1,529 Hits in 4.9 sec

Game Theory in Mobile CrowdSensing:A Comprehensive Survey

Venkat Surya Dasari, Burak Kantarci, Maryam Pouryazdan, Luca Foschini, Michele Girolami
2020 Sensors  
Research on various game theoretic approaches aims to provide a stable solution to this problem.  ...  We propose a taxonomy of game theory-based solutions for MCS platforms in which problems are mainly formulated based on Stackelberg, Bayesian and Evolutionary games.  ...  In this survey, we review various game theoretical methods applied in MCS that help to reach an equilibrium in a competition for gaining higher utility between service requester and service provider.  ... 
doi:10.3390/s20072055 pmid:32268546 pmcid:PMC7180814 fatcat:jahw2lzp4re7dim5q4onf6tlzm

Non-Cooperative Location Privacy

J. Freudiger, M. H. Manshaei, Jean-Pierre Hubaux, D. C. Parkes
2013 IEEE Transactions on Dependable and Secure Computing  
In this paper, we analyze non-cooperative behavior of mobile nodes by using a game-theoretic model, where each player aims at maximizing its location privacy at a minimum cost.  ...  A frequently proposed solution to protect location privacy suggests that mobile nodes collectively change their pseudonyms in regions called mix zones. This approach is costly.  ...  This approach however lacks flexibility and is prone to attacks because a central authority fixes mix zone locations and must shared them with mobile nodes.  ... 
doi:10.1109/tdsc.2012.85 fatcat:w6fkxpok3rct5m7ux7hlqjmqhm

Game Theoretic Approaches in Vehicular Networks: A Survey [article]

Zemin Sun, Yanheng Liu, Jian Wang, Carie Anil, Dongpu Cao
2020 arXiv   pre-print
Game theory, a theoretical framework designed for strategic interactions among rational decision-makers who faced with scarce resources, can be used to model and analyze individual or group behaviors of  ...  However, as the number of connected nodes keeps increasing, it is challenging to satisfy various and large amounts of service requests with different Quality of Service (QoS ) and security requirements  ...  [78] proposed a Bayesian game-theoretic approach for the beacon collision alleviation at the MAC layer in urban VNs.  ... 
arXiv:2006.00992v1 fatcat:lljjlitvlvbvhbg3aot5xszefm

On non-cooperative location privacy

Julien Freudiger, Mohammad Hossein Manshaei, Jean-Pierre Hubaux, David C. Parkes
2009 Proceedings of the 16th ACM conference on Computer and communications security - CCS '09  
In this paper, we analyze the non-cooperative behavior of mobile nodes with a game-theoretic model, where each player aims at maximizing its location privacy at a minimum cost.  ...  Because this approach is costly, self-interested mobile nodes might decide not to cooperate and could thus jeopardize the achievable location privacy.  ...  We compare the game-theoretic approach with random and socially-optimal strategies and show that using the Bayesian Nash equilibrium, players reduce their consumption of pseudonyms while still achieving  ... 
doi:10.1145/1653662.1653702 dblp:conf/ccs/FreudigerMHP09 fatcat:6ym62k34svabznb43zao2y6rxm

Incentive Mechanisms for Federated Learning: From Economic and Game Theoretic Perspective [article]

Xuezhen Tu, Kun Zhu, Nguyen Cong Luong, Dusit Niyato, Yang Zhang, Juan Li
2021 arXiv   pre-print
In this paper, we provide a comprehensive review for the economic and game theoretic approaches proposed in the literature to design various schemes for stimulating data owners to participate in FL training  ...  Then, we review applications of game theory and economic approaches applied for incentive mechanisms design of FL.  ...  A typical example is the Bayesian game [53] where the outcome of the game can be predicted using Bayesian game analysis. The equilibrium solution of such a game is Bayesian Nash equilibrium (BNE).  ... 
arXiv:2111.11850v1 fatcat:24xqnqiqtbh2hdn6lnkdkctqii

Information Security in Big Data: Privacy and Data Mining

Lei Xu, Chunxiao Jiang, Jian Wang, Jian Yuan, Yong Ren
2014 IEEE Access  
Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data  ...  In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information.  ...  ASSUMPTIONS OF THE GAME MODEL In above discussions we have reviewed the game theoretical approaches to privacy issues in data mining.  ... 
doi:10.1109/access.2014.2362522 fatcat:oxnmv2kjy5bllhotbkqvxd5rfu

A survey on game theoretical methods in Human–Machine Networks

Xueqin Liang, Zheng Yan
2017 Future generations computer systems  
Huang et al. exploited a location-awareness resource allocation approach based on a repeated non-cooperative game with complete information for D2D communications [70] .  ...  Bayesian coalition structure ensures players to join and leave coalition flexibly, which makes the coalition structure stable with reduced delay.  ... 
doi:10.1016/j.future.2017.10.051 fatcat:55v7cpi64ndb3apj4ngbkin5ue

