Back to Search
Start Over
Method for countering strategic attacks in zero-boundary trusted networks.
- Source :
-
Journal of Computational Methods in Sciences & Engineering . 2024, Vol. 24 Issue 3, p2007-2015. 9p. - Publication Year :
- 2024
-
Abstract
- This paper proposes a detection method for countering strategic attacks in zero-boundary trusted networks. In a normal network, malicious nodes are only a minority; therefore, this paper employs a simple game-theoretic approach to suppress the occurrence of malicious events. Firstly, the paper introduces a behavior-based event inference method to detect malicious events, wherein nodes reference the inference results of other nodes to form composite reports. Subsequently, the paper introduces a simple game, allowing malicious nodes to choose not to falsify reports under disadvantaged scenarios, reaching a Bayesian equilibrium with normal nodes, thereby reducing the incidence of malicious events. This method demonstrates significant effectiveness in conventional networks where malicious nodes constitute a minority. [ABSTRACT FROM AUTHOR]
- Subjects :
- *EQUILIBRIUM
*GEOGRAPHIC boundaries
*GAMES
Subjects
Details
- Language :
- English
- ISSN :
- 14727978
- Volume :
- 24
- Issue :
- 3
- Database :
- Academic Search Index
- Journal :
- Journal of Computational Methods in Sciences & Engineering
- Publication Type :
- Academic Journal
- Accession number :
- 178050830
- Full Text :
- https://doi.org/10.3233/JCM-230020