Trust-based strategies for wireless networks under partial monitoring. Ntemos, K., Kalouptsidis, N., & Kolokotronis, N. In 2017 25th European Signal Processing Conference (EUSIPCO), pages 2591-2595, Aug, 2017. Paper doi abstract bibtex In modern wireless networks autonomous agents may exhibit selfish or malicious behavior which can compromise the performance of the network. For this reason, Intrusion Detection Systems (IDS) have been proposed to monitor the agents' behavior, along with the deployment of Trust/reputation Management Systems (TMS) to enforce cooperation among the agents. IDS may not continuously monitor agents' behavior to avoid excessive deployment costs. In this work we consider agents that exhibit both selfish and malicious behavior and study their pairwise interactions when they participate in a packet-forwarding task, in the scenario of partial monitoring of their actions by the IDS. We investigate the decision-making process of the agents and derive conditions that if satisfied, the trust-based strategy proposed by the TMS constitutes an optimal strategy for the agents.
@InProceedings{8081679,
author = {K. Ntemos and N. Kalouptsidis and N. Kolokotronis},
booktitle = {2017 25th European Signal Processing Conference (EUSIPCO)},
title = {Trust-based strategies for wireless networks under partial monitoring},
year = {2017},
pages = {2591-2595},
abstract = {In modern wireless networks autonomous agents may exhibit selfish or malicious behavior which can compromise the performance of the network. For this reason, Intrusion Detection Systems (IDS) have been proposed to monitor the agents' behavior, along with the deployment of Trust/reputation Management Systems (TMS) to enforce cooperation among the agents. IDS may not continuously monitor agents' behavior to avoid excessive deployment costs. In this work we consider agents that exhibit both selfish and malicious behavior and study their pairwise interactions when they participate in a packet-forwarding task, in the scenario of partial monitoring of their actions by the IDS. We investigate the decision-making process of the agents and derive conditions that if satisfied, the trust-based strategy proposed by the TMS constitutes an optimal strategy for the agents.},
keywords = {decision making;game theory;multi-agent systems;radio networks;telecommunication security;partial monitoring;modern wireless networks autonomous agents;selfish behavior;malicious behavior;Intrusion Detection Systems;IDS;Trust/reputation Management Systems;TMS;excessive deployment costs;packet-forwarding task;decision-making process;trust-based strategy;Monitoring;History;Wireless networks;Europe;Signal processing;Informatics;Trust;Game Theory;Monitoring;Cooperation},
doi = {10.23919/EUSIPCO.2017.8081679},
issn = {2076-1465},
month = {Aug},
url = {https://www.eurasip.org/proceedings/eusipco/eusipco2017/papers/1570347810.pdf},
}
Downloads: 0
{"_id":"LkrnjRTzqqKciNKL6","bibbaseid":"ntemos-kalouptsidis-kolokotronis-trustbasedstrategiesforwirelessnetworksunderpartialmonitoring-2017","authorIDs":[],"author_short":["Ntemos, K.","Kalouptsidis, N.","Kolokotronis, N."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["K."],"propositions":[],"lastnames":["Ntemos"],"suffixes":[]},{"firstnames":["N."],"propositions":[],"lastnames":["Kalouptsidis"],"suffixes":[]},{"firstnames":["N."],"propositions":[],"lastnames":["Kolokotronis"],"suffixes":[]}],"booktitle":"2017 25th European Signal Processing Conference (EUSIPCO)","title":"Trust-based strategies for wireless networks under partial monitoring","year":"2017","pages":"2591-2595","abstract":"In modern wireless networks autonomous agents may exhibit selfish or malicious behavior which can compromise the performance of the network. For this reason, Intrusion Detection Systems (IDS) have been proposed to monitor the agents' behavior, along with the deployment of Trust/reputation Management Systems (TMS) to enforce cooperation among the agents. IDS may not continuously monitor agents' behavior to avoid excessive deployment costs. In this work we consider agents that exhibit both selfish and malicious behavior and study their pairwise interactions when they participate in a packet-forwarding task, in the scenario of partial monitoring of their actions by the IDS. We investigate the decision-making process of the agents and derive conditions