Identity Deception and Game Deterrence via Signaling Games

Maintenance and veri?cation of persistent identities is an important problem in the area of networking. Particularly, their critical roles in Wireless Ad-hoc networks (WANETs) have become even more prominent as they begin to be deployed in several application domains. In these contexts, Sybil attack...

Full description

Saved in:
Bibliographic Details
Published inEAI endorsed transactions on security and safety Vol. 3; no. 9; pp. 73 - 10
Main Authors Casey, William, Memarmoshrefi, Parisa, Kellner, Ansgar, Morales, Jose Andre, Mishra, Bud
Format Journal Article
LanguageEnglish
Published Ghent European Alliance for Innovation (EAI) 01.12.2016
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Maintenance and veri?cation of persistent identities is an important problem in the area of networking. Particularly, their critical roles in Wireless Ad-hoc networks (WANETs) have become even more prominent as they begin to be deployed in several application domains. In these contexts, Sybil attacks, making use of replicated deceptive identities, represent a major challenge for the designers of these networks. Inspired by biological models of ant colonies and their dynamics studied via information asymmetric signaling games, we propose an architecture that can withstand Sybil attacks, similar to ants, using complex chemical signaling systems and associated physical actions, naturally 'authenticate' colony members. Here, we present a biomimetic authentication protocol with mechanisms similar to the physical processes of chemical diffusion, and formalize approaches to tame the deceptive use of identities; we dub the resulting game an "identity management signaling game". To consider network system of nodes, pursuing non-cooperative and deceptive strategies, we develop an evolutionary game system allowing cooperative nodes to mutate deceptive strategies. We empirically study the dynamics using simulation experiments to select the parameters which affect the overall behaviors. Through experimentation we consider how an in- centive package in the form of a shared database can impact system behavior.
ISSN:2032-9393
DOI:10.4108/eai.3-12-2015.2262519