Identity Deception and Game Deterrence via Signaling Games
نویسندگان
چکیده
Maintenance and verification of persistent identities is an important problem in the area of networking. Particularly, their critical roles in Wireless Ad-hoc networks (WANETs) have become even more prominent as they begin to be deployed in several application domains. In these contexts, Sybil attacks, making use of replicated deceptive identities, represent a major challenge for the designers of these networks. Inspired by biological models of ant colonies and their dynamics studied via information asymmetric signaling games, we propose an architecture that can withstand Sybil attacks, similar to ants, using complex chemical signaling systems and associated physical actions, naturally ‘authenticate’ colony members. Here, we present a biomimetic authentication protocol with mechanisms similar to the physical processes of chemical diffusion, and formalize approaches to tame the deceptive use of identities; we dub the resulting game an“identity management signaling game”. To consider network system of nodes, pursuing non-cooperative and deceptive strategies, we develop an evolutionary game system allowing cooperative nodes to mutate deceptive strategies. We empirically study the dynamics using simulation experiments to select the parameters which affect the overall behaviors. Through experimentation we consider how an incentive package in the form of a shared database can impact system behavior.
منابع مشابه
Phishing for Phools in the Internet of Things: Modeling One-to-Many Deception using Poisson Signaling Games
Strategic interactions ranging from politics and pharmaceuticals to e-commerce and social networks support equilibria in which agents with private information manipulate others which are vulnerable to deception. Especially in cyberspace and the Internet of things, deception is difficult to detect and trust is complicated to establish. For this reason, effective policy-making, profitable entrepr...
متن کاملDeception by Design: Evidence-Based Signaling Games for Network Defense
Deception plays a critical role in the financial industry, online markets, national defense, and countless other areas. Understanding and harnessing deception especially in cyberspace is both crucial and difficult. Recent work in this area has used game theory to study the roles of incentives and rational behavior. Building upon this work, we employ a game-theoretic model for the purpose of mec...
متن کاملGames, Strategy, and Politics
The application of game theory—and an alternative strategic theory called “theory of moves”—and social-choice theory to a wide variety of strategic situations, principally but not exclusively in politics, will be studied. Uses of strategy in voting in committees and elections, in political campaigns, in the defense and deterrence policies of nations, and in bargaining and coalition-building sit...
متن کاملCognitive neuroscience of honesty and deception: A signaling framework.
Understanding the neural basis of human honesty and deception has enormous potential scientific and practical value. However, past approaches, largely developed out of studies with forensic applications in mind, are increasingly recognized as having serious methodological and conceptual shortcomings. Here we propose to address these challenges by drawing on so-called signaling games widely used...
متن کاملA TRANSITION FROM TWO-PERSON ZERO-SUM GAMES TO COOPERATIVE GAMES WITH FUZZY PAYOFFS
In this paper, we deal with games with fuzzy payoffs. We proved that players who are playing a zero-sum game with fuzzy payoffs against Nature are able to increase their joint payoff, and hence their individual payoffs by cooperating. It is shown that, a cooperative game with the fuzzy characteristic function can be constructed via the optimal game values of the zero-sum games with fuzzy payoff...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- ICST Trans. Security Safety
دوره 3 شماره
صفحات -
تاریخ انتشار 2015