Bayesian mechanisms and learning for wireless networks security with QoS requirements

When there are strategic and malicious users in a wireless network, the resource allocation is complicated due to the information limitation about the nature of users and network parameters. Bayesian games are appropriate tools to analyze the network resource allocation with heterogeneous users. We consider a scenario with arbitrary number of malicious users in the network, in which individual users gather probabilistic information about the density of malicious users. Users and the base station observe the network over a long time period and modify their actions accordingly. The power allocation in wireless networks which we consider in this paper, is subject to Quality of Service (QoS) requirements. We consider Bayesian pricing mechanisms where the prices are modified using the Bayesian information about types of the users to satisfy the QoS requirements. We also give detection methods based on regression learning algorithms which are used for forming the probability of a user being malicious. The utilities of the users are formed by observing the power strategies of the users and the anomalies are detected. We obtain numerically, the Bayesian Nash Equilibrium (BNE) points of the Bayesian games. We also evaluate the effect of incomplete information on the satisfaction of the QoS requirements of the users in the mechanisms. These mechanisms are with prices which were originally developed for networks with complete information.

[1]  Holger Boche,et al.  Adversarial Behavior in Network Games , 2014, Dynamic Games and Applications.

[2]  Saeed Gazor,et al.  Distributed Power Control in Cellular Communication Systems Concerning Inaccurate SINR Reports , 2011, IEEE Transactions on Vehicular Technology.

[3]  Dongbing Gu,et al.  Spatial Gaussian Process Regression With Mobile Sensor Networks , 2012, IEEE Transactions on Neural Networks and Learning Systems.

[4]  Holger Boche,et al.  Detecting misbehavior in distributed wireless interference networks , 2013, Wirel. Networks.

[5]  Lin Gao,et al.  Wireless Network Pricing , 2013, Wireless Network Pricing.

[6]  George C. Polyzos,et al.  A Differentiated Services QoS Scheme Preventing Malicious Flow Behavior in Mobile Ad hoc Networks , 2006 .

[7]  Tansu Alpcan,et al.  Learning user preferences in mechanism design , 2011, IEEE Conference on Decision and Control and European Control Conference.

[8]  Sujit Gujar,et al.  Foundations of mechanism design: A tutorial Part 2-Advanced concepts and results , 2008 .

[9]  Fei Shen,et al.  Universal Non-Linear Cheat-Proof Pricing Framework for Wireless Multiple Access Channels , 2014, IEEE Transactions on Wireless Communications.

[10]  Cem U. Saraydar,et al.  Efficient power control via pricing in wireless data networks , 2002, IEEE Trans. Commun..

[11]  Holger Boche,et al.  Bayesian mechanisms for wireless network security , 2014, 2014 IEEE International Conference on Communications (ICC).

[12]  John S. Baras,et al.  An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks , 2008, TSEC.

[13]  Niki Pissinou,et al.  Modeling cooperative, selfish and malicious behaviors for Trajectory Privacy Preservation using Bayesian game theory , 2013, 38th Annual IEEE Conference on Local Computer Networks.

[14]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[15]  Holger Boche,et al.  Pricing for distributed resource allocation in MAC without SIC under QoS requirements with malicious users , 2014, 2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).