21,809 Hits in 7.1 sec

Valid formulas, games and network protocols [article]

Jean-Louis Krivine
2007 arXiv   pre-print
We describe a remarkable relation between the notion of valid formula of predicate logic and the specification of network protocols.  ...  We show how to specify the composition of protocols.  ...  A normal closed formula F is called valid if there exists a winning strategy for ∃, in the game associated with F . Valid formulas are exactly those which correspond to network protocols.  ... 
arXiv:0708.1480v2 fatcat:uxcynp27m5bollt7yoi5m7rx6u

Realization of UAV Routing Protocol Evaluation System Based on Game Theory Comprehensive Weighting

Jinze Huang, Fengbiao Zan, Xin Liu, Da Chen
2021 Journal of Data Analysis and Information Processing  
Taking network simulation data as an example, three protocols, AODV, DSDV, and OLSR, are selected as the research objects.  ...  Aiming at the issue of the selectivity of routing protocols between UAV groups, a comprehensive weighting evaluation system based on game theory is proposed.  ...  Acknowledgements This work was supported by the Tianjin University-Qinghai Minzu University Independent Innovation Fund Project "Huangshui River Ecological Environment Monitoring and Governance" and the  ... 
doi:10.4236/jdaip.2021.94016 fatcat:wop6kfpbtbaelczs4xgfdjhukq

Group Selection by Nodes in Wireless Sensor Networks Using Coalitional Game Theory

Fatemeh Kazemeyni, Einar Broch Johnsen, Olaf Owe, Ilangko Balasingham
2011 2011 16th IEEE International Conference on Engineering of Complex Computer Systems  
The protocol is formalized in rewriting logic, implemented in the Maude tool, and validated by means of Maude's model exploration facilities.  ...  In many cases, the replacement of a dead node is difficult and costly, e.g. an implanted node in the human body. Our main goal in this paper is reducing the total power consumption of the network.  ...  However, protocol validation is mostly done with simulation-based tools, using NS-2, OMNeT+, and extensions such as Castalia [26] and SensorSim [24] .  ... 
doi:10.1109/iceccs.2011.32 dblp:conf/iceccs/KazemeyniJOB11 fatcat:vpugdnc42rd5nobts4675qo5ha

Blockchain Governance: An Overview and Prediction of Optimal Strategies using Nash Equilibrium [article]

Nida Khan, Tabrez Ahmad, Anass Patel, Radu State
2020 arXiv   pre-print
The paper also includes validation of the proposed formulae using real Ethereum data.  ...  minimizes the occurrence of a hard fork as well as predicts the behavior of the majority during protocol updates.  ...  Acknowledgments This work is funded by the Luxembourg National Research Fund under its AFR-PPP Programme (FNR11617092), which is aimed at providing PhD and Post Doc grants for innovation and industry partnerships  ... 
arXiv:2003.09241v1 fatcat:ymjy5y3ar5cgpgpvmej5ew6izu

Grouping Nodes in Wireless Sensor Networks Using Coalitional Game Theory [chapter]

Fatemeh Kazemeyni, Einar Broch Johnsen, Olaf Owe, Ilangko Balasingham
2010 Lecture Notes in Computer Science  
The protocol is formalized in rewriting logic, implemented in the Maude tool, and validated by means of Maude's model exploration facilities.  ...  In this paper we propose a modification of the AODV protocol to decide whether a node should join a given group, using coalitional game theory to determine what is beneficial in terms of power consumption  ...  Game theory [8] can be used to analyze behavior in decentralized and selforganizing networks.  ... 
doi:10.1007/978-3-642-13464-7_9 fatcat:ur4olydlkbg2dfvyybq34p3cka

Formal modeling and validation of a power-efficient grouping protocol for WSNs

Fatemeh Kazemeyni, Einar Broch Johnsen, Olaf Owe, Ilangko Balasingham
2012 The Journal of Logic and Algebraic Programming  
This formalization forms the basis for an implementation in the rewriting logic tool Maude, so the protocol can be validated using Maude's model exploration facilities.  ...  We propose a protocol to allow nodes to choose the best group in their signal range, using coalitional game theory to determine what is beneficial in terms of power consumption.  ...  Coalitional game theory Game theory [15] can be used to analyze behavior in decentralized and self-organizing networks.  ... 
doi:10.1016/j.jlap.2011.12.001 fatcat:oddzxsblafaubhrl2d347e4lxi

An Automated Negotiation Protocol Based On Game Theory

Chenming Li, Wei Huang, Zhenli Ma, Fengzhou Wang, Xiaodong Wei, Lizhong Xu
2014 Computational Water Energy and Environmental Engineering  
of inter-basin water transfer, according to features of all interest subjects in analysis of inter-basin water transfer, a one-to-many synchronous bidding negotiation model based on bidding rules of game  ...  theory is structured, which analyzes and negotiates the functions, code of conduct and information expression of each subject.  ...  network.  ... 
doi:10.4236/cweee.2014.33012 fatcat:l7whybkynfebrpk4wnshuvvneu

Computationally Sound Analysis of a Probabilistic Contract Signing Protocol [chapter]

