Abstract
It is frequently assumed that the parties involved in a security mechanism will behave according to everyone’s expectation. However, some of them might be tempted to depart from the expected (or canonical) behavior, because such a deviation is more beneficial for them. As an illustration, we will consider that phenomenon in the framework of wireless networks. We will briefly introduce some basic background in game theory and provide an overview of several recent contributions to that field. Finally, we will consider two examples in more detail, namely revocation in high-mobility (or “ephemeral”) networks and pseudonym change in mix zones.
Notes:
-
Some of the material of this talk appears in the book “Security and Cooperation in Wireless Networks” by L. Buttyan and J.-P. Hubaux, Cambridge University Press, 2008, available at http://secowinet.epfl.ch
-
A list of applications of game theory to various security (and cryptography) problems can be found at: http://lca.epfl.ch/projects/gamesec
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hubaux, JP. (2010). Security Mechanisms with Selfish Players in Wireless Networks. In: Sion, R. (eds) Financial Cryptography and Data Security. FC 2010. Lecture Notes in Computer Science, vol 6052. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14577-3_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-14577-3_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14576-6
Online ISBN: 978-3-642-14577-3
eBook Packages: Computer ScienceComputer Science (R0)