Quantified Analysis of Security Issues and Its Mitigation in Blockchain Using Game Theory

Author(s):  
Ashis Kumar Samanta ◽  
Bidyut Biman Sarkar ◽  
Nabendu Chaki
Symmetry ◽  
2019 ◽  
Vol 11 (2) ◽  
pp. 215 ◽  
Author(s):  
Yu Yang ◽  
Bichen Che ◽  
Yang Zeng ◽  
Yang Cheng ◽  
Chenyang Li

With the rapid development and widespread applications of Internet of Things (IoT) systems, the corresponding security issues are getting more and more serious. This paper proposes a multistage asymmetric information attack and defense model (MAIAD) for IoT systems. Under the premise of asymmetric information, MAIAD extends the single-stage game model with dynamic and evolutionary game theory. By quantifying the benefits for both the attack and defense, MAIAD can determine the optimal defense strategy for IoT systems. Simulation results show that the model can select the optimal security defense strategy for various IoT systems.


2011 ◽  
Vol 2-3 ◽  
pp. 599-603 ◽  
Author(s):  
Feng Yun Li ◽  
Fu Xiang Gao ◽  
Lan Yao ◽  
Gui Ran Chang

Aiming at the limited resources and the security issues in wireless sensor networks, a routing approach is proposed. In this approach, the factors of reputation, remaining energy, and the distance to the destination are taken into considered while searching a routing path from an original sender node to the destination. A reputation-based mechanism is also proposed, and a node’s reputation depends on its behaviors. The malicious behaviors nodes will be punished and isolated, and the cooperative ones will be rewarded. Simulation results show that our proposed routing scheme can prolong the lifetime of the network and can offers a relatively high throughput than other routing protocols even when there are malicious nodes in the networks.


Sensors ◽  
2019 ◽  
Vol 20 (1) ◽  
pp. 221
Author(s):  
Libingyi Huang ◽  
Guoqing Jia ◽  
Weidong Fang ◽  
Wei Chen ◽  
Wuxiong Zhang

The widespread application of networks is providing a better platform for the development of society and technology. With the expansion of the scope of network applications, many issues need to be solved. Among them, the maximization of utility and the improvement of security have attracted much attention. Many existing attacks mean the network faces security challenges. The concept of trust should be considered to address these security issues. Meanwhile, the utility of the network, including efficiency, profit, welfare, etc., are concerns that should be maximized. Over the past decade, the concepts of game and trust have been introduced to various types of networks. However, there is a lack of research effort on several key points in distributed networks, which are critical to the information transmission of distributed networks, such as expelling malicious nodes quickly and accurately and finding equilibrium between energy assumption and high transmission rate. The purpose of this paper is to give a holistic overview of existing research on trust and game theory in networks. We analyzed that network utility can be maximized in terms of effectiveness, profits, and security. Moreover, a possible research agenda is proposed to promote the application and development of game theory and trust for improving security and maximizing utility.


Author(s):  
Kaizhi Huang ◽  
Mingliang Li ◽  
Zhou Zhong ◽  
Hua Zhao

This chapter provides a comprehensive review of the domain of game theory based physical layer security in wireless communications. By exploiting the wireless channel characteristic and secure cooperation of nodes, physical layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, without relying on higher-layer encryption. However, the selfness of nodes seriously affects the secure cooperation; game theory can model the influence of the selfness on physical layer security. This chapter firstly describes the physical layer security issues in the wireless networks and the role of game theory in the research on physical layer security. And then the typical applications of game theory in physical layer security are subsequently covered, including zero-sum game, Stackelberg game, auction theory, coalition game. Finally, the chapter concludes with observations on potential research directions in this area.


2014 ◽  
Vol 513-517 ◽  
pp. 1882-1885
Author(s):  
Feng Ming Liu ◽  
Ting Ting Ma ◽  
Kun Zhou

With the development of cloud computing, a number of cloud security issues have emerged. This paper firstly introduce the cloud computing and security risks briefly, then use game theory to analyze strategies between cloud service providers and that between providers and users, finally, put forward the improved methods for trust management.


2020 ◽  
Vol 13 (2) ◽  
pp. 249-272
Author(s):  
Zuzana Špačková ◽  
David Špaček

AbstractSince its origins, when it was mainly connected to the field of economics, game theory has brought important theoretic insights into many domains. Besides biology, philosophy or computer science, its findings have been applied to various fields of public policy. One specific area of public policy is that of security. Within the last two decades we have been witnesses to a significant increase in efforts to model security issues using tools of game theory and to derive political implications. The paper deals with the model of a Stackelberg security game and its real-world applications in security domains. The main aim and purpose of the paper is to provide a survey of selected cases of real-world deployed applications of the game-theoretic Stackelberg model in the area of public security and, based on the literature analysis, to discuss the potential and limitations of the model for policy- and decision-makers that are dealing with security measures on various governmental levels. Existing cases clearly indicate that the model can contribute to a better design and implementation of the security policy and help implement a better allocation of resources and thus potentially improve the effectiveness of security measures. On the other hand, the paper also discusses some limitations and potential future adjustments of the model together with points for further research.


Author(s):  
Ein-Ya Gura ◽  
Michael Maschler
Keyword(s):  

Author(s):  
Zhu Han ◽  
Dusit Niyato ◽  
Walid Saad ◽  
Tamer Basar ◽  
Are Hjorungnes

Sign in / Sign up

Export Citation Format

Share Document