Game-theory-based batch identification of invalid signatures in wireless mobile networks

Jing Chen, Quan Yuan, Guoliang Xue, Ruiying Du

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

Digital signature has been widely employed in wireless mobile networks to ensure the authenticity of messages and identity of nodes. A paramount concern in signature verification is reducing the verification delay to ensure the network QoS. To address this issue, researchers have proposed the batch cryptography technology. However, most of the existing works focus on designing batch verification algorithms without sufficiently considering the impact of invalid signatures. The performance of batch verification could dramatically drop, if there are verification failures caused by invalid signatures. In this paper, we propose a Game-theory-based Batch Identification Model (GBIM) for wireless mobile networks, enabling nodes to find invalid signatures with the optimal delay under heterogeneous and dynamic attack scenarios. Specifically, we design an incomplete information game model between a verifier and its attackers, and prove the existence of Nash Equilibrium, to select the dominant algorithm for identifying invalid signatures. Moreover, we propose an auto-match protocol to optimize the identification algorithm selection, when the attack strategies can be estimated based on history information. Comprehensive simulation results demonstrate that GBIM can identify invalid signatures more efficiently than existing algorithms.

Original languageEnglish (US)
Title of host publicationProceedings - IEEE INFOCOM
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages262-270
Number of pages9
Volume26
ISBN (Print)9781479983810
DOIs
StatePublished - Aug 21 2015
Event34th IEEE Annual Conference on Computer Communications and Networks, IEEE INFOCOM 2015 - Hong Kong, Hong Kong
Duration: Apr 26 2015May 1 2015

Other

Other34th IEEE Annual Conference on Computer Communications and Networks, IEEE INFOCOM 2015
CountryHong Kong
CityHong Kong
Period4/26/155/1/15

Fingerprint

Game theory
Wireless networks
Identification (control systems)
Electronic document identification systems
Cryptography
Quality of service
Network protocols

Keywords

  • Batch identification
  • game theory
  • wireless mobile networks

ASJC Scopus subject areas

  • Computer Science(all)
  • Electrical and Electronic Engineering

Cite this

Chen, J., Yuan, Q., Xue, G., & Du, R. (2015). Game-theory-based batch identification of invalid signatures in wireless mobile networks. In Proceedings - IEEE INFOCOM (Vol. 26, pp. 262-270). [7218390] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/INFOCOM.2015.7218390

Game-theory-based batch identification of invalid signatures in wireless mobile networks. / Chen, Jing; Yuan, Quan; Xue, Guoliang; Du, Ruiying.

Proceedings - IEEE INFOCOM. Vol. 26 Institute of Electrical and Electronics Engineers Inc., 2015. p. 262-270 7218390.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chen, J, Yuan, Q, Xue, G & Du, R 2015, Game-theory-based batch identification of invalid signatures in wireless mobile networks. in Proceedings - IEEE INFOCOM. vol. 26, 7218390, Institute of Electrical and Electronics Engineers Inc., pp. 262-270, 34th IEEE Annual Conference on Computer Communications and Networks, IEEE INFOCOM 2015, Hong Kong, Hong Kong, 4/26/15. https://doi.org/10.1109/INFOCOM.2015.7218390
Chen J, Yuan Q, Xue G, Du R. Game-theory-based batch identification of invalid signatures in wireless mobile networks. In Proceedings - IEEE INFOCOM. Vol. 26. Institute of Electrical and Electronics Engineers Inc. 2015. p. 262-270. 7218390 https://doi.org/10.1109/INFOCOM.2015.7218390
Chen, Jing ; Yuan, Quan ; Xue, Guoliang ; Du, Ruiying. / Game-theory-based batch identification of invalid signatures in wireless mobile networks. Proceedings - IEEE INFOCOM. Vol. 26 Institute of Electrical and Electronics Engineers Inc., 2015. pp. 262-270
@inproceedings{90b9eb8a1f834eef971550f64adfdb52,
title = "Game-theory-based batch identification of invalid signatures in wireless mobile networks",
abstract = "Digital signature has been widely employed in wireless mobile networks to ensure the authenticity of messages and identity of nodes. A paramount concern in signature verification is reducing the verification delay to ensure the network QoS. To address this issue, researchers have proposed the batch cryptography technology. However, most of the existing works focus on designing batch verification algorithms without sufficiently considering the impact of invalid signatures. The performance of batch verification could dramatically drop, if there are verification failures caused by invalid signatures. In this paper, we propose a Game-theory-based Batch Identification Model (GBIM) for wireless mobile networks, enabling nodes to find invalid signatures with the optimal delay under heterogeneous and dynamic attack scenarios. Specifically, we design an incomplete information game model between a verifier and its attackers, and prove the existence of Nash Equilibrium, to select the dominant algorithm for identifying invalid signatures. Moreover, we propose an auto-match protocol to optimize the identification algorithm selection, when the attack strategies can be estimated based on history information. Comprehensive simulation results demonstrate that GBIM can identify invalid signatures more efficiently than existing algorithms.",
keywords = "Batch identification, game theory, wireless mobile networks",
author = "Jing Chen and Quan Yuan and Guoliang Xue and Ruiying Du",
year = "2015",
month = "8",
day = "21",
doi = "10.1109/INFOCOM.2015.7218390",
language = "English (US)",
isbn = "9781479983810",
volume = "26",
pages = "262--270",
booktitle = "Proceedings - IEEE INFOCOM",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Game-theory-based batch identification of invalid signatures in wireless mobile networks

