion attacks, and can significantly reduce the attacking rate for a wide range of attacks. Simulation results show that our system has much better security performance than the direct reciprocity mechanism, especially in the large-scale wireless network with terminal mobility. Our system can be applied to many wireless networks including cognitive radio networks to improve their security performance.
Keywords
evolutionary computation; game theory; losses; probability; radio access networks; telecommunication security; ESS; attack suppression; cognitive radio network; evolutionarily stable strategy; indirect reciprocity game modelling; large-scale wireless network security problem; network access request rejection; network service loss; probability; reputation updating process; social norm process; stationary reputation distribution; terminal mobility; Games; Peer to peer computing; Relays; Security; Transmitters; Vectors; Wireless networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications (ICC), 2012 IEEE International Conference on
Conference_Location
Ottawa, ON
ISSN
1550-3607
Print_ISBN
978-1-4577-2052-9
Electronic_ISBN
1550-3607
Type
conf
DOI
10.1109/ICC.2012.6364034
Filename
6364034
Link To Document