[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
review-article

Game-Based Trust in Complex Networks: : Past, Present, and Future

Published: 01 January 2021 Publication History

Abstract

As an efficient approach, the trust policy is implemented to defend against insider attacks in complex networks. However, the imperfection of trust relationships directly hinders the effort to quantitatively calculate trust value, especially in choosing a cooperative partner. Fortunately, the game theory is gradually concerned with addressing the above issue to further enhance security. In this paper, the game theory and the trust policy are reviewed briefly. Then, the research roadmap on game-based trust in complex networks is discussed and analysed deeply. Furthermore, some research directions in the near future are given. It is worth mentioning that our contributions not only describe the evolution of the game-based trust clearly but also suggest the trust mechanism based on the bounded rational game more suitable to uncertain information.

References

[1]
A. Jøsang, “The right type of trust for distributed systems,” in Proceedings of the 1996 Workshop on New Security Paradigms, pp. 119–131, New York, NY, USA, September 1996.
[2]
J. Berg, J. Dickhaut, and K. McCabe, “Trust, reciprocity, and social history,” Games and Economic Behavior, vol. 10, no. 1, pp. 122–142, 1995.
[3]
A. Rubinstein, Modeling Bounded Rationality, MIT press, Cambridge, MA, USA, 1998.
[4]
J. Geanakoplos, D. Pearce, and E. Stacchetti, “Psychological games and sequential rationality,” Games and Economic Behavior, vol. 1, no. 1, pp. 60–79, 1989.
[5]
M. Rabin, “Incorporating fairness into game theory and economics,” The American Economic Review, vol. 83, no. 5, pp. 1281–1302, 1993.
[6]
K. Komathy and P. Narayanasamy, “Secure data forwarding against denial of service attack using trust based evolutionary game,” in Proceedings of the VTC Spring 2008-IEEE Vehicular Technology Conference, pp. 31–35, Birmingham, EN, UK, May 2008.
[7]
H. Xie, W. Wang, and X. Zhang, “Evolutionary game and simulation of management strategies of fallow cultivated land: a case study in Hunan province, China,” Land Use Policy, vol. 71, pp. 86–97, 2018.
[8]
Y. Z. J. Yao, “Game theoretic approach to shadowed sets: a three-way tradeoff perspective,” Information Sciences, vol. 507, pp. 540–552, 2020.
[9]
J. F. Nash, “Equilibrium points in n-person games,” Proceedings of the National Academy of Sciences, vol. 36, no. 1, pp. 48–49, 1950.
[10]
J. Nash, “Non-cooperative games,” The Annals of Mathematics, vol. 54, no. 2, pp. 286–295, 1951.
[11]
J. C. Harsanyi, “Games with incomplete information played by “bayesian” players, I-iii Part I. The basic model,” Management Science, vol. 14, no. 3, pp. 159–182, 1967.
[12]
J. F. Reinganum, “A dynamic game of R and D: patent protection and competitive behavior,” Econometrica, vol. 50, no. 3, pp. 671–688, 1982.
[13]
M. Pohjola, “Applications of dynamic game theory to macroeconomics,” Dynamic Games and Applications in Economics, vol. 265, pp. 103–133, 1986.
[14]
A. Paudel, K. Chaudhari, C. Long, and H. B. Gooi, “Peer-to-peer energy trading in a prosumer-based community microgrid: a game-theoretic model,” IEEE Transactions on Industrial Electronics, vol. 66, no. 8, pp. 6087–6097, 2018.
[15]
C. Zhang, J. Wu, Y. Zhou, M. Cheng, and C. Long, “Peer-to-Peer energy trading in a Microgrid,” Applied Energy, vol. 220, pp. 1–12, 2018.
[16]
X.-X. Zheng, Z. Liu, K. W. Li, J. Huang, and J. Chen, “Cooperative game approaches to coordinating a three-echelon closed-loop supply chain with fairness concerns,” International Journal of Production Economics, vol. 212, pp. 92–110, 2019.
[17]
