Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory

Conducting reputation management is very important for Internet of vehicles. However, most of the existing work evaluate the effectiveness of their schemes with settled attacking behaviors in their simulation, which cannot represent the real scenarios. In this paper, we propose to consider dynamical and diversity attacking strategies in the simulation of reputation management scheme evaluation. To that end, we apply evolutionary game theory to model the evolution process of malicious users’ attacking strategies, and discuss the methodology of the evaluation simulations. We further apply our evaluation method to a reputation management scheme with multiple utility functions, and discuss the evaluation results. The results indicate that our evaluation method is able to depict the evolving process of the dynamic attacking strategies in a vehicular network, and the final state of the simulation could be used to quantify the protection effectiveness of the reputation management scheme.

[1]  J. Neumann,et al.  Theory of games and economic behavior , 1945, 100 Years of Math Milestones.

[2]  J. Nash Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.

[3]  B. Thomas Evolutionary stability: States and strategies , 1984 .

[4]  B. Thomas On evolutionarily stable sets , 1985 .

[5]  A. Rubinstein Modeling Bounded Rationality , 1998 .

[6]  Yao Wang,et al.  Toward Trust and Reputation Based Web Service Selection : A Survey , 2007 .

[7]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[8]  Matthias Gerlach,et al.  Trust for Vehicular Applications , 2007, Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07).

[9]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[10]  Xiaojiang Du,et al.  Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet , 2007, IEEE Communications Magazine.

[11]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[12]  Wei Sun,et al.  Information Security Problem Research Based on Game Theory , 2008, 2008 International Symposium on Electronic Commerce and Security.

[13]  Xiaojiang Du,et al.  Security in wireless sensor networks , 2008, IEEE Wireless Communications.

[14]  Tansu Alpcan,et al.  Security games for vehicular networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[15]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[16]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[17]  Dusit Niyato,et al.  Dynamics of Network Selection in Heterogeneous Wireless Networks: An Evolutionary Game Approach , 2009, IEEE Transactions on Vehicular Technology.

[18]  Athanasios D. Panagopoulos,et al.  A survey on game theory applications in wireless networks , 2010, Comput. Networks.

[19]  C. Chen,et al.  A Trust-based Message Propagation and Evaluation Framework in VANETs , 2010 .

[20]  Chase Qishi Wu,et al.  A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[21]  Fethi Filali,et al.  A Comparative Study between 802.11p and Mobile WiMAX-based V2I Communication Networks , 2010, 2010 Fourth International Conference on Next Generation Mobile Applications, Services and Technologies.

[22]  Pin-Han Ho,et al.  A Trust Modeling Framework for Message Propagation and Evaluation in VANETs , 2010, 2010 2nd International Conference on Information Technology Convergence and Services.

[23]  Jie Zhang,et al.  A Survey on Trust Management for VANETs , 2011, 2011 IEEE International Conference on Advanced Information Networking and Applications.

[24]  Guanhua Yan,et al.  Towards a bayesian network game framework for evaluating DDoS attacks and defense , 2012, CCS '12.

[25]  Jing Cao,et al.  Routing Algorithm Based on Multi-Community Evolutionary Game for VANET , 2012, J. Networks.

[26]  Simon Tjoa,et al.  Game-based Simulation of Distributed Denial of Service (DDoS) Attack and Defense Mechanisms of Critical Infrastructures , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).

[27]  Shrikant S. Tangade,et al.  A survey on attacks, security and trust management solutions in VANETs , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[28]  Hongsong Zhu,et al.  The RSU Access Problem Based on Evolutionary Game Theory for VANET , 2013, Int. J. Distributed Sens. Networks.

[29]  Rajasekhar Mungara,et al.  A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .

[30]  Sankardas Roy,et al.  A game inspired defense mechanism against distributed denial of service attacks , 2014, Secur. Commun. Networks.

[31]  Li Yang,et al.  A digital evidence fusion method in network forensics systems with Dempster-shafer theory , 2014, China Communications.

[32]  Pascual Campoy Cervera,et al.  Computer vision based general object following for GPS-denied multirotor unmanned vehicles , 2014, 2014 American Control Conference.

[33]  Lan Dong,et al.  A digital evidence fusion method in network forensics systems with Dempster-shafer theory , 2014 .

[34]  Jun Zhang,et al.  Information dissemination in vehicular networks via evolutionary game theory , 2014, 2014 IEEE International Conference on Communications (ICC).

[35]  Roberto Di Pietro,et al.  Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..

[36]  Zhihong Tian,et al.  A transductive scheme based inference techniques for network forensic analysis , 2015 .

[37]  Abbas Jamalipour,et al.  An Evolutionary Game Theory-Based Approach to Cooperation in VANETs Under Different Network Conditions , 2015, IEEE Transactions on Vehicular Technology.

[38]  Hasan Omar Al-Sakran,et al.  Intelligent Traffic Information System Based on Integration of Internet of Things and Agent Technology , 2015 .

[39]  Kenneth N. Brown,et al.  An Efficient Dispatch and Decision-Making Model for Taxi-Booking Service , 2015, 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom).

[40]  Pratap Tokekar,et al.  Sensor Planning for a Symbiotic UAV and UGV System for Precision Agriculture , 2016, IEEE Trans. Robotics.

[41]  Zhihai Rong,et al.  Extortion provides alternative routes to the evolution of cooperation in structured populations. , 2017, Physical review. E.

[42]  Jie Zhang,et al.  Towards Expanded Trust Management for Agents in Vehicular Ad-hoc Networks , 2017 .

[43]  Feng Jiang,et al.  A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices , 2018, Wirel. Commun. Mob. Comput..

[44]  Shen Su,et al.  A Privacy Preserving Scheme for Nearest Neighbor Query , 2018, Sensors.

[45]  Zhihai Rong,et al.  The emergence of cooperation-extortion alliance on scale-free networks with normalized payoff , 2018, EPL (Europhysics Letters).

[46]  Xiaoxia Yin,et al.  A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus , 2018, IEEE Access.

[47]  Shen Su,et al.  Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment , 2019, IEEE Transactions on Industrial Informatics.

[48]  Jinqiao Shi,et al.  Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services , 2019, IEEE Internet of Things Journal.

[49]  Xianzhi Wang,et al.  Trust architecture and reputation evaluation for internet of things , 2018, J. Ambient Intell. Humaniz. Comput..

[50]  Mohsen Guizani,et al.  A data-driven method for future Internet route decision modeling , 2019, Future Gener. Comput. Syst..

[51]  Feng Jiang,et al.  Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security , 2020, IEEE Transactions on Sustainable Computing.