• Title/Summary/Keyword: Malicious Player

Search Result 3, Processing Time 0.02 seconds

Game Theoretic Modeling for Mobile Malicious Node Detection Problem in Static Wireless Sensor Networks

  • Ho, Jun-Won
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.238-242
    • /
    • 2021
  • Game theory has been regarded as a useful theoretical tool for modeling the interactions between distinct entities and thus it has been harnessed in various research field. In particular, research attention has been shown to how to apply game theory to modeling the interactions between malign and benign entities in the field of wireless networks. Although various game theoretic modeling work have been proposed in the field of wireless networks, our proposed work is disparate to the existing work in the sense that we focus on mobile malign node detection problem in static wireless sensor networks. More specifically, we propose a Bayesian game theoretic modeling for mobile malign node detection problem in static wireless sensor networks. In our modeling, we formulate a two-player static Bayesian game with imperfect information such that player 1 is aware of the type of player 2, but player 2 is not aware of the type of player 1. We use four strategies in our static Bayesian game. We obtain Bayesian Nash Equilibria with pure strategies under certain conditions.

A Study on the Malicious Players and Troll in Team Fighting Games (팀 대전 게임에서의 악성 플레이어와 트롤에 관한 연구)

  • Jang, Hyun-Ik;Kim, Hyo-Nam
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.173-176
    • /
    • 2022
  • 본 논문에서는 팀 대전 게임의 예시를 사용하며 팀 대전 게임에서 트롤을 사용하는 악성 플레이어에 대한 실태를 조사하고 이에 따른 여러 종류의 악성 플레이어에 따른 개선 방안을 제시한다. 악성 플레이어가 어떤 식으로 플레이하는지 설명하고, 사용자들이 악성 플레이어에 피해받는 트롤 사례를 조사하여 이에 따른 현재 문제들을 방지하기 위해 사용되고 있는 각 개발사의 조치 방안 및 사용자 커뮤니티의 의견을 통해 실태를 조사한다. 위의 조사한 자료를 바탕으로 어떻게 하면 현재 악성 플레이어를 예방 및 차단하는지에 대한 개선 방안을 제시하면서 운영 차원에서는 어떤 방법으로 지원해야 하는지 등의 내용을 제시한다.

  • PDF

An Improved Privacy Preserving Construction for Data Integrity Verification in Cloud Storage

  • Xia, Yingjie;Xia, Fubiao;Liu, Xuejiao;Sun, Xin;Liu, Yuncai;Ge, Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3607-3623
    • /
    • 2014
  • The increasing demand in promoting cloud computing in either business or other areas requires more security of a cloud storage system. Traditional cloud storage systems fail to protect data integrity information (DII), when the interactive messages between the client and the data storage server are sniffed. To protect DII and support public verifiability, we propose a data integrity verification scheme by deploying a designated confirmer signature DCS as a building block. The DCS scheme strikes the balance between public verifiable signatures and zero-knowledge proofs which can address disputes between the cloud storage server and any user, whoever acting as a malicious player during the two-round verification. In addition, our verification scheme remains blockless and stateless, which is important in conducting a secure and efficient cryptosystem. We perform security analysis and performance evaluation on our scheme, and compared with the existing schemes, the results show that our scheme is more secure and efficient.