Skip to main content
Log in

A Game Theoretic Reward and Punishment Unwanted Traffic Control Mechanism

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

With the development of the Internet of Things and the pervasive use of internet service providers (ISPs), internet users and data have reached an unprecedented volume. However, the existence of malicious users seriously undermine user privacy and network security by distributing a large amount of unwanted traffic, such as spam, pop-up, and malware. This to some extent can be identified with the cooperation of individual users by installing anti-virus toolkits. However, users need to purchase such software at an additional cost. Therefore, unless built-in incentive mechanisms exist, rational users will choose not to install virus software. If enough network entities behave in this way, the network will be flooded with unwanted traffic. In this paper, we propose an evolutionary game theoretic incentive mechanism to promote the cooperation of individual users to curb the expansion of unwanted traffic. We propose a combined reward and punishment mechanism to further incentivize cooperative behavior. Meanwhile, the acceptance condition of our framework is analyzed and we carry out a number of simulations to evaluate the acceptance conditions of our framework.The experimental results indicate that our reward and punishment mechanism can efficiently incentivize users to adopt cooperative behavior and reduce unwanted traffic.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Ahmed AA, Jantan A, Wan TC (2015) Filtration model for the detection of malicious traffic in large-scale networks. Comput Commun 82:59–70

    Article  Google Scholar 

  2. Al-Duwairi B, Khater I, Al-Jarrah O (2012) Detecting image spam using image texture features. Int J Inf Secur Res (IJISR) 2(3/4):344–353

    Google Scholar 

  3. Chen Y, Crespi N, Ortiz AM, Shu L (2017) Reality mining: a prediction algorithm for disease dynamics based on mobile big data. Inform Sci 379:82–93

    Article  Google Scholar 

  4. Chen Y, Lee GM, Lei S, Crespi N (2016) Industrial internet of things-based collaborative sensing intelligence: framework and research challenges. Sensors 16(2):215

    Article  Google Scholar 

  5. Chen Y, Shu L, Crespi N, Lee GM, Guizani M (2016) Understanding the impact of network structure on propagation dynamics based on mobile big data, 1018–1023

  6. Fan Y, Ye Y, Chen L (2016) Malicious sequential pattern mining for automatic malware detection. Pergamon Press, Inc.

  7. Hou YT, Chang Y, Chen T, Laih CS, Chen CM (2010) Malicious web content detection by machine learning. Expert Syst Appl 37(1):55–60

    Article  Google Scholar 

  8. Huda S, Miah S, Yearwood J, Alyahya S, Al-Dossari H, Doss R (2018) A malicious threat detection model for cloud assisted internet of things (cot) based industrial control system (ics) networks using deep belief network. J Parallel Distrib Comput, 120

  9. Jiang G, Shen S, Hu K, Huang L, Li H, Han R (2015) Evolutionary game-based secrecy rate adaptation in wireless sensor networks. Int J Distrib Sensor Netw 2015:25

    Google Scholar 

  10. Jianzhong Z, Xu W, Yudi P, Xu Ji (2010) Mailtrust: a mail reputation mechanism based on improved trustguard. In: 2010 International conference on communications and mobile computing (CMC), vol 1. IEEE, pp 218–222

  11. Kim S, Kim J, Kang BH (2018) Malicious url protection based on attackers’ habitual behavioral analysis. Computers & Security

  12. Pinyol I, Sabater-Mir J (2013) Computational trust and reputation models for open multi-agent systems: a review. Artif Intell Rev 40(1):1–25

    Article  Google Scholar 

  13. Shen Y, Yan Z, Kantola R (2014) Analysis on the acceptance of global trust management for unwanted traffic control based on game theory. Comput Secur 47:3–25

    Article  Google Scholar 

  14. Shu L, Chen Y, Sun Z, Tong F, et al. (2017) Detecting the dangerous area of toxic gases with wireless sensor networks. IEEE Transactions on Emerging Topics in Computing

  15. Singh K, Guntuku SC, Thakur A, Hota C (2014) Big data analytics framework for peer-to-peer botnet detection using random forests. Inform Sci 278:488–497

    Article  Google Scholar 

  16. Spyridopoulos T, Karanikas G, Tryfonas T, Oikonomou G (2013) A game theoretic defence framework against dos/ddos cyber attacks. Comput Secur 38:39–50

    Article  Google Scholar 

  17. Srivastava V, Neel JO, MacKenzie AB, Menon R, DaSilva LA, Hicks JE, Reed JH, Gilles RP (2005) Using game theory to analyze wireless ad hoc networks. IEEE Commun Surv Tutor 7(1-4):46–56

    Article  Google Scholar 

  18. Szolnoki A, Perc M (2012) Conditional strategies and the evolution of cooperation in spatial public goods games. Phys Rev E 85(2):026–104

    Article  Google Scholar 

  19. Tian C, Yang B, Zhong J, Liu X (2014) Trust-based incentive mechanism to motivate cooperation in hybrid p2p networks. Comput Netw 73:244–255

    Article  Google Scholar 

  20. Wang Y, Nakao A, Vasilakos AV, Ma J (2011) On the effectiveness of service differentiation based resource-provision incentive mechanisms in dynamic and autonomous p2p networks. Comput Netw 55(17):3811–3831

    Article  Google Scholar 

  21. Weibull JW (1997) Evolutionary game theory. MIT press

  22. Xu S, Li M, Chen Y, Shu L, Gu X (2013) A cooperation scheme based on reputation for opportunistic networks. In: International conference on computing, management and telecommunications, pp 289–294

  23. Xu X, Wang Q, Cao J, Wan PJ (2012) Locating malicious nodes for data aggregation in wireless networks. In: IEEE INFOCOM, pp 3056–3060

  24. Yan Z, Kantola R, Shen Y (2011) Unwanted traffic control via global trust management. In: 10th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 647–654

  25. Yan Z, Kantola R, Shen Y (2012) Unwanted traffic control via hybrid trust management. In: 11th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 666–673

  26. Yan Z, Kantola R, Shen Y (2014) A generic solution for unwanted traffic control through trust management. Rev Hypermed Multimed 20(1):25–51

    Article  Google Scholar 

  27. Yan Z, Prehofer C (2011) Autonomic trust management for a component-based software system. IEEE Trans Depend Secur Comput 8(6):810–823

    Article  Google Scholar 

  28. Bo Z, Li Q, Ma Y (2017) Research on dynamic heuristic scanning technique and the application of the malicious code detection model. Inf Process Lett 117:19–24

    Article  MathSciNet  Google Scholar 

  29. Zhao BQ, Lui JCS, Chiu D-M (2012) A mathematical framework for analyzing adaptive incentive protocols in p2p networks. IEEE/ACM Trans Network 20(2):367–380

    Article  Google Scholar 

  30. Zheleva E, Kolcz A, Getoor L (2008) Trusting spam reporters: a reporter-based reputation system for email filtering. ACM Trans Inf Syst (TOIS) 27(1):1–37

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Science Foundation of China (Grant No. 61802097), and the Natural Science Foundation of Jiangsu Province (No. BK20131277).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuanfang Chen.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, J., Li, M., Alam, M. et al. A Game Theoretic Reward and Punishment Unwanted Traffic Control Mechanism. Mobile Netw Appl 24, 1279–1294 (2019). https://doi.org/10.1007/s11036-018-1166-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-018-1166-0

Keywords

Navigation