An Efficient Trust Evaluation Approach in Attacker Dominated Networks in Internet of Things

  • Wenmao Liu
  • Lihua Yin
  • Binxing Fang
  • Xiangzhan Yu
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 164)


Malicious organizations deploy numerous RFID readers in a partial region with low cost to gain superiority therefore its readers may perform attacks and other conspirators generate false reports to cover such malicious events. In this paper, we first introduce a simple game approach which only achieves Bayes equilibrium in a regular network between combined report readers and a detecting reader, then in the attacker dominated network, we propose an improved cooperative game where detecting nodes cooperate to evaluate trust of an unknown node from its organization reputation, the node’s prior trust and utility function is updated according to a reference report, therefore malicious node weights are reduced meanwhile a new Bayes equilibrium is achieved. The simulations show that the cooperative game improves successful deduction rate and decreases forged reports significantly.


Cooperative Game Malicious Node Simple Game Regular Network Signaling Game 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



This work is partially supported by the National Natural Science Foundation of China under Grant No.61173144 and No.61100181, the National Grand Fundamental Research 973 Program of China under Grant No.2011CB302605, National High-tech R&D Program of China (863 Program) under Grant No.2010AA012504 and No.2011AA010705.


  1. 1.
    Liu, W., Fang, B., Yin, L., Zhang, H.: A small world based routing approach of heterogeneous strategy in the Internet of Things. In: International Conference on Computer Science and Network Technology. (2011)Google Scholar
  2. 2.
    Raya, M., Aziz, A., Hubaux, J.P.: Efficient secure aggregation in VANETs. In: Proceedings of the 3rd International Workshop on Vehicular Ad hoc Networks, 67, 2006Google Scholar
  3. 3.
    Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Commun. ACM. 43(12), 45–48 (2000)CrossRefGoogle Scholar
  4. 4.
    Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. ACM. Trans. Sens. Netw. 4(3), 1–37 (2008)CrossRefGoogle Scholar
  5. 5.
    Srinivasan, A., Teitelbaum, J., Liang, H., Wu, J., Cardei, M.: Reputation and trust-based systems for ad hoc and sensor networks. In: Algorithms and Protocols for Wireless Ad Hoc and Sensor Networks, 2006Google Scholar
  6. 6.
    Graf, K., Mogre, P.S., Hollick, M., Steinmetz, R.: Detection of colluding misbehaving nodes in mobile ad hoc and wireless mesh networks. IEEE GLOBECOM 2007–2007 IEEE Global Telecommunications Conference, 5097–5101, 2007Google Scholar
  7. 7.
    Zhong, S., Wu, F.: On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks. In: MobiCom’07, 278, 2007Google Scholar
  8. 8.
    Patcha, A., Park, J.M.: A Game theoretic formulation for intrusion detection in mobile ad hoc networks. Int. J. Netw Security 2(2), 131–137 (2006)Google Scholar

Copyright information

© Springer Science+Business Media Dortdrecht 2012

Authors and Affiliations

  • Wenmao Liu
    • 1
  • Lihua Yin
    • 2
  • Binxing Fang
    • 1
  • Xiangzhan Yu
    • 1
  1. 1.School of Computer Science and TechnologyHarbin Institute of TechnologyHarbinChina
  2. 2.Institute of Computing TechnologyChinese Academy of SciencesBeijingChina

Personalised recommendations