Bayesian Cooperative Coalition Game as a Service for RFID-Based Secure QoS Management in Mobile Cloud

In this paper, the problem of maintaining the quality of service with respect to high communication cost, available bandwidth, and security is investigated in a mobile cloud environment. A Bayesian cooperative coalition game is formulated in which learning automata stationed at Radio frequency identification (RFID) readers are assumed as the players. These players form a coalition among themselves using newly defined payoff value function (PVF) based upon the communication cost, network bandwidth, and storage requirements. Each player in the game makes his best efforts to increase his individual PVF for which it selects one of the strategies from the strategy space using the conditional probability. For each action taken by the players, they may get a reward or a penalty from the environment according to which they update their action probability vector. Tags are arranged in acyclic directed graph, and a secure access control algorithm is proposed, which results a complexity of $O(\log (n))$ in comparison with earlier solutions having the complexity of $O(n)$ . The proposed scheme is evaluated in comparison with other schemes by extensive simulations using various metrics. The results obtained show that the proposed scheme is effective in maintaining the RFID-based secure data dissemination in the mobile cloud environment. In particular, there is a reduction of 20% in computational time, and overhead generated with an increase of more than 30% in packet delivery ratio.

[1]  S. M. Chen,et al.  Cryptanalysis on the RFID ACTION Protocol , 2011 .

[2]  Xiaomei Wang,et al.  SQL Injections through Back-End of RFID System , 2009, 2009 International Symposium on Computer Network and Multimedia Technology.

[3]  Jong Hyuk Park,et al.  ALCA: agent learning–based clustering algorithm in vehicular ad hoc networks , 2012, Personal and Ubiquitous Computing.

[4]  Robert Simon Sherratt,et al.  Enhanced three-factor security protocol for consumer USB mass storage devices , 2014, IEEE Transactions on Consumer Electronics.

[5]  Zhu Han,et al.  Coalition Formation Games for Distributed Cooperation Among Roadside Units in Vehicular Networks , 2010, IEEE Journal on Selected Areas in Communications.

[6]  Joel J. P. C. Rodrigues,et al.  An intelligent approach for building a secure decentralized public key infrastructure in VANET , 2015, J. Comput. Syst. Sci..

[7]  Athanasios V. Vasilakos,et al.  Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs , 2011, Math. Comput. Model..

[8]  Sudip Misra,et al.  LACAV: an energy-efficient channel assignment mechanism for vehicular ad hoc networks , 2011, The Journal of Supercomputing.

[9]  Tingwen Huang,et al.  Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud , 2014, Inf. Sci..

[10]  Naveen K. Chilamkurti,et al.  Learning Automata-based Opportunistic Data Aggregation and Forwarding scheme for alert generation in Vehicular Ad Hoc Networks , 2014, Comput. Commun..

[11]  Morshed U. Chowdhury,et al.  Mutual authentication with malware protection for a RFID system , 2010, ICIT 2010.

[12]  Athanasios V. Vasilakos,et al.  The use of learning algorithms in ATM networks call admission control problem: a methodology , 2000, Comput. Networks.

[13]  Yunhao Liu,et al.  ACTION: Breaking the Privacy Barrier for RFID Systems , 2009, IEEE INFOCOM 2009.

[14]  Jemal H. Abawajy,et al.  Scalable RFID security framework and protocol supporting Internet of Things , 2014, Comput. Networks.

[15]  Ming-Hour Yang,et al.  Secure multiple group ownership transfer protocol for mobile RFID , 2012, Electron. Commer. Res. Appl..

[16]  Andrew H. Sung,et al.  SQL infections through RFID , 2007, Journal in Computer Virology.

[17]  Nei Kato,et al.  GT-CFS: A Game Theoretic Coalition Formulation Strategy for Reducing Power Loss in Micro Grids , 2014, IEEE Transactions on Parallel and Distributed Systems.

[18]  Hung-Min Sun,et al.  CRFID: An RFID system with a cloud database as a back-end server , 2014, Future Gener. Comput. Syst..

[19]  Zahir Tari,et al.  CoCaMAAL: A cloud-oriented context-aware middleware in ambient assisted living , 2014, Future Gener. Comput. Syst..

