Advertisement

Secure Message Delivery Games for Device-to-Device Communications

  • Emmanouil Panaousis
  • Tansu Alpcan
  • Hossein Fereidooni
  • Mauro Conti
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8840)

Abstract

Device-to-Device (D2D) communication is expected to be a key feature supported by next generation cellular networks. D2D can extend the cellular coverage allowing users to communicate when telecommunications infrastructure are highly congested or absent. In D2D networks, any message delivery from a source to a destination relies exclusively on intermediate devices. Each device can run different kinds of mobile security software, which offer protection against viruses and other harmful programs by using real-time scanning in every file entering the device. In this paper, we investigate the best D2D network path to deliver a potentially malicious message from a source to a destination. Although our primary objective is to increase security, we also investigate the contribution of energy costs and quality-of-service to the path selection. To this end, we propose the Secure Message Delivery (SMD) protocol, whose main functionality is determined by the solution of the Secure Message Delivery Game (SMDG). This game is played between the defender (i.e., the D2D network) which abstracts all legitimate network devices and the attacker which abstracts any adversary that can inject different malicious messages into the D2D network in order, for instance, to infect a device with malware. Simulation results demonstrate the degree of improvement that SMD introduces as opposed to a shortest path routing protocol. This improvement has been measured in terms of the defender’s expected cost as defined in SMDGs. This cost includes security expected damages, energy consumption incurred due to messages inspection, and the quality-of-service of the D2D message communications.

