Coexistence with malicious nodes: a game theoretic approach

  • Authors:
  • Wenjing Wang;Mainak Chatterjee;Kevin Kwiat

  • Affiliations:
  • Electrical Engineering and Computer Science, University of Central Florida, Orlando, FL;Electrical Engineering and Computer Science, University of Central Florida, Orlando, FL;Air Force Research Laboratory, Information Directorate, Rome, NY

  • Venue:
  • GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we use game theory to study the interactions between a malicious node and a regular node in wireless networks with unreliable channels. Since the malicious nodes do not reveal their identities to others, it is crucial for the regular nodes to detect them through monitoring and observation. We model the malicious node detection process as a Bayesian game with imperfect information and show that a mixed strategy perfect Bayesian Nash Equilibrium (also a sequential equilibrium) is attainable. While the equilibrium in the detection game ensures the identification of the malicious nodes, we argue that it might not be profitable to isolate the malicious nodes upon detection. As a matter of fact, malicious nodes and regular nodes can co-exist as long as the destruction they bring is less than the contribution they make. To show how we can utilize the malicious nodes, a post-detection game between the malicious and regular nodes is formalized. Solution to this game shows the existence of a subgame perfect Nash Equilibrium and the conditions that achieve the equilibrium. Simulation results and their discussions are also provided to illustrate the properties of the derived equilibria.