S. Safarzadeh and M. Rasti-Barzoki, “A game theoretic approach for assessing residential energy-efficiency program considering rebound, consumer behavior, and government policies,” Applied Energy, vol. 233-234, pp. 44–61, 2019.
[18]
S. Noor, W. Yang, M. Guo, K. H. van Dam, and X. Wang, “Energy Demand Side Management within micro-grid networks enhanced by blockchain,” Applied Energy, vol. 228, pp. 1385–1398, 2018.
[19]
F. Tang, Z. M. Fadlullah, N. Kato, F. Ono, and R. Miura, “AC-POCA: anticoordination game based partially overlapping channels assignment in combined UAV and d2d-based networks,” IEEE Transactions on Vehicular Technology, vol. 67, no. 2, pp. 1672–1683, 2018.
[20]
X. Deng, W. Jiang, and Z. Wang, “Zero-sum polymatrix games with link uncertainty: a Dempster-Shafer theory solution,” Applied Mathematics and Computation, vol. 340, pp. 101–112, 2019.
[21]
Y. Han and Y. Deng, “A novel matrix game with payoffs of Maxitive Belief Structure,” International Journal of Intelligent Systems, vol. 34, no. 4, pp. 690–706, 2019.
[22]
X. Deng and W. Jiang, “D number theory based game-theoretic framework in adversarial decision making under a fuzzy environment,” International Journal of Approximate Reasoning, vol. 106, pp. 194–213, 2019.
[23]
H.-G. Peng, X.-K. Wang, T.-L. Wang, and J.-Q. Wang, “Multi-criteria game model based on the pairwise comparisons of strategies with Z-numbers,” Applied Soft Computing, vol. 74, pp. 451–465, 2019.
[24]
Y. Han, Y. Deng, Z. Cao, and C. T. Lin, “An interval-valued Pythagorean prioritized operator-based game theoretical framework with its applications in multicriteria group decision making,” Neural Computing and Applications, vol. 32, pp. 1–19, 2019.
[25]
Q. Liu, X. Li, and X. Meng, “Effectiveness research on the multi-player evolutionary game of coal-mine safety regulation in China based on system dynamics,” Safety Science, vol. 111, pp. 224–233, 2019.
[26]
W. Wei, X. Fan, H. Song, X. Fan, and J. Yang, “Imperfect information dynamic Stackelberg game based resource allocation using hidden markov for cloud computing,” IEEE Transactions on Services Computing, vol. 11, no. 1, pp. 78–89, 2018.
[27]
Y. Zhang, M. Pan, L. Song, Z. Dawy, and Z. Han, “A survey of contract theory-based incentive mechanism design in wireless networks,” IEEE Wireless Communications, vol. 24, no. 3, pp. 80–85, 2017.
[28]
B. Cao, S. Xia, J. Han, and Y. Li, “A distributed game methodology for crowdsensing in uncertain wireless scenario,” IEEE Transactions on Mobile Computing, vol. 19, no. 1, pp. 15–28, 2019.
[29]
M. Alam, K. Kuga, and J. Tanimoto, “Three-strategy and four-strategy model of vaccination game introducing an intermediate protecting measure,” Applied Mathematics and Computation, vol. 346, pp. 408–422, 2019.
[30]
W. Fang, W. Zhang, W. Chen et al., “Trust-based Attack and Defense in Wireless Sensor Networks: A Survey,” Wireless Communications and Mobile Computing, vol. 2020, 20 pages, 2020.
[31]
W. Fang, N. Cui, W. Chen, W. Zhang, and Y. Chen, “A trust-based security system for data collecting in smart city,” IEEE Transactions on Industrial Informatics, vol. 99, p. 1, 2020.
[32]
N. Meghanathan, “A distributed trust evaluation model for wireless mobile sensor networks,” in Proceedings of the 2014 11th International Conference on Information Technology, pp. 186–191, Bitola, Macedonia, April 2014.
[33]
W. Fang, W. Zhang, Y. Yang, Y. Liu, and W. Chen, “A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution,” Science China Information Sciences, vol. 60, no. 4, 2017.
[34]
F. Fang, J. Li, and J. Li, “A reputation management scheme based on multi-factor in WSNs,” in Proceedings of the 2013 International Conference On Mechatronic Sciences, Electric Engineering and Computer (Mec), pp. 3843–3848, Shenyang, China, December 2013.
