Team for Research in
Ubiquitous Secure Technology

Game Theoretic Modeling of Trust in Networks of Bayesian-Learning Sensors
Sameer Pai, Tanya Roosta, Stephen Wicker, Shankar Sastry

Citation
Sameer Pai, Tanya Roosta, Stephen Wicker, Shankar Sastry. "Game Theoretic Modeling of Trust in Networks of Bayesian-Learning Sensors". Unpublished article, 2008.

Abstract
The application of mathematical analysis to the study of wireless ad hoc and sensor networks has met with limited success due to the complexity of mobility, trafc models, the dynamic topology, and the unpredictability of wireless link quality that characterize such networks. The ability to model individual, independent decision makers whose actions can potentially affect all other decision makers makes game theory and especially the repeated game framework particularly attractive to analyze the performance of sensor networks. In this paper, we describe how various interactions in wireless sensor networks can be modeled as a Iterated Heterogeneous Trust Game (IHTG) [5]. We borrow from the work done on modeling trust in social networks as a game, and adapt the framework to the case of sensor networks. This allows the analysis of trust schemes in these networks, as well as the design of equilibrium-inducing mechanisms that provide incentives for individual nodes to behave in constructive ways.

Electronic downloads


Internal. This publication has been marked by the author for TRUST-only distribution, so electronic downloads are not available without logging in.
Citation formats  
  • HTML
    Sameer Pai, Tanya Roosta, Stephen Wicker, Shankar Sastry.
    <a href="http://www.truststc.org/pubs/344.html"
    ><i>Game Theoretic Modeling of Trust in Networks of
    Bayesian-Learning Sensors</i></a>, Unpublished
    article,  2008.
  • Plain text
    Sameer Pai, Tanya Roosta, Stephen Wicker, Shankar Sastry.
    "Game Theoretic Modeling of Trust in Networks of
    Bayesian-Learning Sensors". Unpublished article,  2008.
  • BibTeX
    @unpublished{PaiRoostaWickerSastry08_GameTheoreticModelingOfTrustInNetworksOfBayesianLearning,
        author = {Sameer Pai and Tanya Roosta and Stephen Wicker and
                  Shankar Sastry},
        title = {Game Theoretic Modeling of Trust in Networks of
                  Bayesian-Learning Sensors},
        year = {2008},
        abstract = {The application of mathematical analysis to the
                  study of wireless ad hoc and sensor networks has
                  met with limited success due to the complexity of
                  mobility, trafc models, the dynamic topology, and
                  the unpredictability of wireless link quality that
                  characterize such networks. The ability to model
                  individual, independent decision makers whose
                  actions can potentially affect all other decision
                  makers makes game theory and especially the
                  repeated game framework particularly attractive to
                  analyze the performance of sensor networks. In
                  this paper, we describe how various interactions
                  in wireless sensor networks can be modeled as a
                  Iterated Heterogeneous Trust Game (IHTG) [5]. We
                  borrow from the work done on modeling trust in
                  social networks as a game, and adapt the framework
                  to the case of sensor networks. This allows the
                  analysis of trust schemes in these networks, as
                  well as the design of equilibrium-inducing
                  mechanisms that provide incentives for individual
                  nodes to behave in constructive ways.},
        URL = {http://www.truststc.org/pubs/344.html}
    }
    

Posted by Sameer Pai on 31 Mar 2008.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.