Indirect Reciprocity Security Game for Large-Scale Wireless Networks
- 1 June 2012
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Information Forensics and Security
- Vol. 7 (4), 1368-1380
- https://doi.org/10.1109/tifs.2012.2202228
Abstract
Radio nodes can obtain illegal security gains by performing attacks, and they are motivated to do so if the illegal gains are larger than the resulting costs. Most existing direct reciprocity-based works assume constant interaction among players, which does not always hold in large-scale networks. In this paper, we propose a security system that applies the indirect reciprocity principle to combat attacks in wireless networks. Because network access is highly desirable for most nodes, including potential attackers, our system punishes attackers by stopping their network services. With a properly designed social norm and reputation updating process, the aim is to incur a cost due to the loss of network access to exceed the illegal security gain. Thus rational nodes are motivated to abandon adversary behavior for their own interests. We derive the optimal strategy and the corresponding stationary reputation distribution, and evaluate the stability condition of the optimal strategy using the evolutionarily stable strategy concept. This security system is robust against collusion attacks and can significantly reduce the attacker population for a wide range of attacks when the stability condition is satisfied. Simulation results show that the proposed system significantly outperforms the existing direct reciprocity-based systems, especially in the large-scale networks with terminal mobility. This technique can be extended to many wireless networks, including cognitive radio networks, to improve their security performance.Keywords
This publication has 20 references indexed in Scilit:
- Indirect reciprocity game modelling for secure wireless networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- Exploiting Jamming-Caused Neighbor Changes for Jammer LocalizationIEEE Transactions on Parallel and Distributed Systems, 2011
- A Cooperation Stimulation Strategy in Wireless Multicast NetworksIEEE Transactions on Signal Processing, 2011
- Indirect Reciprocity Game Modelling for Cooperation Stimulation in Cognitive NetworksIEEE Transactions on Communications, 2010
- Trust management and adversary detection for delay tolerant networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Maintaining Defender's Reputation in Anomaly Detection Against Insider AttacksIEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 2009
- Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc NetworksIEEE Transactions on Mobile Computing, 2007
- A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Evolution of indirect reciprocityNature, 2005
- The Sybil AttackLecture Notes in Computer Science, 2002