Professional Documents
Culture Documents
• Committee:
• Dr. Kang Yen Dr. Jean Andrian Dr. Deng Pan Dr. Charles Kamhoua
1
Outline
Introduction
Related Work
Dynamics of Data Delivery in MANETs
Resource Allocation in MANETs with Arbitration
Security and Trust Relationship in Cyberspace
Resource Allocation with Collusion in MANETs
Resource Allocation in Cyber Security
Conclusion and Future Work
2
INTRODUCTION
Introduction
Related Work
Dynamics of Data Delivery in MANETs
Resource Allocation in MANETs with Arbitration
Security and Trust Relationship in Cyberspace
Resource Allocation with Collusion in MANETs
Resource Allocation in Cyber Security
Conclusion and Future Work
3
What is the Problem?
4
Is Selfish Behavior a Problem?
5
Challenges?
6
Example of MANET
7
RELATED WORK
Introduction
Related Work
Dynamics of Data Delivery in MANETs
Resource Allocation in MANETs with Arbitration
Security and Trust Relationship in Cyberspace
Resource Allocation with Collusion in MANETs
Resource Allocation in Cyber Security
Conclusion and Future Work
8
RELATED WORK
9
RELATED WORK
Game Theory
Concepts provide solutions when conflict of interests
Enforce cooperation by repeated interaction
Packet forwarding game converge to Nash Equilibrium
while all node cooperate
Basic assumption: Nodes are rational
10
Dynamics of Data Delivery in MANETs:
A Bargaining Game Approach
Introduction
Related Work
Dynamics of Data Delivery in MANETs
Resource Allocation in MANETs with Arbitration
Security and Trust Relationship in Cyberspace
Resource Allocation with Collusion in MANETs
Resource Allocation in Cyber Security
Conclusion and Future Work
11
Dynamics of Data Delivery in MANETs:
A Bargaining Game Approach
12
Dynamics of Data Delivery in MANETs:
A Bargaining Game Approach
Game Formulation
13
Dynamics of Data Delivery in MANETs:
A Bargaining Game Approach
The source can select from all the respondents the most
appropriate based on attributes provided
14
Dynamics of Data Delivery in MANETs:
A Bargaining Game Approach
15
Our Approach
17
The Solutions of the Bargaining
Games
the unique SPE in the last period before device goes
out of range
18
The Unicity of SPE Solutions
20
Simulation Results
0
-1 10
10
TOPSIS TOPSIS
BGANS BGANS
The Proposed Scheme
Handoff Request Blocking Ratio
-3 -2
10 10
0.2 0.4 0.6 0.8 1 1.2 0 0.2 0.4 0.6 0.8 1 1.2
Arrival Request Rate Arrival Request Rate
21
Simulation Results
3
BGANS
TOPSIS
2.5
New Request Blocking Ratio The Proposed Scheme
1.5
0.5
0
0 0.2 0.4 0.6 0.8 1 1.2 1.4
Arrival Request Rate
22
Conclusion
Introduction
Related Work
Dynamics of Data Delivery in MANETs
Resource Allocation in MANETs with Arbitration
Security and Trust Relationship in Cyberspace
Resource Allocation with Collusion in MANETs
Resource Allocation in Cyber Security
Conclusion and Future Work
24
Game Theoretic Analysis For Resource
Allocation in Dynamic Multi-Hops
Networks with Arbitration
Assumptions
Each node is autonomous and selfish
Node acts only for its own self-interest
Node tries to maximize its expected payoff
Communication channel is bidirectional
Nodes have the same communication range
Node has a short radio range
Node has a wider transmission range
Energy consumption is high when node uses its wide radio
transmission
25
Game Theoretic Analysis For Resource
Allocation in Dynamic Multi-Hops
Networks with Arbitration
Dirichlet Distribution:
Captures a sequence of observations of the n possible
outcomes with n positive real parameters xi i=1,…,n n
1 n ki 1 n
xi , xi 0, xi 1, ki 1. B(k ) B(k1 ,..., k n )
( ki )
Dir ( x; k )
B (k ) i 1 i 1 ( k1
i 1
... k n )
,
27
Game Theoretic Analysis For Resource
Allocation in Dynamic Multi-Hops
Networks with Arbitration
28
Game Theoretic Analysis For Resource
Allocation in Dynamic Multi-Hops
Networks with Arbitration
Equilibrium Analysis
The strategy profile in period t is {(xti, xt-i), gt-i} is offered by
the arbitrator.
