Cooperation and end-to-end in the Internet

被引:4
|
作者
Kantola, Raimo [1 ]
Kabir, Hammad [1 ]
Loiseau, Patrick [2 ]
机构
[1] Aalto Univ, Dept Commun & Networking, Espoo, Finland
[2] EURECOM, Network & Secur Dept, Biot, France
关键词
5G; communications service; cooperation; evolution; game theory; Internet; ISP; networks; security; CONGESTION CONTROL; GAME; NETWORKS;
D O I
10.1002/dac.3268
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper analyzes the motivation and strategies for ensuring cooperative behavior among hosts and customer networks in the Internet and 5G networks. The hypothesis is that better cooperation among the benevolent entities could improve the overall Internet welfare, motivating the need for adoption of cooperative security. However, in state of the art, the prevalent security approach in the Internet is based on self-help, while the adoption of cooperative methods is progressing slowly. At the same time, the ubiquitous reliance on 5G and mission critical nature of some of the new services, for example, ultrareliable (machine-to-machine) communication and Internet of things, requires that 5G will do its best to curb the malicious (noncooperative) behavior from becoming a cause of failure to the legitimate services. In this paper, we relate our analysis of the conditions for sustainable cooperation in the Internet with the famous end-to-end principle, and present the hypothesis that there is no end-to-end solution to the problem of ensuring cooperation among Internet hosts. Game theory allows studying the outcomes of interactions among the players with conflicting interests. We use it to study the hypothesis and show that introducing the reputation of Internet nodes and customer networks can lead to cooperation, which improves the overall Internet welfare and reduces the payoffs of malicious actors. We study the possible response of noncooperative users with advanced defection strategies and the resulting outcomes. We argue that 5G shall make significant progress towards uprooting the selfish behavior and malicious activities using cooperation and relate it with motivation for providing ubiquitous connectivity and ultrareliable services. The paper concludes by summarizing our earlier work on the application of the proposed methods of cooperation to 5G and the Internet; outlining how cooperation in security is not only desirable but also feasible.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] End-To-End Mobility for the Internet Using ILNP
    Phoomikiattisak, Ditchaphong
    Bhatti, Saleem N.
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [22] Mobile Internet in Stereo: An End-to-End Scenario
    Warma, Henna
    Leva, Tapio
    Eggert, Lars
    Hammainen, Heikki
    Manner, Jukka
    INCENTIVES, OVERLAYS, AND ECONOMIC TRAFFIC CONTROL, 2010, 6236 : 64 - +
  • [23] Internet of Things: An End-to-End Security Layer
    Behrens, Reinhard
    Ahmed, Ali
    PROCEEDINGS OF THE 2017 20TH CONFERENCE ON INNOVATIONS IN CLOUDS, INTERNET AND NETWORKS (ICIN), 2017, : 146 - 149
  • [24] The end of end-to-end: Preserving the architecture of the Internet in the broadband era
    Lemley, MA
    Lessig, L
    UCLA LAW REVIEW, 2001, 48 (04) : 925 - 972
  • [25] Predicting and bypassing end-to-end Internet service degradations
    Bremler-Barr, A
    Cohen, E
    Kaplan, H
    Mansour, Y
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2003, 21 (06) : 961 - 978
  • [26] End-to-end secure group communication for the Internet of Things
    Lizardo, Andre
    Barbosa, Raul
    Neves, Samuel
    Correia, Jaime
    Araujo, Filipe
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [27] End-to-end packet delay and loss behavior in the internet
    Bolot, Jean-Chrysostome
    Computer Communications Review, 1993, 23 (04):
  • [28] End-to-end performance monitoring and analysis in the internet: An end user perspective
    Ho L.L.
    Journal of Network and Systems Management, 2000, 8 (1) : 131 - 133
  • [29] An End-to-End QoS Control Model for Enhanced Internet
    张尧学
    王晓春
    顾钧
    JournalofComputerScienceandTechnology, 2000, (06) : 497 - 508
  • [30] End-to-End Resources Planning Based on Internet of Service
    Li, Baoan
    Zhang, Wei
    WEB INFORMATION SYSTEMS AND MINING, PT II, 2011, 6988 : 19 - 26