AU - Chen, Jing

AU - Yuan, Quan

AU - Xue, Guoliang

AU - Du, Ruiying

PY - 2015/8/21

Y1 - 2015/8/21

N2 - Digital signature has been widely employed in wireless mobile networks to ensure the authenticity of messages and identity of nodes. A paramount concern in signature verification is reducing the verification delay to ensure the network QoS. To address this issue, researchers have proposed the batch cryptography technology. However, most of the existing works focus on designing batch verification algorithms without sufficiently considering the impact of invalid signatures. The performance of batch verification could dramatically drop, if there are verification failures caused by invalid signatures. In this paper, we propose a Game-theory-based Batch Identification Model (GBIM) for wireless mobile networks, enabling nodes to find invalid signatures with the optimal delay under heterogeneous and dynamic attack scenarios. Specifically, we design an incomplete information game model between a verifier and its attackers, and prove the existence of Nash Equilibrium, to select the dominant algorithm for identifying invalid signatures. Moreover, we propose an auto-match protocol to optimize the identification algorithm selection, when the attack strategies can be estimated based on history information. Comprehensive simulation results demonstrate that GBIM can identify invalid signatures more efficiently than existing algorithms.

AB - Digital signature has been widely employed in wireless mobile networks to ensure the authenticity of messages and identity of nodes. A paramount concern in signature verification is reducing the verification delay to ensure the network QoS. To address this issue, researchers have proposed the batch cryptography technology. However, most of the existing works focus on designing batch verification algorithms without sufficiently considering the impact of invalid signatures. The performance of batch verification could dramatically drop, if there are verification failures caused by invalid signatures. In this paper, we propose a Game-theory-based Batch Identification Model (GBIM) for wireless mobile networks, enabling nodes to find invalid signatures with the optimal delay under heterogeneous and dynamic attack scenarios. Specifically, we design an incomplete information game model between a verifier and its attackers, and prove the existence of Nash Equilibrium, to select the dominant algorithm for identifying invalid signatures. Moreover, we propose an auto-match protocol to optimize the identification algorithm selection, when the attack strategies can be estimated based on history information. Comprehensive simulation results demonstrate that GBIM can identify invalid signatures more efficiently than existing algorithms.

KW - Batch identification

KW - game theory

KW - wireless mobile networks

UR - http://www.scopus.com/inward/record.url?scp=84954234227&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84954234227&partnerID=8YFLogxK

U2 - 10.1109/INFOCOM.2015.7218390

DO - 10.1109/INFOCOM.2015.7218390

M3 - Conference contribution

SN - 9781479983810

VL - 26

SP - 262

EP - 270

BT - Proceedings - IEEE INFOCOM

PB - Institute of Electrical and Electronics Engineers Inc.

ER -