Game theoretic path selection to support security in device-to-device communications

Device-to-Device (D2D) communication is expected to be a key feature supported by 5G networks, especially due to the proliferation of Mobile Edge Computing (MEC), which has a prominent role in reducing network stress by shifting computational tasks from the Internet to the mobile edge. Apart from being part of MEC, D2D can extend cellular coverage allowing users to communicate directly when telecommunication infrastructure is highly congested or absent. This significant departure from the typical cellular paradigm imposes the need for decentralised network routing protocols. Moreover, enhanced capabilities of mobile devices and D2D networking will likely result in proliferation of new malware types and epidemics. Although the literature is rich in terms of D2D routing protocols that enhance quality-of-service and energy consumption, they provide only basic security support, e.g., in the form of encryption. Routing decisions can, however, contribute to collaborative detection of mobile malware by leveraging different kinds of anti-malware software installed on mobile devices. Benefiting from the cooperative nature of D2D communications, devices can rely on each others contributions to detect malware. The impact of our work is geared towards having more malware-free D2D networks. To achieve this, we designed and implemented a novel routing protocol for D2D communications that optimises routing decisions for explicitly improving malware detection. The protocol identifies optimal network paths, in terms of malware mitigation and energy spent for malware detection, based on a game theoretic model. Diverse capabilities of network devices running different types of anti-malware software and their potential for inspecting messages relayed towards an intended destination device are leveraged using game theoretic tools. An optimality analysis of both Nash and Stackelberg security games is undertaken, including both zero and non-zero sum variants, and the Defenders equilibrium strategies. By undertaking network simulations, theoretical results obtained are illustrated through randomly generated network scenarios showing how our protocol outperforms conventional routing protocols, in terms of expected payoff, which consists of: security damage inflicted by malware and malware detection cost.

[1]  K. J. Ray Liu,et al.  Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis , 2007, IEEE Transactions on Information Forensics and Security.

[2]  Halim Yanikomeroglu,et al.  Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions , 2014, IEEE Communications Magazine.

[3]  Stefan Parkvall,et al.  Design aspects of network assisted device-to-device communications , 2012, IEEE Communications Magazine.

[4]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[5]  Christos Politis,et al.  A game theoretic approach for securing AODV in emergency Mobile Ad Hoc Networks , 2009, 2009 IEEE 34th Conference on Local Computer Networks.

[6]  Kemal Ertugrul Tepe,et al.  Game theoretic approach in routing protocol for wireless ad hoc networks , 2009, Ad Hoc Networks.

[7]  D. Jhonson The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007 .

[8]  Milind Tambe,et al.  "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games , 2015, AAMAS.

[9]  Milind Tambe,et al.  Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .

[10]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[11]  J. Nash Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.

[12]  Christos Politis,et al.  Standardisation advancements in the area of routing for mobile ad-hoc networks , 2011, The Journal of Supercomputing.

[13]  Daniele Sgandurra,et al.  A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.

[14]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.

[15]  An Wang,et al.  A Stackelberg security game with cooperative jamming over a multiuser OFDMA network , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[16]  Carl Wijting,et al.  Device-to-device communication as an underlay to LTE-advanced networks , 2009, IEEE Communications Magazine.

[17]  Yu Liu,et al.  Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection , 2006, Int. J. Secur. Networks.

[18]  Georgios Kambourakis,et al.  The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones , 2014, EuroSec '14.

[19]  Wei Xu,et al.  Device-to-device communications: The physical layer security advantage , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[20]  David A. Maltz,et al.  The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007, RFC.

[21]  Mohsen Guizani,et al.  A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.

[22]  Vincent Conitzer,et al.  Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness , 2011, J. Artif. Intell. Res..

[23]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[24]  Jin-Hee Cho,et al.  Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks , 2010, IEEE Transactions on Reliability.

[25]  Chuan Ma,et al.  Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.

[26]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[27]  Prabir Bhattacharya,et al.  A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).

[28]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[29]  A. Patcha,et al.  A game theoretic approach to modeling intrusion detection in mobile ad hoc networks , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[30]  Marco Ajmone Marsan,et al.  Experimenting with floating content in an office setting , 2014, IEEE Communications Magazine.

[31]  K. J. Ray Liu,et al.  Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach , 2008, IEEE Transactions on Information Forensics and Security.

[32]  Levente Buttyán,et al.  Nash equilibria of packet forwarding strategies in wireless ad hoc networks , 2006, IEEE Transactions on Mobile Computing.

[33]  Li Wang,et al.  Device-to-Device Communications in Cellular Networks , 2016, SpringerBriefs in Electrical and Computer Engineering.

[34]  V. Vetriselvi,et al.  Cluster Based Co-operative Game Theory Approach for Intrusion Detection in Mobile Ad-Hoc Grid , 2008, 2008 16th International Conference on Advanced Computing and Communications.

[35]  Cristina Comaniciu,et al.  A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.

[36]  Mauro Conti,et al.  An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments , 2014, IEEE Transactions on Services Computing.

[37]  RYAN HEARTFIELD,et al.  A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks , 2015, ACM Comput. Surv..

[38]  Juan E. Tapiador,et al.  Evolution, Detection and Analysis of Malware for Smart Devices , 2014, IEEE Communications Surveys & Tutorials.

[39]  Mukesh Singhal,et al.  Secure routing in mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[40]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[41]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[42]  Mauro Conti,et al.  Secure Message Delivery Games for Device-to-Device Communications , 2014, GameSec.

[43]  N. Marchang,et al.  A Game Theoretical Approach for Efficient Deployment of Intrusion Detection System in Mobile Ad Hoc Networks , 2007, 15th International Conference on Advanced Computing and Communications (ADCOM 2007).

[44]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.

[45]  Xin-Ping Guan,et al.  Joint random access and power control game in ad hoc networks with noncooperative users , 2011, Ad Hoc Networks.

[46]  Ossama Younis,et al.  Throughput-oriented MAC for mobile ad hoc networks: A game-theoretic approach , 2009, Ad Hoc Networks.

[47]  Eitan Altman,et al.  Maximum Damage Malware Attack in Mobile Wireless Networks , 2012, IEEE/ACM Transactions on Networking.

[48]  Qing Wang,et al.  A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[49]  Nei Kato,et al.  Relay-by-smartphone: realizing multihop device-to-device communications , 2014, IEEE Communications Magazine.

[50]  Zhu Han,et al.  A Bayesian Overlapping Coalition Formation Game for Device-to-Device Spectrum Sharing in Cellular Networks , 2015, IEEE Transactions on Wireless Communications.

[51]  K. J. Ray Liu,et al.  Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks , 2007, IEEE Transactions on Mobile Computing.

[52]  Geoffrey Ye Li,et al.  Device-to-device communications in cellular networks , 2016, IEEE Communications Magazine.

[53]  Tansu Alpcan,et al.  Network Security , 2010 .