DOI QR코드

DOI QR Code

Game Theoretic Modeling for Mobile Malicious Node Detection Problem in Static Wireless Sensor Networks

  • Ho, Jun-Won (Department of Information Security, Seoul Women's University)
  • Received : 2021.01.09
  • Accepted : 2021.01.20
  • Published : 2021.02.28

Abstract

Game theory has been regarded as a useful theoretical tool for modeling the interactions between distinct entities and thus it has been harnessed in various research field. In particular, research attention has been shown to how to apply game theory to modeling the interactions between malign and benign entities in the field of wireless networks. Although various game theoretic modeling work have been proposed in the field of wireless networks, our proposed work is disparate to the existing work in the sense that we focus on mobile malign node detection problem in static wireless sensor networks. More specifically, we propose a Bayesian game theoretic modeling for mobile malign node detection problem in static wireless sensor networks. In our modeling, we formulate a two-player static Bayesian game with imperfect information such that player 1 is aware of the type of player 2, but player 2 is not aware of the type of player 1. We use four strategies in our static Bayesian game. We obtain Bayesian Nash Equilibria with pure strategies under certain conditions.

Keywords

References

  1. Martin J. Osborne, An Introduction to Game Theory, Oxford University Press, 2004.
  2. A. Roles and H. ElAarag, "Coexistence with malicious and selfish nodes in wireless ad hoc networks: A Bayesian game approach," Journal of Algorithms & Computational Technology, Vol. 11(4) 353-365, 2017. DOI: https://doi.org/10.1177/1748301817725305.
  3. W. Wang, M. Chatterjee, K. Kwiat, and Q. Li, "A game theoretic approach to detect and co-exist with malicious nodes in wireless networks," Computer Networks, 71 (2014) 63-83. DOI: http://dx.doi.org/10.1016/j.comnet.2014.06.008.
  4. F. Li, Y. Yang, and Jie Wu, "Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs," IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS-PART B: CYBERNETICS, VOL. 40, NO. 3, JUNE 2010. DOI: https://doi.org/10.1109/TSMCB.2009.2035929.
  5. J. Ho, M. Wright, and S.K. Das, "Distributed detection of mobile malicious node attacks in wireless sensor networks," Ad Hoc Networks 10(3): 512-523 (2012). DOI: https://doi.org/10.1016/j.adhoc.2011.09.006.
  6. A. Wald, Sequential Analysis, Dover Publications, 2004.