Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game

With the increasing demand of Quality of Service(QoS) in Crowdsensing Networks, providing broadcast authentication and preventing Denial of Service (DoS) attacks become not only a fundamental issue but also a challenging security service. The multi-level TESLA is a series of lightweight broadcast authentication protocols, which can effectively mitigate DoS attacks via randomly selected messages. However, the rule of the parameter selection still remains a problem. In this paper, we formulate the attack-defense model as an evolutionary game accordingly, and then present an optimal solution, which achieves security assurance along with minimum resource cost. We then analyze the stability of our evolutionary strategy theoretically. Simulation results are given to evaluate the performance of the proposed algorithm under low QoS channels and severe DoS attacks, which demonstrates that our proposed protocol canworks even in the extreme case.

[1]  Zhu Han,et al.  Game theoretic modeling of jamming attack in wireless powered communication networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[2]  Donggang Liu,et al.  Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.

[3]  Zhu Han,et al.  Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .

[4]  Enrico Gregori,et al.  Network sensing through smartphone-based crowdsourcing , 2013, SenSys '13.

[5]  Kim-Kwang Raymond Choo,et al.  Multi-sender Broadcast Authentication in Wireless Sensor Networks , 2014, 2014 Tenth International Conference on Computational Intelligence and Security.

[6]  Adrian Perrig,et al.  Flexible, extensible, and efficient VANET authentication , 2009, Journal of Communications and Networks.

[7]  Xuemin Shen,et al.  Security and privacy in mobile crowdsourcing networks: challenges and opportunities , 2015, IEEE Communications Magazine.

[8]  Eitan Altman,et al.  An evolutionary game approach for the design of congestion control protocols in wireless networks , 2008, 2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops.

[9]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[10]  Kaoru Ota,et al.  An incentive game based evolutionary model for crowd sensing networks , 2016, Peer-to-Peer Netw. Appl..

[11]  Malcolm Hall,et al.  ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing , 2013, MobiSys '13.

[12]  Jie Li,et al.  Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).

[13]  Norman M. Sadeh,et al.  Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.

[14]  Eitan Altman,et al.  Evolutionary Games in Wireless Networks , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[15]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[16]  Deepak Ganesan,et al.  TruCentive: A game-theoretic incentive platform for trustworthy mobile crowdsourcing parking services , 2012, 2012 15th International IEEE Conference on Intelligent Transportation Systems.

[17]  Alon Y. Halevy,et al.  Crowdsourcing systems on the World-Wide Web , 2011, Commun. ACM.

[18]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[19]  Kyung-Ah Shim,et al.  EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks , 2013, Ad Hoc Networks.

[20]  Shaojie Tang,et al.  A Differentially Private Selective Aggregation Scheme for Online User Behavior Analysis , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).