The majority is ruled, Pi “accept” otherwise players “reject”
The last period T-1, {(xT-1i, xT-1-i), gT-1-i} is a NE if gT-1-i(|xjT-1|)
=“accept” for j≠i and there is no value |xjT-1|> |zjT-1| such that
gjT-1 (|zjT-1|) =“accept” for j≠i leading to the existence of a value
|xjT-1|< |zjT-1|
Per NE, there is no incentive for Pi to unilaterally increase its
demand because any increase would cause rejection by
another Pj ϵ P-i and the game will not reach the majority
29
Game Theoretic Analysis For Resource
Allocation in Dynamic Multi-Hops
Networks with Arbitration
Algorithm for Arbitration
Require: # players, N≥3; Time period before out of range, T; storage,
Q; time transferring a packet, t; Cost factor, δ;
Initialization: ;
1: c ← minvalue of player payload
2: While T > 0 do
3: Arbitrator makes offers to players
4: For each Player receiving offer do
5: If accept (Playeri) then increment count End If
6: If count reach Majority Then Data-Transfer
7: Else No Data-Transfer
8: Q ← Q(1 – δ) ;
9: End If
10: Decrement T;
11: End While
12:End
30
Game Theoretic Analysis For Resource
Allocation in Dynamic Multi-Hops
Networks with Arbitration
31
Game Theoretic Analysis For Resource
Allocation in Dynamic Multi-Hops
Networks with Arbitration
Simulation Results
32
Game Theoretic Analysis For Resource
Allocation in Dynamic Multi-Hops
Networks with Arbitration
Simulation Results
Negotiation Game with Three Players
0.34
Simple Majority
Complete Consent
0.32
0.3
Player's Utility
0.28
0.26
0.24
0.22
1 2 3 4 5 6 7 8 9 10
Period T
The figure shows the advantage of a simple majority in terms of player’s payoff compared to
complete consent. The network is also beneficial with the fact there is an agreement for the
arbitrator to carry the task of data transfer over
33
Game Theoretic Analysis For Resource
Allocation in Dynamic Multi-Hops
Networks with Arbitration
Simulation Results
0.5
Complete Consent
Simple Majority
Average min player's utility
0.45
0.4
0.35
0.3
0.25
0.2
0.15
0.1
2 3 4 5
Number of Nodes per Cluster
The figure shows an estimate of the average minimum player’s utility based on the number of
nodes composing the spontaneous cluster. A cluster of two nodes will have almost the same
minimum payoff for each node.
34
Game Theoretic Analysis For Resource
Allocation in Dynamic Multi-Hops
Networks with Arbitration
Conclusion
We model the dynamic resource allocation in a MANET of N
heterogeneous nodes (including arbitrators) as a perfect information
bargaining game.
The arbitrator’s offers of 1/n to all requests enable the players to
accept based on there being no frustrations with other nodes
receiving preferential treatment.
If arbitrators are rational, they can dynamically adapt their decisions
to achieve the best benefit and optimize the network performance
35
Game Theoretic Modeling of Security
and Trust Relationship in Cyberspace
Introduction
Related Work
Dynamics of Data Delivery in MANETs
Resource Allocation in MANETs with Arbitration
Security and Trust Relationship in Cyberspace
Resource Allocation with Collusion in MANETs
Resource Allocation in Cyber Security
Conclusion and Future Work
36
Game Theoretic Modeling of Security
and Trust Relationship in Cyberspace
37
Game Theoretic Modeling of Security
and Trust Relationship in Cyberspace
IS R – e – λ (1 – α); R - e; R – e – λ (1 – α); R - e;
Provider
b - pα} 0} b - pα} 0}
{G – λ + αλ; {G; {G – λ + αλ - d; {G - d;
NIS R - λ; R; R - λ; R;
b} 0} b} 0}
(a ) User plays action (T) (b) User plays action (D)
38
Game Theoretic Modeling of Security
and Trust Relationship in Cyberspace
Theorem: If α < α0 = e/λ, then the game admits a pure strategy NE profile (T, NIS, A).