that if satisfied, the trust-based strategy proposed by the TMS constitutes an optimal strategy for the agents.","keywords":"decision making;game theory;multi-agent systems;radio networks;telecommunication security;partial monitoring;modern wireless networks autonomous agents;selfish behavior;malicious behavior;Intrusion Detection Systems;IDS;Trust/reputation Management Systems;TMS;excessive deployment costs;packet-forwarding task;decision-making process;trust-based strategy;Monitoring;History;Wireless networks;Europe;Signal processing;Informatics;Trust;Game Theory;Monitoring;Cooperation","doi":"10.23919/EUSIPCO.2017.8081679","issn":"2076-1465","month":"Aug","url":"https://www.eurasip.org/proceedings/eusipco/eusipco2017/papers/1570347810.pdf","bibtex":"@InProceedings{8081679,\n author = {K. Ntemos and N. Kalouptsidis and N. Kolokotronis},\n booktitle = {2017 25th European Signal Processing Conference (EUSIPCO)},\n title = {Trust-based strategies for wireless networks under partial monitoring},\n year = {2017},\n pages = {2591-2595},\n abstract = {In modern wireless networks autonomous agents may exhibit selfish or malicious behavior which can compromise the performance of the network. For this reason, Intrusion Detection Systems (IDS) have been proposed to monitor the agents' behavior, along with the deployment of Trust/reputation Management Systems (TMS) to enforce cooperation among the agents. IDS may not continuously monitor agents' behavior to avoid excessive deployment costs. In this work we consider agents that exhibit both selfish and malicious behavior and study their pairwise interactions when they participate in a packet-forwarding task, in the scenario of partial monitoring of their actions by the IDS. We investigate the decision-making process of the agents and derive conditions that if satisfied, the trust-based strategy proposed by the TMS constitutes an optimal strategy for the agents.},\n keywords = {decision making;game theory;multi-agent systems;radio networks;telecommunication security;partial monitoring;modern wireless networks autonomous agents;selfish behavior;malicious behavior;Intrusion Detection Systems;IDS;Trust/reputation Management Systems;TMS;excessive deployment costs;packet-forwarding task;decision-making process;trust-based strategy;Monitoring;History;Wireless networks;Europe;Signal processing;Informatics;Trust;Game Theory;Monitoring;Cooperation},\n doi = {10.23919/EUSIPCO.2017.8081679},\n issn = {2076-1465},\n month = {Aug},\n url = {https://www.eurasip.org/proceedings/eusipco/eusipco2017/papers/1570347810.pdf},\n}\n\n","author_short":["Ntemos, K.","Kalouptsidis, N.","Kolokotronis, N."],"key":"8081679","id":"8081679","bibbaseid":"ntemos-kalouptsidis-kolokotronis-trustbasedstrategiesforwirelessnetworksunderpartialmonitoring-2017","role":"author","urls":{"Paper":"https://www.eurasip.org/proceedings/eusipco/eusipco2017/papers/1570347810.pdf"},"keyword":["decision making;game theory;multi-agent systems;radio networks;telecommunication security;partial monitoring;modern wireless networks autonomous agents;selfish behavior;malicious behavior;Intrusion Detection Systems;IDS;Trust/reputation Management Systems;TMS;excessive deployment costs;packet-forwarding task;decision-making process;trust-based strategy;Monitoring;History;Wireless networks;Europe;Signal processing;Informatics;Trust;Game Theory;Monitoring;Cooperation"],"metadata":{"authorlinks":{}},"downloads":0},"bibtype":"inproceedings","biburl":"https://raw.githubusercontent.com/Roznn/EUSIPCO/main/eusipco2017url.bib","creationDate":"2021-02-13T16:38:25.790Z","downloads":0,"keywords":["decision making;game theory;multi-agent systems;radio networks;telecommunication security;partial monitoring;modern wireless networks autonomous agents;selfish behavior;malicious behavior;intrusion detection systems;ids;trust/reputation management systems;tms;excessive deployment costs;packet-forwarding task;decision-making process;trust-based strategy;monitoring;history;wireless networks;europe;signal processing;informatics;trust;game theory;monitoring;cooperation"],"search_terms":["trust","based","strategies","wireless","networks","under","partial","monitoring","ntemos","kalouptsidis","kolokotronis"],"title":"Trust-based strategies for wireless networks under partial monitoring","year":2017,"dataSources":["2MNbFYjMYTD6z7ExY","uP2aT6Qs8sfZJ6s8b"]}