Cooperation and end-to-end in the Internet

نویسندگان

  • Raimo Kantola
  • Hammad Kabir
  • Patrick Loiseau
چکیده

This paper analyses the motivation and strategies for ensuring cooperative behaviour among hosts and customer networks in the Internet and 5G networks. The hypothesis is that better cooperation among the benevolent entities could improve the overall Internet welfare, motivating the need for adoption of cooperative security. However, in state-of-the-art, the prevalent security approach in the Internet is based on self-help, while the adoption of cooperative methods is progressing slowly. At the same time, the ubiquitous reliance on 5G and mission critical nature of some of the new services, for example, ultra-reliable (machine-to-machine) communication and Internet of Things, requires that 5G will do its best to curb the malicious (noncooperative) behaviour from becoming a cause of failure to the legitimate services. In this paper, we relate our analysis of the conditions for sustainable cooperation in the Internet with the famous end-to-end principle, and present the hypothesis that there is no end-to-end solution to the problem of ensuring cooperation among Internet hosts. Game theory allows studying the outcomes of interactions among the players with conflicting interests. We use it to study the hypothesis, and show that introducing the reputation of Internet nodes and customer networks can lead to cooperation, which improves the overall Internet welfare and reduces the payoffs of malicious actors. We study the possible response of non-cooperative users with advanced defection strategies and the resulting outcomes. We argue that 5G shall make significant progress towards uprooting the selfish behaviour and malicious activities using cooperation and relate it with motivation for providing ubiquitous connectivity and ultra-reliable services. The paper concludes by summarizing our earlier work on the application of the proposed methods of cooperation to 5G and the Internet; outlining how cooperation in security is not only desirable but also feasible.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving the Performance of RPL Routing Protocol for Internet of Things

The emerging Internet of Things (IoT) connects the physical world to the digital one and composes large networks of smart devices to support various applications. In order to provide a suitable communication in such networks, a reliable routing protocol is needed. In this paper, a modified version of an IPv6 Routing Protocol for Low-Power and Lossy networks (RPL), which has been standardized by...

متن کامل

Web-Based Education in Teaching Medical Mycology to The Students of Pharmacy in Zabol University of Medical Sciences in 2009

Introduction: With regard to general benefits of e-learning in medical education, and the necessity of paying attention to it, this study was to assess the strength and weak points of web-based teaching in medical mycology course. Methods: In this descriptive comparative study conducted on pharmacy students in the first semester of 2009-2010, parallel to attendance and the traditional teaching...

متن کامل

Women’s Experience of Cultural Consequences of Internet-Based Marriage in Isfahan

One of the changes brought up by the Internet both in Iran and in the other parts of the world is internet-based marriage. The present study aimed to explore Isfahani women experiences of the cultural consequences of internet-based marriage. To this end, a qualitative-phenomenological research design was used. The participants in the research sample were 12 women who became familiar with their ...

متن کامل

A Survey of Anomaly Detection Approaches in Internet of Things

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

متن کامل

The Impact of Assertiveness Training on the Level of Academic Motivation and Internet Addiction of High School Students

This study set out to examine the impact of assertiveness training on the level of academic motivation and Internet addiction of high school students in Tehran. This quasi-experimental research had a pretest-posttest control group design. The statistical population of the study was comprised of all Tehrani 11th graders in school year 2017-18.  The drawn sample (N=80) was selected by multi-stage...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Int. J. Communication Systems

دوره 30  شماره 

صفحات  -

تاریخ انتشار 2017