Signaling Game-based Misbehavior Inspection in V2I-enabled Highway Operations

نویسندگان

  • Manxi Wu
  • Li Jin
  • Saurabh Amin
  • Patrick Jaillet
چکیده

Vehicle-to-Infrastructure (V2I) communications are increasingly supporting highway operations such as electronic toll collection, carpooling, and vehicle platooning. In this paper we study the incentives of strategic misbehavior by individual vehicles who can exploit the security vulnerabilities in V2I communications and impact the highway operations. We consider a V2I-enabled highway segment facing two classes of vehicles (agent populations), each with an authorized access to one server (subset of lanes). Vehicles are strategic in that they can misreport their class (type) to the system operator and get unauthorized access to the server dedicated to the other class. This misbehavior causes a congestion externality on the compliant vehicles, and thus, needs to be deterred. We focus on an environment where the operator is able to inspect the vehicles for misbehavior based on their reported types. The inspection is costly and successful detection incurs a fine on the misbehaving vehicle. We formulate a signaling game to study the strategic interaction between the vehicle classes and the operator. Our equilibrium analysis provides conditions on the cost parameters that govern the vehicles’ incentive to misbehave, and determine the operator’s optimal inspection strategy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The resource-constraint project scheduling problem of the project subcontractors in a cooperative environment: Highway construction case study

Large-scale projects often have several activities which are performed by subcontractors with limited multi-resources. Project scheduling with limited resources is one of the most famous problems in the research operations and optimization cases. The resource-constraint project scheduling problem (RCPSP) is a NP-hard problem in which the activities of a project must be scheduled to reduce the p...

متن کامل

A Probabilistic Misbehavior Detection Scheme on Trust Establishment in Manets

Adversary detection in MANETs is very useful for scores of applications such as military, satellite, interplanetary and disaster rescue. Selfish antonyms and malicious behaviors represent a serious threat against routing in Mobile Ad-hoc Networks (MANETs). Due to the unique network characteristic, designing a misbehavior detection scheme in MANET is regarded as a great challenge. In this paper,...

متن کامل

A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks

Malicious and selfish behaviors represent a serious threat against routing in Delay/Disruption Tolerant Networks (DTNs). Due to the unique network characteristics, designing a misbehavior detection scheme in DTN is regarded as a great challenge. In this paper, we propose iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing towards efficient trust establishment. The basic...

متن کامل

Probabilistic Misbehaviour Detection and Optimization in Delay Tolerant Network

Malicious and selfish behaviors represent a serious threat against routing in Delay/Disruption Tolerant Networks (DTNs). Due to the unique network characteristics, designing a misbehavior detection scheme in DTN is regarded as a great challenge. iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing towards efficient trust establishment.. In this paper, we propose ant colo...

متن کامل

Seamless Connectivity Techniques in Vehicular Ad-hoc Networks

Emerging Vehicular Ad-hoc NETworks (VANETs) are representing the preferred network design for Intelligent Transportation Systems (ITS), mainly based on Dedicated Short-Range Communications (DSRC) for Vehicle-to-Vehicle (V2V) communications (Held, 2007). Future vehicles will be fully networked, equipped with on-board computers with multiple Network Interface Cards (NICs) (e.g., Wi-Fi, HSDPA, GPS...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2018