Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory

被引:163
作者
Tian, Zhihong [1 ]
Gao, Xiangsong [2 ]
Su, Shen [1 ]
Qiu, Jing [1 ]
Du, Xiaojiang [3 ]
Guizani, Mohsen [4 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Guangdong, Peoples R China
[2] China Acad Engn Phys, Inst Comp Applicat, Mianyang 621900, Sichuan, Peoples R China
[3] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[4] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
基金
中国国家自然科学基金;
关键词
Reputation management scheme; Internet of vehicles; evolutionary game theory; malicious users; utility function; TRUST; SECURITY; SYSTEM;
D O I
10.1109/TVT.2019.2910217
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Conducting reputation management is very important for Internet of vehicles. However, most of the existing work evaluate the effectiveness of their schemes with settled attacking behaviors in their simulation, which cannot represent the real scenarios. In this paper, we propose to consider dynamical and diversity attacking strategies in the simulation of reputation management scheme evaluation. To that end, we apply evolutionary game theory to model the evolution process of malicious users' attacking strategies, and discuss the methodology of the evaluation simulations. We further apply our evaluation method to a reputation management scheme with multiple utility functions, and discuss the evaluation results. The results indicate that our evaluation method is able to depict the evolving process of the dynamic attacking strategies in a vehicular network, and the final state of the simulation could be used to quantify the protection effectiveness of the reputation management scheme.
引用
收藏
页码:5971 / 5980
页数:10
相关论文
共 51 条
[1]  
Al-Sakran HO, 2015, INT J ADV COMPUT SC, V6, P37
[2]   Security Games for Vehicular Networks [J].
Alpcan, Tansu ;
Buchegger, Sonja .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (02) :280-290
[3]  
[Anonymous], IEEE T SUSTAIN COMPU
[4]   A game inspired defense mechanism against distributed denial of service attacks [J].
Bedi, Harkeerat ;
Shiva, Sajjan ;
Roy, Sankardas .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) :2389-2404
[5]   A survey on game theory applications in wireless networks [J].
Charilas, Dimitris E. ;
Panagopoulos, Athanasios D. .
COMPUTER NETWORKS, 2010, 54 (18) :3421-3430
[6]  
Chen C, 2010, P INT C INF TECHN CO
[7]   Trust architecture and reputation evaluation for internet of things [J].
Chen, Juan ;
Tian, Zhihong ;
Cui, Xiang ;
Yin, Lihua ;
Wang, Xianzhi .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (08) :3099-3107
[8]   Genetic Polymorphisms and Susceptibility to Parenchymal Renal Infection Among Pediatric Patients [J].
Cheng, Chi-Hui ;
Lee, Yun-Shien ;
Tsau, Yong-Kwei ;
Lin, Tzou-Yien .
PEDIATRIC INFECTIOUS DISEASE JOURNAL, 2011, 30 (04) :309-314
[9]   Security in wireless ad-hoc networks - A survey [J].
Di Pietro, R. ;
Guarino, S. ;
Verde, N. V. ;
Domingo-Ferrer, J. .
COMPUTER COMMUNICATIONS, 2014, 51 :1-20
[10]   Routing algorithm based on multi-community evolutionary game for VANET [J].
Wu, Di ;
Cao, Jing ;
Ling, Yan ;
Liu, Jiangchuan ;
Sun, Limin .
Journal of Networks, 2013, 7 (07) :1106-1115