Case 1: if e > λ α, then Uatt(T, NIS, A)–Uatt(T, NIS, NA) > 0. This is not the best for the
provider’s system by not securing its infrastructure.
Case 2: if e/λ < α < b/p, then Uatt(T, IS, A) - Uatt(T, IS, NA) > 0. the attacker prefers to
launch an attack on the provider’s system than not to attack.
Case 3: if e < λα and α > b/p, no strategy profile for a pure NE. (T, IS, A) is not a NE,
the attacker can increase his payoff from A to NA. (T, NIS, A) is not a NE, the provider
can increase his payoff from NIS to IS. Mixed strategy
39
Game Theoretic Modeling of Security
and Trust Relationship in Cyberspace
40
Game Theoretic Modeling of Security
and Trust Relationship in Cyberspace
Numerical Results
Variation in Provider's Payoff with Probability alpha Variations in Provider's Payoff with the Loss due to Security Breach
1
0.7
0.9
0.65
0.6 0.8
Provider's Payoff
Provider's Payoff
0.55
0.7
0.5
0.6
0.45
0.5
0.4
0.4
0.35
0.3
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Probability alpha Loss Lambda to the Provider
Variations in Provider’s payoff with probably α Variations in Provider’s payoff with loss λ due to the breach
41
Game Theoretic Modeling of Security
and Trust Relationship in Cyberspace
Conclusion The 3-player game provide a quantitative
0.6 approach to perform a cost analysis of
security investment
0.4
0.2
The provider does not have the luxury to
not invest in security
0
Provider'sPayoff
Introduction
Related Work
Dynamics of Data Delivery in MANETs
Resource Allocation in MANETs with Arbitration
Security and Trust Relationship in Cyberspace
Resource Allocation with Collusion in MANETs
Resource Allocation in Cyber Security
Conclusion and Future Work
43
A Game Theoretic Approach on Resource
Allocation with Colluding Nodes
in MANETs
Assumptions
Each node is autonomous and selfish
Node acts only for its own self-interest
Node tries to maximize its expected payoff
Malicious nodes acts against network objectives
Malicious node deliberately wastes others resource
Malicious nodes can regroup as a coalition to attack
Communication channel is bidirectional
Energy consumption is high when node uses its wide radio
transmission
44
A Game Theoretic Approach on Resource
Allocation with Colluding Nodes
in MANETs
Simulation Environment
A predetermined amount of nodes colluding to subvert the
arbitrator.
Colluding nodes are one-hop away from each other and move
within the area to keep their connectivity
Minimum number of colluding nodes is 2
47
A Game Theoretic Approach on Resource
Allocation with Colluding Nodes
in MANETs
Simulation Results
1 1
Without Collusion Without Collusion
0.9 0.9
With Collusion With Collusion
0.8 0.8
0.7 0.7
0.6 0.6
Successful votes (%)
0.4 0.4
0.3 0.3
0.2 0.2
0.1 0.1
0 0
0 50 100 150 200 250 300 350 400 450 500 0 50 100 150 200 250 300 350 400 450 500
time (s) time (s)
48
A Game Theoretic Approach on Resource
Allocation with Colluding Nodes
in MANETs
Simulation Results
1 1
0.9 0.9
0.8 0.8
0.7 0.7
0.6 0.6
Successful votes (%)
0.4 0.4
0.3 0.3
0.2 0.2
Without Collusion Without Collusion
0.1 With Collusion 0.1 With Collusion
0 0
0.01 0.05 0.10 0.15 0.20 0.25 0.30 0.40 0.50 0.01 0.05 0.10 0.15 0.20 0.25 0.30 0.40 0.50
discount factor (1 - ) discount factor (1 - )
49
Cyber Security Resource Allocation:
A Markov Decision Process Approach
Introduction
Related Work
Dynamics of Data Delivery in MANETs
Resource Allocation in MANETs with Arbitration
Security and Trust Relationship in Cyberspace
Resource Allocation with Collusion in MANETs
Resource Allocation in Cyber Security
Conclusion and Future Work
50
Cyber Security Resource Allocation:
A Markov Decision Process Approach
Developing the most robust and agile systems against cyber attacks does
not guarantee the avoidance of all attacks.
