Results 1 -
5 of
5
Incentive and Trust Issues in Assured Information Sharing
- In Collaborative Computing: Networking, Applications and Worksharing: 4th International Conference, CollaborateCom 2008
"... Abstract. Assured information sharing among different organizations in a coalitional environment is an important first step in accomplishing many critical tasks. For example, different security agencies may need to share intelligence information for detecting terrorist plots. At the same, each organ ..."
Abstract
-
Cited by 4 (4 self)
- Add to MetaCart
(Show Context)
Abstract. Assured information sharing among different organizations in a coalitional environment is an important first step in accomplishing many critical tasks. For example, different security agencies may need to share intelligence information for detecting terrorist plots. At the same, each organization participating in the assured information sharing process may have different incentives. In this paper, we explore the effects of different incentives and potential trust issues among organizations on the assured information sharing process by developing an evolutionary game theoretic framework. In addition, we provide extensive simulation analysis that illustrates the impact of various different information sharing strategies. 1
Computational Models of Trust for Cooperative Evolution Reputation Based Game Theoretic Models of Trust for Cooperative Evolution in online Business Games
"... Online services such as e-marketplaces, social networking sites, online gaming environments etc have grown in popularity in the recent years. These services represent situation where participants do not get to negotiate face to face before interaction and most of the time parties to transaction rema ..."
Abstract
- Add to MetaCart
(Show Context)
Online services such as e-marketplaces, social networking sites, online gaming environments etc have grown in popularity in the recent years. These services represent situation where participants do not get to negotiate face to face before interaction and most of the time parties to transaction remain anonymous. It is thus necessary to have a system that rightly assesses trustworthiness of the other party in order to maintain quality assurance in such systems. Recent works on Trust and Reputation in online communities have focused on identifying probable defaulters, but less effort has been put to come up with system that make cooperation attractive over defection in order to achieve cooperation without enforcement. Our work in this regard concerns design and investigation of trust assessment systems that not only filter defaulters but also promote evolution of cooperativeness in player society. Based on the concept of game theory and prisoner‟s dilemma, we model business games and design incentive method, compensation method,
Incentive and Trust Issues in Assured Information Sharing
"... Abstract. Assured information sharing among different organizations in a coalitional environment is an important first step in accomplishing many critical tasks. For example, different security agencies may need to share intelligence information for detecting terrorist plots. At the same, each orga ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract. Assured information sharing among different organizations in a coalitional environment is an important first step in accomplishing many critical tasks. For example, different security agencies may need to share intelligence information for detecting terrorist plots. At the same, each organization participating in the assured information sharing process may have different incentives. In this paper, we explore the effects of different incentives and potential trust issues among organizations on the assured information sharing process by developing an evolutionary game theoretic framework. In addition, we provide extensive simulation analysis that illustrates the impact of various different information sharing strategies.
Microsoft Word - 08-2-탁성우_final
"... Abstract This paper presents a simple but efficient scheme incorporating a reputation-based approach and a cross-layer approach, called the SIM scheme, for maintaining reliable connectivity and high performance in ad-hoc wireless networks. The SIM scheme incorporates the following two things: an ad ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract This paper presents a simple but efficient scheme incorporating a reputation-based approach and a cross-layer approach, called the SIM scheme, for maintaining reliable connectivity and high performance in ad-hoc wireless networks. The SIM scheme incorporates the following two things: an ad-hoc routing scheme with a reputation-based approach exploiting the game theory concept based on an evolutionarily stable strategy, and a cross-layer approach between the network layer and the transport layer employing a reputation-based approach.
ABSTRACT Title of dissertation: SECURITY, TRUST AND COOPERATION IN WIRELESS SENSOR NETWORKS
"... Wireless sensor networks are a promising technology for many real-world ap-plications such as critical infrastructure monitoring, scientific data gathering, smart buildings, etc.. However, given the typically unattended and potentially unsecured operation environment, there has been an increased num ..."
Abstract
- Add to MetaCart
(Show Context)
Wireless sensor networks are a promising technology for many real-world ap-plications such as critical infrastructure monitoring, scientific data gathering, smart buildings, etc.. However, given the typically unattended and potentially unsecured operation environment, there has been an increased number of security threats to sensor networks. In addition, sensor networks have very constrained resources, such as limited energy, memory, computational power, and communication bandwidth. These unique challenges call for new security mechanisms and algorithms. In this dissertation, we propose novel algorithms and models to address some important and challenging security problems in wireless sensor networks. The first part of the dissertation focuses on data trust in sensor networks. Since sensor networks are mainly deployed to monitor events and report data, the quality of received data must be ensured in order to make meaningful inferences from sensor data. We first study a false data injection attack in the distributed state estimation problem and propose a distributed Bayesian detection algorithm, which could maintain correct estimation results when less than one half of the sensors are