首页> 外文会议>IEEE International Conference on Self-Adaptive and Self-Organizing Systems >Sybil-Resistant Meta Strategies for the Forwarder's Dilemma
【24h】

Sybil-Resistant Meta Strategies for the Forwarder's Dilemma

机译:抵御Sybil的元策略,解决货运公司的困境

获取原文

摘要

Cooperation is the foundation of wireless ad hoc networks with nodes forwarding their neighbors' packets for the common good. However, energy and bandwidth constraints combined with selfish behaviour lead to collapsed networks where all nodes defect. Researchers have tried to incentivize or enforce the nodes for cooperation in various ways. However, these techniques do not consider the heterogeneous networks in which a diverse set of nodes with different cognitive capabilities exist. Furthermore, in ad hoc networks identity is a fuzzy concept. It is easy to forge multiple identities and hide defective behaviour. Moreover, the nature of the wireless medium is always ambiguous due to collisions, interference and asymmetric links. In all this uncertainty, having complete information about the intentions of the nodes and acting on it is not straightforward. Backed by evolutionary game theory and multi-agent systems research, we adapt and modify two meta strategies to embrace this uncertainty. These modified meta strategies, Win Stay Loose Shift and Stochastic Imitate Best Strategy, do not require strict identity information and only depend on nodes' own capabilities. Nodes monitor the traffic in their neighbourhood by using a two-hop overhearing method, and decide whether they should be cooperative or defective. We show that nodes are able to discover and use the best strategy in their locality and protect themselves against the exploitation by free riders who devise Sybil attacks by changing their identities.
机译:合作是无线自组织网络的基础,其中节点为了共同利益而转发其邻居的数据包。但是,能量和带宽限制以及自私行为导致所有节点均出现故障的网络崩溃。研究人员已尝试以各种方式激励或加强节点之间的合作。但是,这些技术没有考虑存在各种具有不同认知能力的节点的异构网络。此外,在自组织网络中,身份是一个模糊的概念。容易伪造多个身份并隐藏不良行为。此外,由于冲突,干扰和非对称链路,无线介质的性质始终是模棱两可的。在所有这些不确定性中,拥有有关节点意图并对其采取行动的完整信息并不是一件容易的事。在进化博弈论和多智能体系统研究的支持下,我们调整并修改了两种元策略来应对这种不确定性。这些经过修改的元策略,即“保持宽松的班次”和“随机模仿最佳策略”,不需要严格的身份信息,而仅取决于节点自身的能力。节点通过使用两跳监听方法监视其附近的流量,并确定它们是协作还是有缺陷。我们表明,节点能够发现并使用其本地最佳策略,并保护自己免受免费骑手的利用,这些骑手通过更改身份来设计Sybil攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号