Advanced Search
Volume 41 Issue 4
Mar.  2019
Turn off MathJax
Article Contents
Bin ZHAO, Chuangbai XIAO, Wenyin ZHANG, Xue GU. Incentive and Restraint Mechanism of Rewards and Punishment in Access Control Based on Game Theory[J]. Journal of Electronics & Information Technology, 2019, 41(4): 1002-1009. doi: 10.11999/JEIT180406
Citation: Bin ZHAO, Chuangbai XIAO, Wenyin ZHANG, Xue GU. Incentive and Restraint Mechanism of Rewards and Punishment in Access Control Based on Game Theory[J]. Journal of Electronics & Information Technology, 2019, 41(4): 1002-1009. doi: 10.11999/JEIT180406

Incentive and Restraint Mechanism of Rewards and Punishment in Access Control Based on Game Theory

doi: 10.11999/JEIT180406
Funds:  The Nation Science Foundation of China (61501008, 61771230), The Natural Science Foundation of Beijing (4162007), The Shandong Provincial Key Research and Development Program (2017CXGC0701), The Natural Science Foundation of Shandong Province (ZR2013FQ024), The Project of Shandong Province Higher Educational Science and Technology Program (J17KA048)
  • Received Date: 2018-04-28
  • Rev Recd Date: 2018-12-18
  • Available Online: 2018-12-25
  • Publish Date: 2019-04-01
  • Trust based access control is a research hotspot in  open network that access control is one of the importation technology of information security. For the interactive access behaviors of non-honest cooperation between network interactive entities in open network, the dynamic game access control model is established based on trust, and interactive entities are encouraged to rationally choose strategies expected by the system (the designer) driven by its own benefits through the designed mechanism. Taking benefits as the driven force, the mechanism rewards the honest nodes and punishes and restrains the non-honest nodes, and then reaches the general state of equalization between entities which meets the goal. The simulation experiment and result analysis show that the incentive and restraint mechanism is valid and necessary on the issue of non-honest access between network interactive entities.

  • loading
  • FUDENBERG D and TIROLE J. Game Theory[M]. Cambridge, Massachusetts, US, MIT Press, 1991: 275–277.
    赵斌, 何泾沙, 张伊璇, 等. 基于灰色关联分析的推荐信任评估方法[J]. 北京大学学报(自然科学版), 2017, 53(2): 314–320 doi: 10.13209/j.0479-8023.2016.112

    ZHAO Bin, HE Jingsha, ZHANG Yixuan, et al. Recommendation trust evaluation method based on grey relational analysis[J]. Journal of Peking University (Natural Science Edition), 2017, 53(2): 314–320 doi: 10.13209/j.0479-8023.2016.112
    GHARAM M, ABDALLAH W, and BOUDRIGA N. The design of a game-theoretic based multiple access scheme for 5G millimeter wave communication networks[C]. ACM International Conference on Advances in Mobile Computing & Multimedia, Salzburg, Austria, 2017: 166–17.
    刘琴, 刘旭辉, 胡柏霜, 等. 个人健康记录云管理系统中支持用户撤销的细粒度访问控制[J]. 电子与信息学报, 2017, 39(5): 1206–1212 doi: 10.11999/JEIT16062

    LIU Qin, LIU Xuhui, HU Baishuang, et al. Personal health record cloud management system in support of user revocation fine grained access control[J]. Journal of Electronics &Information Technology, 2017, 39(5): 1206–1212 doi: 10.11999/JEIT16062
    郭树行, 张禹. 基于动态情景网关的系统协同访问控制模型[J]. 通信学报, 2013, 34(Z1): 142–147

    GUO Shuxing and ZHANG Yu. Collaborative access control model based on dynamic situational gateway[J]. Journal of Communications, 2013, 34(Z1): 142–147
    HELIL N, HALIK N, and RAHMAN K. Non-zero-sum cooperative access control game model with user trust and permission risk[J]. Applied Mathematics & Computation, 2017, 307: 299–310 doi: 10.1016/j.amc.2017.03.006
    CHEN Lijun, LOW S H, and DOYLE J C. Random access game and medium access control design[J]. IEEE/ACM Transactions on Networking, 2010, 18(4): 1303–1316 doi: 10.1109/TNET.2010.2041066
    ALAVI S M and ZHOU Chi. Resource allocation scheme for orthogonal frequency division multiple access networks based on cooperative game theory[J]. International Journal of Communication Systems, 2014, 27(8): 1105–1125 doi: 10.1002/dac.2398
    ZHAO Bin, XIAO Chuangbai, ZHANG Yu, et al. Assessment of recommendation trust for access control in open networks[J]. Cluster Computing, 2018(4): 1–7 doi: 10.1007/s10586-017-1338-x
    郭子溢, 刘立, 叶牡丹, 等. 层次化社交网络中直销激励机制的研究与设计[J]. 计算机工程与设计, 2017, 38(8): 2111–2115 doi: 10.16208/j.issn1000-7024.2017.08.022

    GUO Ziyi, LIN Li, YE Mudan, et al. Research and design of direct selling incentive mechanism in hierarchical social network[J]. Computer Engineering and Design, 2017, 38(8): 2111–2115 doi: 10.16208/j.issn1000-7024.2017.08.022
    IOSIFIDIS G, GAO Lin, and HUANG Jianwei. Incentive mechanisms for user-provided networks[J]. IEEE Communications Magazine, 2014, 52(9): 20–27 doi: 10.1109/MCOM.2014.6894448
    CHANG Junsheng, PANG Zhengbin, XU Weixia, et al. An incentive compatible reputation mechanism for P2P systems[J]. The Journal of Supercomputing, 2014, 69(3): 1382–1409 doi: 10.1007/s11227-014-1204-z
    WU Tinyu, LEE Weitsong, GUIZANI N, et al. Incentive mechanism for P2P file sharing based on social network and game theory[J]. Journal of Network and Computer Applications, 2014, 41(5): 47–55 doi: 10.1016/j.jnca.2013.10.006
    王博, 黄传河, 杨文忠, 等. Ad Hoc网络中基于惩罚机制的激励合作转发模型[J]. 计算机研究与发展, 2011, 48(3): 398–406

    WANG Bo, HUANG Chuanhe, YANG Wenzhong, et al. Incentive cooperation forwarding model based on penalty mechanism in Ad Hoc networks[J]. Computer Research and Development, 2011, 48(3): 398–406
    王杨, 王汝传, 徐小龙, 等. 资源共享P2P网络的进化博弈激励模型[J]. 计算机工程, 2011, 37(11): 19–21 doi: 10.3969/j.issn.1000-3428.2011.11.007

    WANG Yang, WANG Ruchuan, XU Xiaolong, et al. Evolutionary game incentive model of resource sharing P2P network[J]. Computer Engineering, 2011, 37(11): 19–21 doi: 10.3969/j.issn.1000-3428.2011.11.007
    CIOBANU R, DOBRE C, DASCALU M, et al. SENSE: A collaborative selfish node detection and incentive mechanism for opportunistic networks[J]. Journal of Network and Computer Applications, 2014, 41(5): 240–249 doi: 10.1016/j.jnca.2014.01.009
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(10)  / Tables(3)

    Article Metrics

    Article views (2124) PDF downloads(73) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return