Bayesian mechanisms for wireless network security

Strategic users in a wireless network cannot be assumed to follow the network algorithms blindly. Moreover, some of these users could be controlled by powerful Botnets, which aim to use their knowledge about network algorithms to maliciously gain more resources and also to create interference to other users. We consider a scenario; in which a mechanism designer and legitimate users together, in a wireless network, gather probabilistic information about the presence of malicious users and modify their actions accordingly. The probabilistic information is gathered by observing the network over a long time period. We study Bayesian mechanisms, both pricing schemes and auctions, and obtain the Nash Equilibrium (NE) points of the underlying Bayesian games. The NE points provide conditions indicating when it is better for users to to hide or reveal their nature (types). The prices and allocations in the mechanisms are later modified using the Bayesian information about the type of the users. The numerical studies show the NE points and illustrate the results.

[1]  Sujit Gujar,et al.  Foundations of mechanism design: A tutorial Part 1-Key concepts and classical results , 2008 .

[2]  H. Vincent Poor,et al.  Mechanisms and Games for Dynamic Spectrum Allocation: Frontmatter , 2014 .

[3]  Tansu Alpcan,et al.  Network Security , 2010 .

[4]  Frank Kelly,et al.  Rate control for communication networks: shadow prices, proportional fairness and stability , 1998, J. Oper. Res. Soc..

[5]  Thomas F. La Porta,et al.  On cellular botnets: measuring the impact of malicious devices on a cellular network core , 2009, CCS.

[6]  Anthony Ephremides,et al.  MAC games for distributed wireless network security with incomplete information of selfish and malicious user types , 2009, 2009 International Conference on Game Theory for Networks.

[7]  Tamer Basar,et al.  Power allocation in team jamming games in wireless ad hoc networks , 2011, VALUETOOLS.

[8]  José Carlos Brustoloni,et al.  Bayesian bot detection based on DNS traffic similarity , 2009, SAC '09.

[9]  Holger Boche,et al.  Pricing mechanisms for multi-carrier wireless systems , 2011, 2011 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).

[10]  Ravishankar Borgaonkar,et al.  Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications , 2012, NDSS.

[11]  H. Vincent Poor,et al.  Mechanisms and Games for Dynamic Spectrum Allocation: Preface , 2013 .

[12]  Holger Boche,et al.  Adversarial Behavior in Network Games , 2014, Dynamic Games and Applications.

[13]  Yan Chen,et al.  Botnet Research Survey , 2008, 2008 32nd Annual IEEE International Computer Software and Applications Conference.