TY - GEN
T1 - A game theory-based surveillance mechanism against suspicious insiders in MANETs (work-in-progress)
AU - Hao, Dong
AU - Ren, Yizhi
AU - Sakurai, Kouichi
PY - 2011
Y1 - 2011
N2 - One of the most challenging issues in Mobile Ad-Hoc Network (MANET) is that the insiders are untrustworthy in packet forwarding stage. All the nodes which loss data-packets over a preset threshold can be generalized as Suspicious Insiders. To intimidate these suspicious insiders and reduce packet dropping, surveillance is the most direct and easiest method. In this paper, we propose a novel surveillance mechanism to monitor the packet dropping of suspicious insiders. On one hand, our work provides the monitor with optimal strategies which will maximize its long term utility; On the other hand, our work presents an on-demand monitoring scheme which will balance the tradeoff between security and resource consumption. First, we utilize a reputation scheme to distinguish suspicious insiders from legitimate members, and quantify the threat level of the suspicious insiders. Then taking into consideration security and resource consumption, we utilize game theory to analyze the interaction between monitor and suspicious insider. Finally, optimal mixed-strategy is computed to identify the best way for the monitor to respond to the suspicious insider.
AB - One of the most challenging issues in Mobile Ad-Hoc Network (MANET) is that the insiders are untrustworthy in packet forwarding stage. All the nodes which loss data-packets over a preset threshold can be generalized as Suspicious Insiders. To intimidate these suspicious insiders and reduce packet dropping, surveillance is the most direct and easiest method. In this paper, we propose a novel surveillance mechanism to monitor the packet dropping of suspicious insiders. On one hand, our work provides the monitor with optimal strategies which will maximize its long term utility; On the other hand, our work presents an on-demand monitoring scheme which will balance the tradeoff between security and resource consumption. First, we utilize a reputation scheme to distinguish suspicious insiders from legitimate members, and quantify the threat level of the suspicious insiders. Then taking into consideration security and resource consumption, we utilize game theory to analyze the interaction between monitor and suspicious insider. Finally, optimal mixed-strategy is computed to identify the best way for the monitor to respond to the suspicious insider.
UR - http://www.scopus.com/inward/record.url?scp=82055200292&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=82055200292&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-25283-9_16
DO - 10.1007/978-3-642-25283-9_16
M3 - Conference contribution
AN - SCOPUS:82055200292
SN - 9783642252822
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 237
EP - 252
BT - Trusted Systems - Second International Conference, INTRUST 2010, Revised Selected Papers
T2 - 2nd International Conference on Trusted Systems, INTRUST 2010
Y2 - 13 December 2010 through 15 December 2010
ER -