Model Formulation
A system can be in one of the 2 states
We can observe that investment in agility will increase the probability q
Make successful attack difficult to reach its objective (increase q) and the system
to remain in state 1
54
Cyber Security Resource Allocation:
A Markov Decision Process Approach
The chain converges to the stationary distribution regardless of where it begins. The
vector π = [π0 π1] is called the equilibrium distribution of the chain.
Tradeoff : Agility vs. Recovery, assuming P10 > 0 or 0<q<1. The administrator
cannot guarantee at 100% that the system will not change from state 1 to state 0
55
Cyber Security Resource Allocation:
A Markov Decision Process Approach
0.9
0.8
0.3
0.2
0.1
0
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
Security Investment
56
Cyber Security Resource Allocation:
A Markov Decision Process Approach
57
Cyber Security Resource Allocation:
A Markov Decision Process Approach
58
Cyber Security Resource Allocation:
A Markov Decision Process Approach
Experimental Results
Cost R10 When Probability p changes Frontier for Optimal Policy Actions 00 and 01
-1 1
-1.2 0.95
Frontier of Optimal Policy with q=0.70; R01=1; R00=-1; R11=1
Frontier of Optimal Policy with q=0.85; R01=1; R00=-1; R11=1
-1.4
0.9
-1.6
0.85
-1.8
Probability p
ard/CostR10
-2 0.8
-2.2
Rew
0.75
-2.4
0.7
-2.6
0.65
-2.8
-3
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.8 1 1.2 1.4 1.6 1.8 2
Probability p Reward R01
Resources variation between p and R10 Frontier of Optimal Actions Between p and R01
59
Cyber Security Resource Allocation:
A Markov Decision Process Approach
Experimental Results
Frontier Between Optimal Policy Actions 01 and 00 at State 0 Frontier Between Optimal Policy Actions When q Changes
-2.7 1
-2.75 0.9
-2.8 0.8
Frontier of Optimal Actions from 00 to 01 with R10=-2
Frontier at p=0.9; q=0.9; R00=-1; R01=+1 Frontier of Optimal Actions from 00 to 01 with R10=-3
ard/Cost R10
Probabilityp
-2.85 0.7
Rew
-2.9 0.6
-2.95 0.5
-3 0.4
1 1.5 2 2.5 3 3.5 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Reward/Cost R11 Probability q
Frontier Actions Between Reward R10 and R11 Behavior of Probabilities p and q
60
Conclusion and Future Work
Introduction
Related Work
Dynamics of Data Delivery in MANETs
Resource Allocation in MANETs with Arbitration
Security and Trust Relationship in Cyberspace
Resource Allocation with Collusion in MANETs
Resource Allocation in Cyber Security
Conclusion and Future Work
61
Conclusion and Future Work
We designed an incentive dynamic data delivery for mobile environment, where
mobile a node can move randomly and still participate in data-packet forwarding by
defining a bargaining model, which took into consideration the mobility factor and
parameters like speed, direction and available resource of a node.
We’ve defined the proper evaluation metrics to evaluate the nodes participating in
the overall performance of the MANET and compared to other methods. The
effectiveness was presented with OMNET++ as our simulation environment, where
node mobility is captured as close as possible to reality.
Limitations in design and implementation are the overhead messages and extra
power consumption for a longer bargaining time. Message exchange during
negotiation and the density of the network. When 2 nodes are in bargaining mode,
their speed should be limited.
62