W. Casey, Parisa Memarmoshrefi, Ansgar Kellner, J. Morales, B. Mishra
{"title":"基于信号博弈的身份欺骗与博弈威慑","authors":"W. Casey, Parisa Memarmoshrefi, Ansgar Kellner, J. Morales, B. Mishra","doi":"10.4108/eai.3-12-2015.2262519","DOIUrl":null,"url":null,"abstract":"Maintenance and verication of persistent identities is an \n \nimportant problem in the area of networking. Particularly, \n \ntheir critical roles in Wireless Ad-hoc networks (WANETs) \n \nhave become even more prominent as they begin to be deployed \n \nin several application domains. In these contexts, \n \nSybil attacks, making use of replicated deceptive identities, \n \nrepresent a major challenge for the designers of these networks. \n \nInspired by biological models of ant colonies and \n \ntheir dynamics studied via information asymmetric signaling \n \ngames, we propose an architecture that can withstand Sybil \n \nattacks, similar to ants, using complex chemical signaling \n \nsystems and associated physical actions, naturally `authenticate' \n \ncolony members. Here, we present a biomimetic authentication \n \nprotocol with mechanisms similar to the physical \n \nprocesses of chemical diusion, and formalize approaches \n \nto tame the deceptive use of identities; we dub the resulting \n \ngame an\\identity management signaling game\". To consider \n \nnetwork system of nodes, pursuing non-cooperative and deceptive \n \nstrategies, we develop an evolutionary game system \n \nallowing cooperative nodes to mutate deceptive strategies. \n \nWe empirically study the dynamics using simulation experiments \n \nto select the parameters which aect the overall behaviors. \n \nThrough experimentation we consider how an in- \n \ncentive package in the form of a shared database can impact \n \nsystem behavior.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Identity Deception and Game Deterrence via Signaling Games\",\"authors\":\"W. Casey, Parisa Memarmoshrefi, Ansgar Kellner, J. Morales, B. Mishra\",\"doi\":\"10.4108/eai.3-12-2015.2262519\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Maintenance and verication of persistent identities is an \\n \\nimportant problem in the area of networking. Particularly, \\n \\ntheir critical roles in Wireless Ad-hoc networks (WANETs) \\n \\nhave become even more prominent as they begin to be deployed \\n \\nin several application domains. In these contexts, \\n \\nSybil attacks, making use of replicated deceptive identities, \\n \\nrepresent a major challenge for the designers of these networks. \\n \\nInspired by biological models of ant colonies and \\n \\ntheir dynamics studied via information asymmetric signaling \\n \\ngames, we propose an architecture that can withstand Sybil \\n \\nattacks, similar to ants, using complex chemical signaling \\n \\nsystems and associated physical actions, naturally `authenticate' \\n \\ncolony members. Here, we present a biomimetic authentication \\n \\nprotocol with mechanisms similar to the physical \\n \\nprocesses of chemical diusion, and formalize approaches \\n \\nto tame the deceptive use of identities; we dub the resulting \\n \\ngame an\\\\identity management signaling game\\\". To consider \\n \\nnetwork system of nodes, pursuing non-cooperative and deceptive \\n \\nstrategies, we develop an evolutionary game system \\n \\nallowing cooperative nodes to mutate deceptive strategies. \\n \\nWe empirically study the dynamics using simulation experiments \\n \\nto select the parameters which aect the overall behaviors. \\n \\nThrough experimentation we consider how an in- \\n \\ncentive package in the form of a shared database can impact \\n \\nsystem behavior.\",\"PeriodicalId\":335727,\"journal\":{\"name\":\"EAI Endorsed Trans. Security Safety\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"EAI Endorsed Trans. Security Safety\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4108/eai.3-12-2015.2262519\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"EAI Endorsed Trans. Security Safety","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4108/eai.3-12-2015.2262519","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Identity Deception and Game Deterrence via Signaling Games
Maintenance and verication of persistent identities is an
important problem in the area of networking. Particularly,
their critical roles in Wireless Ad-hoc networks (WANETs)
have become even more prominent as they begin to be deployed
in several application domains. In these contexts,
Sybil attacks, making use of replicated deceptive identities,
represent a major challenge for the designers of these networks.
Inspired by biological models of ant colonies and
their dynamics studied via information asymmetric signaling
games, we propose an architecture that can withstand Sybil
attacks, similar to ants, using complex chemical signaling
systems and associated physical actions, naturally `authenticate'
colony members. Here, we present a biomimetic authentication
protocol with mechanisms similar to the physical
processes of chemical diusion, and formalize approaches
to tame the deceptive use of identities; we dub the resulting
game an\identity management signaling game". To consider
network system of nodes, pursuing non-cooperative and deceptive
strategies, we develop an evolutionary game system
allowing cooperative nodes to mutate deceptive strategies.
We empirically study the dynamics using simulation experiments
to select the parameters which aect the overall behaviors.
Through experimentation we consider how an in-
centive package in the form of a shared database can impact
system behavior.