A Bayesian Approach to Privacy Enforcement in Smartphones

Omer Tripp, Julia Rubin
2014 USENIX Security Symposium  
The traditional approach of information-flow (or taint) tracking applies "binary" classification, whereby information release is legitimate iff there is no data flow from a privacy source to sink arguments  ...  Specifically, we propose a Bayesian notion of statistical classification, which conditions the judgment whether a release point is legitimate on the evidence arising at that point.  ...  Our approach is more flexible than taint tracking by permitting statistical weighting of different features as the basis for privacy judgments.  ... 
dblp:conf/uss/TrippR14 fatcat:2fpqoflkezhmxfoifasbkc6hxe

2020 Index IEEE Transactions on Mobile Computing Vol. 19

2021 IEEE Transactions on Mobile Computing  
., +, TMC Nov. 2020 2489-2504 A Control Theoretic Approach to ABR Video Streaming: A Fresh Look at PID-Based Rate Adaptation.  ...  ., +, TMC Nov. 2020 2505-2519 A Cost-Driven Approach to Caching-as-a-Service in Cloud-Based 5G Mobile Networks.  ... 
doi:10.1109/tmc.2020.3036773 fatcat:6puiux5lp5bfvjo47ey7ycwyfu

Intrusion Detection into Cloud-Fog-Based IoT Networks Using Game Theory

Poria Pirozmand, Mohsen Angoraj Ghafary, Safieh Siadat, Jiankang Ren, Fawad Zaman
2020 Wireless Communications and Mobile Computing  
In the proposed method, the attacker infiltration mode and the behavior of the intrusion detection system as a two-player and nonparticipatory dynamic game are completely analyzed and Nash equilibrium  ...  In this research, game theory is used to develop the performance of intrusion detection systems.  ...  system with theoretical calculation of the Bayesian game.  ... 
doi:10.1155/2020/8819545 fatcat:bfxrtttgpvg6bpuwjvwi3lio3m

Stackelberg Security Games: Looking Beyond a Decade of Success

Arunesh Sinha, Fei Fang, Bo An, Christopher Kiekintveld, Milind Tambe
2018 Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence  
The Stackelberg Security Game (SSG) model has been immensely influential in security research since it was introduced roughly a decade ago.  ...  Furthermore, deployed SSG-based applications are one of most successful examples of game theory applications in the real world.  ...  Broadly, privacy issues with any software system always involve a trade-off between privacy and usefulness of the system such as location privacy in social networks.  ... 
doi:10.24963/ijcai.2018/775 dblp:conf/ijcai/SinhaFAKT18 fatcat:vdiyb6i46jfwhm5dlhjph4cjme

The (Co-)Location Sharing Game

Alexandra-Mihaela Olteanu, Mathias Humbert, Kévin Huguenin, Jean-Pierre Hubaux
2019 Proceedings on Privacy Enhancing Technologies  
Yet, they also represent a severe threat to the users' privacy, as co-location information introduces interdependences between users.  ...  We propose the first game-theoretic framework for analyzing the strategic behaviors, in terms of information sharing, of users of OSNs.  ...  This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.  ... 
doi:10.2478/popets-2019-0017 dblp:journals/popets/OlteanuHHH19 fatcat:awveon3vnrbw7iyyconavhr7ru

Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions

Sahar Shah, Mahnoor Khan, Ahmad Almogren, Ihsan Ali, Lianwen Deng, Heng Luo, Muazzam A. Khan, Shah Nazir
2020 Scientific Programming  
This paper presents the security for cloud computing models with a new aspect.  ...  Many surveys have been carried out in cloud security and privacy. The existing survey papers do not specify the classifications on the basis of cloud computing components.  ...  Security-as-a-Service. e Bayesian game is between the CSPs and CSUs.  ... 
doi:10.1155/2020/8871315 fatcat:z7shzh55lnai5m4s5pygr7u4oq

A survey on security issues in cognitive radio based cooperative sensing

Shivanshu Shrivastava, A. Rajesh, P. K. Bora, Bin Chen, Mingjun Dai, Xiaohui Lin, Hui Wang
2021 IET Communications  
Active mechanisms are suitable for an immediate defence in a limited time span, while passive mechanisms are suitable for flexible CSS systems that are ready to detect the attacks over a period of time  ...  An in-depth tutorial on both the defence mechanisms is provided from the perspectives of the secondary users throughput and the interference to the primary user.  ...  Game theoretic approach In the game theoretic approaches, the CR communication systems are analysed with game theory [64] [65] [66] .  ... 
doi:10.1049/cmu2.12131 fatcat:ivw2dsepevfi5izquylly65jg4

When Machine Learning Meets Spectrum Sharing Security: Methodologies and Challenges

Qun Wang, Haijian Sun, Rose Qingyang Hu, Arupjyoti Bhuyan
2022 IEEE Open Journal of the Communications Society  
(SSDF) attacks, jamming attacks, eavesdropping attacks, and privacy issues.  ...  In this article, we provide a comprehensive survey of the recent development of ML based SS methods, the most critical security issues, and corresponding defense mechanisms.  ...  A game-theoretic approach and interference graph were employed to solve this problem.  ... 
doi:10.1109/ojcoms.2022.3146364 fatcat:ffx3xbq5qzb6hcserskljb4o7u
« Previous Showing results 1 — 15 out of 1,529 results