4.7 Article

Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks

期刊

IEEE TRANSACTIONS ON MOBILE COMPUTING
卷 16, 期 6, 页码 1530-1543

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TMC.2016.2604820

关键词

Batch identification; game theory; wireless mobile networks

资金

  1. US National Science Foundation [1421685, 1457262]
  2. Key Laboratory of Aerospace Information Security and Trusted Computing
  3. Ministry of Education
  4. National Natural Science Foundation of China [61272451, 61572380, U1536204]
  5. Major State Basic Research Development Program of China [2014CB340600]
  6. National High Technology Research and Development Program (863 Program) of China [2014BAH41B00]
  7. Deanship of Scientific Research at King Saud University, Riyadh, Saudi Arabia [RGP-318]
  8. Direct For Computer & Info Scie & Enginr
  9. Division Of Computer and Network Systems [1421685] Funding Source: National Science Foundation
  10. Direct For Computer & Info Scie & Enginr
  11. Division Of Computer and Network Systems [1457262] Funding Source: National Science Foundation

向作者/读者索取更多资源

Secure access is one of the fundamental problems in wireless mobile networks. Digital signature is a widely used technique to protect messages' authenticity and nodes' identities. From the practical perspective, to ensure the quality of services in wireless mobile networks, ideally the process of signature verification should introduce minimum delay. Batch cryptography technique is a powerful tool to reduce verification time. However, most of the existing works focus on designing batch verification algorithms for wireless mobile networks without sufficiently considering the impact of invalid signatures, which can lead to verification failures and performance degradation. In this paper, we propose a Batch Identification Game Model (BIGM) in wireless mobile networks, enabling nodes to find invalid signatures with reasonable delay no matter whether the game scenario is complete information or incomplete information. Specifically, we analyze and prove the existence of Nash Equilibriums (NEs) in both scenarios, to select the dominant algorithm for identifying invalid signatures. To optimize the identification algorithm selection, we propose a self-adaptive auto-match protocol which estimates the strategies and states of attackers based on historical information. Comprehensive simulation results in terms of NE reasonability, algorithm selection accuracy, and identification delay are provided to demonstrate that BIGM can identify invalid signatures more efficiently than existing algorithms.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据