By Topic

Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks: Application to Network Security and Privacy

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Kamhoua, C.A. ; Electr. & Comput. Eng. Dept., Florida Int. Univ., Miami, FL, USA ; Pissinou, N. ; Kia Makki

Future applications will require autonomous devices to be interconnected to form a network. Such networks will not have a central manager; each node will manage itself and will be free to decide participation in any network function. As with traditional networks, these networks need to be secured to authenticate the nodes, prevent misuse, detect anomalies and protect user privacy. Network security and privacy protection without a central manager will be challenging. Several security mechanisms and privacy protections will require the cooperation of several nodes to defend the network from malicious attacks. We particularly investigate when for each node it is cost-effective to freely participate in the security mechanism or protect its privacy depending if that node believes or trusts that all other nodes or at least a minimum number of other nodes will do the same. In this case, each node will be involved in a trust dilemma that we will model using the mathematical framework of game theory and evolutionary game theory. The well known stag hunt game will be our basic game model. This paper will clearly present the interconnection between cooperation, trust, privacy and security in a network.

Published in:

Communications (ICC), 2011 IEEE International Conference on

Date of Conference:

5-9 June 2011