[35]
Y. Ren, V. I. Zadorozhny, V. A. Oleshchuk, and F. Y. Li, “A novel approach to trust management in unattended wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 13, no. 7, pp. 1409–1423, 2013.
[36]
X. Yang, G. Wang, H. He, J. Lu, and Y. Zhang, “Automated demand response framework in ELNs: decentralized scheduling and smart contract,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 50, no. 1, pp. 58–72, 2019.
[37]
S. P. Hsu, J. M. Ling, A. F. Messenger, and B. W. Evans, Remote Identity Verification Technique Using a Personal Identification Device, U.S. Patent, USA, 2001.
[38]
M. Andrade, Systems and Methods for Providing Block Chain-Based Multifactor Personal Identity Verification, U.S. Patent, USA, 2018.
[39]
Z. Tian, X. Gao, S. Su, J. Qiu, X. Du, and M. Guizani, “Evaluating reputation management schemes of internet of vehicles based on evolutionary game theory,” IEEE Transactions on Vehicular Technology, vol. 68, no. 6, pp. 5971–5980, 2019.
[40]
Y. Li, H. Xu, Q. Cao, Z. Li, and S. Shen, “Evolutionary game-based trust strategy adjustment among nodes in wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 11, no. 2, pp. 818903–818912, 2015.
[41]
H. Fang, L. Xu, J. Li, and K.-K. R. Choo, “An adaptive trust-Stackelberg game model for security and energy efficiency in dynamic cognitive radio networks,” Computer Communications, vol. 105, pp. 124–132, 2017.
[42]
D. D. Cagno and E. Sciubba, “Trust, trustworthiness and social networks: playing a trust game when networks are formed in the lab,” Journal of Economic Behavior& Organization, vol. 75, no. 2, pp. 156–167, 2010.
[43]
S. Shen, L. Huang, E. Fan, K. Hu, J. Liu, and Q. Cao, “Trust dynamics in WSNs: an evolutionary game-theoretic approach,” Journal of Sensors, vol. 2016, pp. 1–10, 2016.
[44]
O. A. Wahab, J. Bentahar, H. Otrok, and A. Mourad, “Towards trustworthy multi-cloud services communities: a trust-based hedonic coalitional game,” IEEE Transactions on Services Computing, vol. 11, no. 1, pp. 184–201, 2018.
[45]
L. Militano, A. Orsino, G. Araniti, M. Nitti, L. Atzori, and A. Iera, “Trust-based and social-aware coalition formation game for multihop data uploading in 5G systems,” Computer Networks, vol. 111, pp. 141–151, 2016.
[46]
X. Wang, Y. Wu, Y. Ren et al., “An evolutionary game-based trust cooperative stimulation model for large scale MANETs,” International Journal of Distributed Sensor Networks, vol. 9, no. 6, 2013.
[47]
H.-J. Li, Q. Wang, S. Liu, and J. Hu, “Exploring the trust management mechanism in self-organizing complex network based on game theory,” Physica A: Statistical Mechanics and Its Applications, vol. 542, 2020.
[48]
J. Bennaceur, H. Idoudi, and L. A. Saidane, “A trust game model for the cognitive radio networks,” in Proceedings of the 2016 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), pp. 1–5, Paris, France, November 2016.

Cited By

View all
  • (2022)Analysis Model Design on the Influencing Factors and Countermeasures of China’s International Trade Facing the Belt and RoadScientific Programming10.1155/2022/49276102022Online publication date: 1-Jan-2022

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Complexity
Complexity  Volume 2021, Issue
2021
20672 pages
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Publisher

John Wiley & Sons, Inc.

United States

Publication History

Published: 01 January 2021

Qualifiers

  • Review-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Analysis Model Design on the Influencing Factors and Countermeasures of China’s International Trade Facing the Belt and RoadScientific Programming10.1155/2022/49276102022Online publication date: 1-Jan-2022

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media