首页> 外文期刊>Ad hoc networks >Game theoretic path selection to support security in device-to-device communications
【24h】

Game theoretic path selection to support security in device-to-device communications

机译:游戏理论路径选择可支持设备到设备通信中的安全性

获取原文
获取原文并翻译 | 示例
           

摘要

Device-to-Device (D2D) communication is expected to be a key feature supported by 5G networks, especially due to the proliferation of Mobile Edge Computing (MEC), which has a prominent role in reducing network stress by shifting computational tasks from the Internet to the mobile edge. Apart from being part of MEC, D2D can extend cellular coverage allowing users to communicate directly when telecommunication infrastructure is highly congested or absent. This significant departure from the typical cellular paradigm imposes the need for decentralised network routing protocols. Moreover, enhanced capabilities of mobile devices and D2D networking will likely result in proliferation of new malware types and epidemics. Although the literature is rich in terms of D2D routing protocols that enhance quality-of-service and energy consumption, they provide only basic security support, e.g., in the form of encryption. Routing decisions can, however, contribute to collaborative detection of mobile malware by leveraging different kinds of anti-malware software installed on mobile devices. Benefiting from the cooperative nature of D2D communications, devices can rely on each others' contributions to detect malware. The impact of our work is geared towards having more malware-free D2D networks. To achieve this, we designed and implemented a novel routing protocol for D2D communications that optimises routing decisions for explicitly improving malware detection. The protocol identifies optimal network paths, in terms of malware mitigation and energy spent for malware detection, based on a game theoretic model. Diverse capabilities of network devices running different types of anti-malware software and their potential for inspecting messages relayed towards an intended destination device are leveraged using game theoretic tools. An optimality analysis of both Nash and Stackelberg security games is undertaken, including both zero and non-zero sum variants, and the Defender's equilibrium strategies. By undertaking network simulations, theoretical results obtained are illustrated through randomly generated network scenarios showing how our protocol outperforms conventional routing protocols, in terms of expected payoff, which consists of: security damage inflicted by malware and malware detection cost. (C) 2016 Elsevier B.V. All rights reserved.
机译:设备到设备(D2D)通信有望成为5G网络支持的一项关键功能,特别是由于移动边缘计算(MEC)的激增,它在通过从Internet转移计算任务来减轻网络压力方面发挥了重要作用移动端。除了作为MEC的一部分外,D2D还可以扩展蜂窝覆盖范围,从而允许用户在电信基础设施高度拥挤或不存在时直接进行通信。与典型的蜂窝范式的显着偏离提出了对分散式网络路由协议的需求。此外,移动设备和D2D网络功能的增强可能会导致新的恶意软件类型和流行病激增。尽管文献中有丰富的D2D路由协议可以增强服务质量和能耗,但它们仅提供基本的安全支持,例如以加密的形式。但是,路由决策可以利用安装在移动设备上的各种反恶意软件来促进对移动恶意软件的协作检测。得益于D2D通信的协作性质,设备可以依靠彼此的贡献来检测恶意软件。我们工作的影响力在于拥有更多无恶意软件的D2D网络。为了实现这一目标,我们设计和实现了一种用于D2D通信的新颖路由协议,该协议可以优化路由决策以显着改善恶意软件检测。该协议根据游戏理论模型,根据缓解恶意软件和检测恶意软件所消耗的能量来确定最佳网络路径。使用游戏理论工具,可以利用运行不同类型的反恶意软件的网络设备的多种功能,以及检查传递到预期目标设备的消息的潜力。对Nash和Stackelberg安全博弈进行了最优性分析,包括零和非零和变体以及Defender的均衡策略。通过进行网络模拟,通过随机生成的网络场景说明了获得的理论结果,这些场景显示了我们的协议在预期收益方面优于传统路由协议的情况,其中包括:恶意软件造成的安全破坏和恶意软件检测成本。 (C)2016 Elsevier B.V.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号