Keywords

game theory security device-to-device communications 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Doppler, K., Rinne, M., Wijting, C., Ribeiro, C.B., Hugl, K.: Device-to-device communication as an underlay to LTE-advanced networks. IEEE Communications Magazine 47(12), 42–49 (2009)CrossRefGoogle Scholar
  2. 2.
    Feng, D., Lu, L., Yuan-Wu, Y., Ye Li, G., Li, S., Feng, G.: Device-to-device communications in cellular networks. IEEE Communications Magazine 52(4), 49–55 (2014)CrossRefGoogle Scholar
  3. 3.
    Fodor, G., Dahlman, E., Mildh, G., Parkvall, S., Reider, N., Miklos, G., Turanyi, Z.: Design aspects of network assisted device-to-device communications. IEEE Communications Magazine 50(3), 170–177 (2012)CrossRefGoogle Scholar
  4. 4.
    Nishiyama, H., Ito, M., Kato, N.: Relay-by-Smartphone: Realizing Multihop Device-to-Device Communications. IEEE Communications Magazine 52(4), 56–65 (2014)CrossRefGoogle Scholar
  5. 5.
    Jianting, Y., Chuan, M., Hui, Y., Wei, Z.: Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks. IEEE Communications Magazine 17(11), 2068–2071 (2013)Google Scholar
  6. 6.
    Daohua, Z., Swindlehurst, A.L., Fakoorian, S.A.A., Wei, X., Chunming, Z.: Device-to-device communications: The physical layer security advantage. IEEE Communications Magazine, 1606–1610 (2014)Google Scholar
  7. 7.
    F-Secure: Bluetooth-Worm:SymbOS/Cabir, http://www.f-secure.com/v-descs/cabir.shtml (accessed June 2004)
  8. 8.
    Van Ruitenbeek, E., Courtney, T., Sanders, W.H., Stevens, F.: Quantifying the effectiveness of mobile phone virus response mechanisms. In: Proc. of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 790–800 (2007)Google Scholar
  9. 9.
    Bose, A., Shin, K.G.: On mobile viruses exploiting messaging and bluetooth services. In: Proc. of the Securecomm and Workshops, pp. 1–10 (2006)Google Scholar
  10. 10.
    La Polla, M., Martinelli, F., Sgandurra, D.: A survey on security for mobile devices. IEEE Communications Surveys and Tutorials 15(1), 446–471 (2013)CrossRefGoogle Scholar
  11. 11.
    Miettinen, M., Halonen, P., Hatonen, K.: Host-based intrusion detection for advanced mobile devices. In: Proc. of the 20th International Conference on Advanced Information Networking and Applications (AINA), vol. 2, pp. 72–76 (2006)Google Scholar
  12. 12.
    Ardagna, C.A., Conti, M., Leone, M., Stefa, J.: An anonymous end-to-end communication protocol for mobile cloud environments. IEEE Transactions on Services Computing (2014)Google Scholar
  13. 13.
    Felegyhazi, M., Buttyan, L., Hubaux, J.-P.: Nash equilibria of packet forwarding strategies in wireless ad hoc networks. IEEE Transactions on Mobile Comput. 5(5), 463–476 (2006)CrossRefGoogle Scholar
  14. 14.
    Basar, T., Olsder, G.J.: Dynamic noncooperative game theory, 2nd edn. London Academic Press (1995)Google Scholar
  15. 15.
    Cho, J.H., Chen, I.R., Feng, P.G.: Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks. IEEE Transactions on Reliability 59(1), 231–241 (2010)CrossRefGoogle Scholar
  16. 16.
    Freund, Y., Schapire, R.E.: A decision-theoretic generalization of on-line learning and an application to boosting. Journal of Computer and System Sciences, 119–139 (1997)Google Scholar
  17. 17.
    Liu, Y., Comaniciou, C., Man, H.: A Bayesian game approach for intrusion detection in wireless ad hoc networks. In: Proc. of the Workshop on Game theory for Communications and Networks, GameNets (2006)Google Scholar
  18. 18.
    Liu, Y., Comaniciou, C., Man, H.: Modelling misbehaviour in ad hoc networks: A game theoretic approach for intrusion detection. International Journal of Security and Networks 1(7), 243–254 (2006)CrossRefGoogle Scholar
  19. 19.
    Marchang, N., Tripathi, R.: A game theoretical approach for efficient deployment of intrusion detection system in mobile ad hoc networks. In: Proc. of the International Conference on Advanced Computing and Communications (ADCOM), pp. 460–464 (2007)Google Scholar
  20. 20.
    Nash, J.F.: Equilibrium points in n-person games. Proc. of the National Academy of Sciences 36(1), 48–49 (1950)MathSciNetCrossRefMATHGoogle Scholar
  21. 21.
    Otrok, H., Debbabi, M., Assi, C., Bhattacharya, P.: A cooperative approach for analyzing intrusions in mobile ad hoc networks. In: Proc. of the International Conference on Distributed Computing Systems Workshops, ICDCSW (2007)Google Scholar
  22. 22.
    Panaousis, E.A., Politis, C.: A game theoretic approach for securing AODV in emergency mobile ad hoc networks. In: Proc. of the 34th IEEE Conference on Local Computer Networks (LCN), Zurich, Switzerland, pp. 985–992 (2009)Google Scholar
  23. 23.
    Patcha, A., Park, J.M.: A game theoretic approach to modeling intrusion detection in mobile ad hoc networks. In: Proc. of the 5th Annual IEEE SMC Information Assurance Workshop, pp. 280–284 (2004)Google Scholar
  24. 24.
    Patcha, A., Park, J.M.: A game theoretic formulation for intrusion detection in mobile ad hoc networks. International Journal of Network Security 2(2), 131–137 (2006)Google Scholar
  25. 25.
    Johnson, D.B., Maltz, D.A.: Dynamic source routing in ad hoc wireless networks. In: Mobile Computing, pp. 153–181. Springer US (1996)Google Scholar
  26. 26.
    Santosh, N., Saranyan, R., Senthil, K.P., Vetriselvi, V.: Cluster based co-operative game theory approach for intrusion detection in mobile ad-hoc grid. In: Proc. of the International Conference on Advanced Computing and Communications (ADCOM), pp. 273–278 (2008)Google Scholar
  27. 27.
    Sun, Y.L., Yu, W., Han, Z., Liu, K.J.R.: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas of Communication 24(2), 305–317 (2006)CrossRefMATHGoogle Scholar
  28. 28.
    Alpcan, T., Basar, T.: Network Security: A Decision and Game-Theoretic Approach. Cambridge University Press (2010)Google Scholar
  29. 29.
    Yu, W., Ji, Z., Liu, K.J.R.: Securing cooperative ad-hoc networks under noise and imperfect monitoring: Strategies and game theoretic analysis. IEEE Transactions on Information Forensics and Security 2(2), 240–253 (2007)CrossRefGoogle Scholar
  30. 30.
    Yu, W., Liu, K.J.R.: Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks. IEEE Transactions on Mobile Computing 6(5), 507–521 (2007)CrossRefGoogle Scholar
  31. 31.
    Yu, W., Liu, K.J.R.: Secure cooperation in autonomous mobile ad-hoc networks under noise and imperfect monitoring: A game-theoretic approach. IEEE Transactions on Information Forensics and Security 3(2), 317–330 (2008)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Emmanouil Panaousis
    • 1
  • Tansu Alpcan
    • 2
  • Hossein Fereidooni
    • 3
  • Mauro Conti
    • 3
  1. 1.Queen Mary University of LondonUK
  2. 2.The University of MelbourneAustralia
  3. 3.University of PaduaItaly

Personalised recommendations