An Efficient Trust Evaluation Approach in Attacker Dominated Networks in Internet of Things
Malicious organizations deploy numerous RFID readers in a partial region with low cost to gain superiority therefore its readers may perform attacks and other conspirators generate false reports to cover such malicious events. In this paper, we first introduce a simple game approach which only achieves Bayes equilibrium in a regular network between combined report readers and a detecting reader, then in the attacker dominated network, we propose an improved cooperative game where detecting nodes cooperate to evaluate trust of an unknown node from its organization reputation, the node’s prior trust and utility function is updated according to a reference report, therefore malicious node weights are reduced meanwhile a new Bayes equilibrium is achieved. The simulations show that the cooperative game improves successful deduction rate and decreases forged reports significantly.
KeywordsCooperative Game Malicious Node Simple Game Regular Network Signaling Game
This work is partially supported by the National Natural Science Foundation of China under Grant No.61173144 and No.61100181, the National Grand Fundamental Research 973 Program of China under Grant No.2011CB302605, National High-tech R&D Program of China (863 Program) under Grant No.2010AA012504 and No.2011AA010705.
- 1.Liu, W., Fang, B., Yin, L., Zhang, H.: A small world based routing approach of heterogeneous strategy in the Internet of Things. In: International Conference on Computer Science and Network Technology. (2011)Google Scholar
- 2.Raya, M., Aziz, A., Hubaux, J.P.: Efficient secure aggregation in VANETs. In: Proceedings of the 3rd International Workshop on Vehicular Ad hoc Networks, 67, 2006Google Scholar
- 5.Srinivasan, A., Teitelbaum, J., Liang, H., Wu, J., Cardei, M.: Reputation and trust-based systems for ad hoc and sensor networks. In: Algorithms and Protocols for Wireless Ad Hoc and Sensor Networks, 2006Google Scholar
- 6.Graf, K., Mogre, P.S., Hollick, M., Steinmetz, R.: Detection of colluding misbehaving nodes in mobile ad hoc and wireless mesh networks. IEEE GLOBECOM 2007–2007 IEEE Global Telecommunications Conference, 5097–5101, 2007Google Scholar
- 7.Zhong, S., Wu, F.: On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks. In: MobiCom’07, 278, 2007Google Scholar
- 8.Patcha, A., Park, J.M.: A Game theoretic formulation for intrusion detection in mobile ad hoc networks. Int. J. Netw Security 2(2), 131–137 (2006)Google Scholar