[20]  Athanasios V. Vasilakos,et al.  A new approach to the design of reinforcement schemes for learning automata: Stochastic estimator learning algorithm , 1995, Neurocomputing.

[21]  Elisa Bertino,et al.  An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds , 2014, IEEE Transactions on Knowledge and Data Engineering.

[22]  Joel J. P. C. Rodrigues,et al.  Bayesian Coalition Game for Contention-Aware Reliable Data Forwarding in Vehicular Mobile Cloud , 2015, Future Gener. Comput. Syst..

[23]  Dusit Niyato,et al.  Coalition-Based Cooperative Packet Delivery under Uncertainty: A Dynamic Bayesian Coalitional Game , 2013, IEEE Transactions on Mobile Computing.

[24]  Mohammad Reza Meybodi,et al.  Mobility-based multicast routing algorithm for wireless mobile Ad-hoc networks: A learning automata approach , 2010, Comput. Commun..

[25]  Levente Buttyán,et al.  Group-Based Private Authentication , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[26]  Naveen K. Chilamkurti,et al.  Bayesian Coalition Negotiation Game as a Utility for Secure Energy Management in a Vehicles-to-Grid Environment , 2016, IEEE Transactions on Dependable and Secure Computing.

[27]  V. Potdar,et al.  Recovering and Restoring Tampered RFID Data using Steganographic Principles , 2006, 2006 IEEE International Conference on Industrial Technology.

[28]  Jemal H. Abawajy,et al.  Securing RFID Systems from SQLIA , 2011, ICA3PP.

[29]  Joel J. P. C. Rodrigues,et al.  Intelligent Mobile Video Surveillance System as a Bayesian Coalition Game in Vehicular Sensor Networks: Learning Automata Approach , 2015, IEEE Transactions on Intelligent Transportation Systems.

[30]  Mohammad S. Obaidat,et al.  Networks of learning automata for the vehicular environment: a performance analysis study , 2014, IEEE Wireless Communications.

[31]  Paul Müller,et al.  Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[32]  Naveen K. Chilamkurti,et al.  Bayesian coalition game for the internet of things: an ambient intelligence-based evaluation , 2015, IEEE Communications Magazine.

[33]  Naveen K. Chilamkurti,et al.  Collaborative trust aware intelligent intrusion detection in VANETs , 2014, Comput. Electr. Eng..

[34]  Athanasios V. Vasilakos,et al.  On the Partially Overlapped Channel Assignment on Wireless Mesh Network Backbone: A Game Theoretic Approach , 2012, IEEE Journal on Selected Areas in Communications.

[35]  Jongsung Kim,et al.  ELACCA: Efficient Learning Automata Based Cell Clustering Algorithm for Wireless Sensor Networks , 2013, Wirel. Pers. Commun..

[36]  Naveen K. Chilamkurti,et al.  Bayesian Coalition Game as-a-Service for Content Distribution in Internet of Vehicles , 2014, IEEE Internet of Things Journal.

[37]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[38]  Laurence T. Yang,et al.  Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing , 2015, IEEE Transactions on Parallel and Distributed Systems.

[39]  Ivan Stojmenovic,et al.  GTES: An Optimized Game-Theoretic Demand-Side Management Scheme for Smart Grid , 2014, IEEE Systems Journal.

[40]  Hung-Yu Chien,et al.  SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity , 2007, IEEE Transactions on Dependable and Secure Computing.

[41]  Xun Xu,et al.  Development of a Hybrid Manufacturing Cloud , 2014 .

[42]  Haohong Wang,et al.  Toward Blind Scheduling in Mobile Media Cloud: Fairness, Simplicity, and Asymptotic Optimality , 2013, IEEE Transactions on Multimedia.

[43]  Jemal H. Abawajy SQLIA detection and prevention approach for RFID systems , 2013, J. Syst. Softw..

[44]  Mohsen Guizani,et al.  Exploring blind online scheduling for mobile cloud multimedia services , 2013, IEEE Wireless Communications.

[45]  Mohammad S. Obaidat,et al.  Collaborative Learning Automata-Based Routing for Rescue Operations in Dense Urban Regions Using Vehicular Sensor Networks , 2015, IEEE Systems Journal.

[46]  Chris J. Mitchell,et al.  RFID authentication protocol for low-cost tags , 2008, WiSec '08.