Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks

被引:42
作者
Chen, Jing [1 ]
He, Kun [1 ]
Yuan, Quan [2 ]
Xue, Guoliang [3 ]
Du, Ruiying [1 ]
Wang, Lina [1 ]
机构
[1] Wuhan Univ, Comp Sch, State Key Lab Software Engn, Wuhan 430072, Hubei, Peoples R China
[2] Univ Texas Permian Basin, Dept Math & Comp Sci, Odessa, TX 79762 USA
[3] Arizona State Univ, Sch Comp Informat & Decis Syst, Tempe, AZ 85281 USA
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Batch identification; game theory; wireless mobile networks;
D O I
10.1109/TMC.2016.2604820
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure access is one of the fundamental problems in wireless mobile networks. Digital signature is a widely used technique to protect messages' authenticity and nodes' identities. From the practical perspective, to ensure the quality of services in wireless mobile networks, ideally the process of signature verification should introduce minimum delay. Batch cryptography technique is a powerful tool to reduce verification time. However, most of the existing works focus on designing batch verification algorithms for wireless mobile networks without sufficiently considering the impact of invalid signatures, which can lead to verification failures and performance degradation. In this paper, we propose a Batch Identification Game Model (BIGM) in wireless mobile networks, enabling nodes to find invalid signatures with reasonable delay no matter whether the game scenario is complete information or incomplete information. Specifically, we analyze and prove the existence of Nash Equilibriums (NEs) in both scenarios, to select the dominant algorithm for identifying invalid signatures. To optimize the identification algorithm selection, we propose a self-adaptive auto-match protocol which estimates the strategies and states of attackers based on historical information. Comprehensive simulation results in terms of NE reasonability, algorithm selection accuracy, and identification delay are provided to demonstrate that BIGM can identify invalid signatures more efficiently than existing algorithms.
引用
收藏
页码:1530 / 1543
页数:14
相关论文
共 30 条
[1]  
Akinyele Joseph A., 2012, P 2012 ACM C COMP CO, P474, DOI [DOI 10.1145/2382196.2382248, 10.1145/2382196.2382248]
[2]   Efficient Authentication for Mobile and Pervasive Computing [J].
Alomair, Basel ;
Poovendran, Radha .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (03) :469-481
[3]  
[Anonymous], 1994, P WORKSH THEOR APPL
[4]  
[Anonymous], 2006, 1609 IEEE
[5]   Distributed Greedy Coding-aware Deterministic Routing for multi-flow in wireless networks [J].
Chen, Jing ;
He, Kun ;
Yuan, Quan ;
Du, Ruiying ;
Wang, Lina ;
Wu, Jie .
COMPUTER NETWORKS, 2016, 105 :194-206
[6]   Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks [J].
Chen, Jing ;
He, Kun ;
Du, Ruiying ;
Zheng, Minghui ;
Xiang, Yang ;
Yuan, Quan .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (02) :423-433
[7]  
Chen M, 2016, MOBILE NETW APPL
[8]   Mobility-Aware Caching and Computation Offloading in 5G Ultra-Dense Cellular Networks [J].
Chen, Min ;
Hao, Yixue ;
Qiu, Meikang ;
Song, Jeungeun ;
Wu, Di ;
Humar, Iztok .
SENSORS, 2016, 16 (07)
[9]  
Cheon JH, 2013, LECT NOTES COMPUT SC, V7881, P315, DOI 10.1007/978-3-642-38348-9_20
[10]   An EM Algorithm for Markov Modulated Markov Processes [J].
Ephraim, Yariv ;
Roberts, William J. J. .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2009, 57 (02) :463-470