Mihhail Aizatulin, Henning Schnoor, Thomas Wilke
2009 Lecture Notes in Computer Science  
alternating-time temporal formula expressing balance, and finally establish a general result stating that the validity of formulas such as our balance formula is preserved when passing from the symbolic  ...  The key idea of the protocol is to take a "gradual commitment" approach.  ...  Another interesting issue is to consider a setting in which the adversary and the principals only have access to the information available to it from the observed network traffic.  ... 
doi:10.1007/978-3-642-04444-1_35 fatcat:iaqkb33v4zetdl4tcsmpxl2a6m

Infinite State AMC-Model Checking for Cryptographic Protocols

Detlef Kahler, Ralf Kusters, Tomasz Truderung
2007 22nd Annual IEEE Symposium on Logic in Computer Science (LICS 2007)  
In this paper, we therefore study decidability and complexity of the model checking problem for AMC-formulas over infinite state concurrent game structures induced by cryptographic protocols and the Dolev-Yao  ...  and Raskin in fair ATL for contract-signing and non-repudiation protocols.  ...  , where the input to the problem is the protocol (which together with the Dolev-Yao intruder induces the security-specific concurrent game structure) and the AMC-formula.  ... 
doi:10.1109/lics.2007.26 dblp:conf/lics/KahlerKT07 fatcat:ztqfootyrvg2dbsvm75zn3zptq

Page 4643 of Mathematical Reviews Vol. , Issue 2002G [page]

2002 Mathematical Reviews  
-game. (3) No thread can belong to more than one network. (4) Only O can switch between networks, and only P can switch between threads within the same network.  ...  -fragment of light affine logic, based on games and discreet strategies.  ... 

A new analytical framework for studying protocol diversity in P2P networks

Xin Jin, Jian Deng, Yu-Kwong Kwok
2013 2013 IEEE International Conference on Communications (ICC)  
Thanks to years of research and development, current peer-to-peer (P2P) networks are anything but a homogeneous system from a protocol perspective.  ...  In this work, we propose a general framework, Migration, based on evolutionary game theory to study the coevolution of peers for selfish protocol selection, and, most importantly, its impact on system  ...  This immediately validates our adoption of population games. Proof.  ... 
doi:10.1109/icc.2013.6654871 dblp:conf/icc/JinDK13 fatcat:6ughltqgjrbc5hgwne5vedo7om

Ergodic Mean-Payoff Games for the Analysis of Attacks in Crypto-Currencies

Krishnendu Chatterjee, Amir Kafshdar Goharshady, Rasmus Ibsen-Jensen, Yaron Velner, Michael Wagner
2018 International Conference on Concurrency Theory  
Traditional game-theoretic approaches for the analysis of security protocols consider either qualitative temporal properties such as safety and termination, or the very special class of one-shot (stateless  ...  However, to analyze general attacks on protocols for crypto-currencies, both stateful analysis and quantitative objectives are necessary.  ...  (279307: Graph Games), and an IBM PhD Fellowship.  ... 
doi:10.4230/lipics.concur.2018.11 dblp:conf/concur/ChatterjeeGIV18 fatcat:l5ecy2bneng4tbjnjuerflwnti

On profitability of selfish mining [article]

Cyril Grunspan, Ricardo Pérez-Marco
2019 arXiv   pre-print
We review the so called selfish mining strategy in the Bitcoin network and compare its profitability to honest mining.We build a rigorous profitability model for repetition games.  ...  We propose an improvement of Bitcoin protocol making it immune to selfish mining attacks. We also study miner's attraction to selfish mining pools.  ...  These formulas are used to rigorously compare the profitability of all these strategies and confirm and correct previous numerical studies ( [10] ).  ... 
arXiv:1805.08281v3 fatcat:ihhwkyzym5awhkcdralmtupk5y

A formal model of rational exchange and its application to the analysis of Syverson's protocol

Levente Buttyán, Jean-Pierre Hubaux, Srdjan Čapkun, S. Schneider
2004 Journal of Computer Security  
In this model, an exchange protocol is represented as a set of strategies in a game that is played by the protocol parties and the network that they use to communicate with each other.  ...  We propose a formal model of rational exchange and exchange protocols in general, which is based on game theory.  ...  Acknowledgement The authors are grateful to the anonymous reviewers for their helpful comments and suggestions.  ... 
doi:10.3233/jcs-2004-123-408 fatcat:by3doewmbrdqtazsdsjqkbrizq

An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games

Mo-Che Chan, Shun-Yun Hu, Jehn-Ruey Jiang
2008 Computer Networks  
We propose an Efficient and Secured Event Signature (EASES) protocol to efficiently sign discrete event messages.  ...  In recent years, massively multiplayer online games (MMOGs) have become very popular by providing more entertainment and sociability than single-player games.  ...  [17] describe issues in multiplayer games such as network resources, communication architectures, scalability and security.  ... 
doi:10.1016/j.comnet.2008.03.004 fatcat:kky2phdazfcjpo4yspy5yya4la
« Previous Showing results 1 — 15 out of 21,809 results