A game-theoretic model and analysis of data exchange protocols for Internet of Things in clouds

被引:4
|
作者
Tao, Xiuting [1 ]
Li, Guoqiang [1 ]
Sun, Daniel [2 ]
Cai, Hongming [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Software, Shanghai, Peoples R China
[2] CSIRO, Data61, Canberra, ACT, Australia
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2017年 / 76卷
基金
中国国家自然科学基金;
关键词
Exchange protocols; Game theory; Rationality; Fairness;
D O I
10.1016/j.future.2016.12.030
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Big data, Internet of things (loT), and cloud computing have been recognized a family of technologies for a connected world. Besides hailed hope for the future, there are also challenges to security due to complexity and unpredictability of the Internet, clouds, and data. One of the challenges is information and data exchange, for example, identifying untrustworthy cloud users and analyzing abnormal user behavior during information exchange. This paper addresses exchange mechanism, which is a useful theoretic basis to make secure electronic commerce and electronic business transactions possible. To ensure and verify the property of fairness, a crucial property of exchange mechanism, this paper proposes a specific model for behavior analysis based on the extensive game with imperfect information. Rationality and fairness properties are built in the corresponding game and the game tree. To verify the properties, a tree analysis method is proposed, and a-linear time algorithm is given. As a case study, some flaws of the ASW protocol are found. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:582 / 589
页数:8
相关论文
共 50 条
  • [1] A Game-Theoretic Model for Analyzing Fair Exchange Protocols
    Gu, Yonggen
    Shen, Zhangguo
    Xue, Deqian
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 509 - 513
  • [2] Jamming in the Internet of Things: A Game-Theoretic Perspective
    Namvar, Nima
    Saad, Walid
    Bahadori, Niloofar
    Kelley, Brian
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [3] Dynamic Resource Allocation for Power Distribution Internet of Things: a Game-Theoretic Model
    Li, Zhi
    Liu, Zhu
    Liu, Yanzhu
    Zhang, Nan
    Guo, Jing
    PROCEEDINGS OF THE 33RD CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2021), 2021, : 1396 - 1400
  • [4] Game-theoretic physical layer authentication for spoofing detection in internet of things
    Wu, Yue
    Jing, Tao
    Gao, Qinghe
    Wu, Yingzhen
    Huo, Yan
    DIGITAL COMMUNICATIONS AND NETWORKS, 2024, 10 (05) : 1394 - 1404
  • [5] A game-theoretic framework for dynamic cyber deception in Internet of Battlefield Things
    Anwar, Ahmed H.
    Kamhoua, Charles
    Leslie, Nandi
    PROCEEDINGS OF THE 16TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS'19), 2019, : 522 - 526
  • [6] Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey
    Shen, Yizhou
    Shepherd, Carlton
    Ahmed, Chuadhry Mujeeb
    Shen, Shigen
    Wu, Xiaoping
    Ke, Wenlong
    Yu, Shui
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2024, 133
  • [7] On Random Dynamic Voltage Scaling for Internet-of-Things: A Game-Theoretic Approach
    Geng, Hui
    Kwiat, Kevin A.
    Kamhoua, Charles A.
    Shi, Yiyu
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (01) : 123 - 132
  • [8] A Game-Theoretic Approach for Cost-Effective Multicast Routing in the Internet of Things
    Kumar, Sumit
    Goswami, Antriksh
    Gupta, Ruchir
    Singh, Satya P.
    Lay-Ekuakille, Aime
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18) : 18041 - 18053
  • [9] Game-Theoretic Security of Commitment Protocols under a Realistic Cost Model
    Komatsubara, Tsuyoshi
    Manabe, Yoshifumi
    IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA 2016, 2016, : 776 - 783
  • [10] Towards a Game-Theoretic Security Analysis of Off-Chain Protocols
    Rain, Sophie
    Avarikioti, Georgia
    Kovacs, Laura
    Maffei, Matteo
    2023 IEEE 36TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF, 2023, : 107 - 122