首页> 外文OA文献 >Game Theoretic Path Selection to Support Security in Device-to-Device Communications
【2h】

Game Theoretic Path Selection to Support Security in Device-to-Device Communications

机译:支持设备间通信安全性的博弈论路径选择

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

1 Device-to-Device (D2D) communication is expected to be a key feature supportedudby 5G networks, especially due to the proliferation of Mobile EdgeudComputing (MEC), which has a prominent role in reducing network stressudby shifting computational tasks from the Internet to the mobile edge. Apartudfrom being part of MEC, D2D can extend cellular coverage allowing users toudcommunicate directly when telecommunication infrastructure is highly congestedudor absent. This significant departure from the typical cellular paradigmudimposes the need for decentralised network routing protocols. Moreover, enhancedudcapabilities of mobile devices and D2D networking will likely result inudproliferation of new malware types and epidemics. Although the literature isudrich in terms of D2D routing protocols that enhance quality-of-service and energyudconsumption, they provide only basic security support, e.g., in the form of encryption. Routing decisions can, however, contribute to collaborative detectionudof mobile malware by leveraging different kinds of anti-malware softwareudinstalled on mobile devices. Benefiting from the cooperative nature ofudD2D communications, devices can rely on each other's contributions to detectudmalware. The impact of our work is geared towards having more malware-freeudD2D networks. To achieve this, we designed and implemented a noveludrouting protocol for D2D communications that optimises routing decisionsudfor explicitly improving malware detection. The protocol identifies optimaludnetwork paths, in terms of malware mitigation and energy spent for malwareuddetection, based on a game theoretic model. Diverse capabilities of networkuddevices running different types of anti-malware software and their potentialudfor inspecting messages relayed towards an intended destination device areudleveraged using game theoretic tools. An optimality analysis of both Nashudand Stackelberg security games is undertaken, including both zero and nonzeroudsum variants, and the Defender's equilibrium strategies. By undertakingudnetwork simulations, theoretical results obtained are illustrated through randomlyudgenerated network scenarios showing how our protocol outperformsudconventional routing protocols, in terms of expected payoff, which consistsudof: security damage inflicted by malware and malware detection cost.
机译:1设备到设备(D2D)通讯有望成为5G网络支持的关键功能,尤其是由于移动边缘 udComputing(MEC)的激增,它在降低网络压力方面起着重要作用从Internet到移动边缘的任务。除了作为MEC的一部分外,D2D可以扩展蜂窝覆盖范围,从而允许用户在电信基础设施高度拥挤/不存在时直接进行通信。与典型的蜂窝范式的显着区别表明对分散式网络路由协议的需求。此外,移动设备和D2D网络的增强功能可能会导致新的恶意软件类型和流行病泛滥。尽管在提高服务质量和能耗的D2D路由协议方面文献不多,但它们仅提供基本的安全支持,例如以加密的形式。但是,路由决策可以通过利用移动设备上安装的各种反恶意软件来对移动恶意软件进行协同检测。受益于 udD2D通信的协作性质,设备可以依靠彼此的贡献来检测 udmalware。我们工作的影响力在于拥有更多无恶意软件的 udD2D网络。为此,我们设计和实现了一种新颖的D2D通信 udrouting协议,该协议优化了路由决策 ud,以显着改善恶意软件的检测。该协议基于游戏理论模型,根据缓解恶意软件和花费在恶意软件检测中的能量来识别最佳 udnetwork路径。使用博弈论工具来利用运行各种类型的反恶意软件的网络设备的多样化功能,以及检查用于中继到预期目标设备的消息的潜在能力。对Nash udand Stackelberg安全博弈进行了最优性分析,包括零和非零 udsum变体以及Defender的均衡策略。通过进行 udnetwork模拟,通过随机 udgeneated网络场景来说明获得的理论结果,以预期收益来说明我们的协议如何优于 ud传统路由协议,其中包括 udof:由恶意软件造成的安全破坏和恶意软件检测成本。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号