An incentive mechanism based on game theory for trust management

被引:15
作者
Feng, Renjian [1 ]
Che, Shenyun [1 ]
Wang, Xiao [1 ]
Wan, Jiangwen [1 ,2 ]
机构
[1] Beihang Univ, Sch Instrument Sci & Optoelect Engn, Beijing 100191, Peoples R China
[2] Sci & Technol Commun Informat Secur Control Lab, Jiaxing 314033, Peoples R China
基金
中国国家自然科学基金;
关键词
incentive mechanism; trust management; cooperation; Bayesian game; expected payoff;
D O I
10.1002/sec.941
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Trust management is suitable for handling the internal security problems in wireless sensor networks. However, trust management schemes usually neglect the selfishness of normal nodes and regard malicious nodes as never cooperate. Thus, to ensure trustworthiness and encourage nodes to cooperate, incentive mechanisms are in pressing demand for trust management schemes. We propose an incentive mechanism based on game theory. The interactions between unknown-type nodes and normal nodes are modeled as Bayesian games. A set of parameters including players' action sets and the payoff matrix are formulated and analyzed. How a player can select proper actions on behalf of its own profits is shown by the equilibriums of the game. Simulation results show that the proposed incentive mechanism can effectively motivate normal nodes to cooperate instead of being selfish and compel malicious nodes to cooperate as far as possible. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:2318 / 2325
页数:8
相关论文
共 19 条
[1]   A novel node level security policy framework for wireless sensor networks [J].
Claycomb, William R. ;
Shin, Dongwan .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (01) :418-428
[2]   A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory [J].
Feng, Renjian ;
Xu, Xiaofeng ;
Zhou, Xiang ;
Wan, Jiangwen .
SENSORS, 2011, 11 (02) :1345-1360
[3]   A survey on the applicability of trust management systems for wireless sensor networks [J].
Fernandez-Gago, M. Carmen ;
Roman, Rodrigo ;
Lopez, Javier .
THIRD INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, :25-+
[4]   Game-based Trust Establishment for Mobile Ad Hoc Networks [J].
Jiang, Xin ;
Lin, Chuang ;
Yin, Hao ;
Chen, Zhen ;
Su, Li .
2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, :475-+
[5]  
Kamhoua C., 2011, PROC IEEE INT C COMM, P1
[6]  
Lan Li, 2010, 2010 IEEE International Conference on Information Theory and Information Security, P394, DOI 10.1109/ICITIS.2010.5689589
[7]   Mobility reduces uncertainty in MANETs [J].
Li, Feng ;
Wu, Jie .
INFOCOM 2007, VOLS 1-5, 2007, :1946-+
[8]   Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs [J].
Li, Feng ;
Yang, Yinying ;
Wu, Jie .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2010, 40 (03) :612-622
[9]  
Lis Z, 2012, IEEE T MOBILE COMPUT, V11, P1287
[10]  
Marti S., 2000, MobiCom 2000. Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, P255, DOI 10.1145/345910.345955