TY - JOUR
T1 - Identity deception and game deterrence via signaling games
AU - Casey, William
AU - Memarmoshrefi, Parisa
AU - Kellner, Ansgar
AU - Morales, Jose Andre
AU - Mishra, Bud
N1 - Funding Information:
This material is based upon work funded and supported by the Department of Defense under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. This material has been approved for public release and unlimited distribution. DM-0002919
Publisher Copyright:
Copyright © 2016 ICST.
PY - 2015
Y1 - 2015
N2 - Maintenance and verification of persistent identities is an important problem in the area of networking. Particularly, their critical roles in Wireless Ad-hoc networks (WANETs) have become even more prominent as they begin to be deployed in several application domains. In these contexts, Sybil attacks, making use of replicated deceptive identities, represent a major challenge for the designers of these networks. Inspired by biological models of ant colonies and their dynamics studied via information asymmetric signaling games, we propose an architecture that can withstand Sybil attacks, similar to ants, using complex chemical signaling systems and associated physical actions, naturally authenticate colony members. Here, we present a biomimetic authentication protocol with mechanisms similar to the physical processes of chemical diffusion, and formalize approaches to tame the deceptive use of identities; we dub the resulting game an identity management signaling game". To consider network system of nodes, pursuing non-cooperative and deceptive strategies, we develop an evolutionary game system allowing cooperative nodes to mutate deceptive strategies. We empirically study the dynamics using simulation experiments to select the parameters which affect the overall behaviors. Through experimentation we consider how an incentive package in the form of a shared database can impact system behavior.
AB - Maintenance and verification of persistent identities is an important problem in the area of networking. Particularly, their critical roles in Wireless Ad-hoc networks (WANETs) have become even more prominent as they begin to be deployed in several application domains. In these contexts, Sybil attacks, making use of replicated deceptive identities, represent a major challenge for the designers of these networks. Inspired by biological models of ant colonies and their dynamics studied via information asymmetric signaling games, we propose an architecture that can withstand Sybil attacks, similar to ants, using complex chemical signaling systems and associated physical actions, naturally authenticate colony members. Here, we present a biomimetic authentication protocol with mechanisms similar to the physical processes of chemical diffusion, and formalize approaches to tame the deceptive use of identities; we dub the resulting game an identity management signaling game". To consider network system of nodes, pursuing non-cooperative and deceptive strategies, we develop an evolutionary game system allowing cooperative nodes to mutate deceptive strategies. We empirically study the dynamics using simulation experiments to select the parameters which affect the overall behaviors. Through experimentation we consider how an incentive package in the form of a shared database can impact system behavior.
KW - Bio-inspired approach
KW - Identity management
KW - Signaling games
KW - Sybil attack
KW - WANET
UR - http://www.scopus.com/inward/record.url?scp=85052181174&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85052181174&partnerID=8YFLogxK
U2 - 10.4108/eai.3-12-2015.2262519
DO - 10.4108/eai.3-12-2015.2262519
M3 - Conference article
AN - SCOPUS:85052181174
SN - 2411-6777
JO - EAI International Conference on Bio-inspired Information and Communications Technologies (BICT)
JF - EAI International Conference on Bio-inspired Information and Communications Technologies (BICT)
T2 - 9th EAI International Conference on Bio-Inspired Information and Communications Technologies, BICT 2015
Y2 - 3 December 2015 through 5 December 2015
ER -