Evaluating Reputation Management Schemes of Internet of Vehicles based on Evolutionary Game Theory

02/12/2019
by   Zhihong Tian, et al.
0

Conducting reputation management is very important for Internet of vehicles. However, most of the existing researches evaluate the effectiveness of their schemes with settled attacking behaviors in their simulation which cannot represent the scenarios in reality. In this paper, we propose to consider dynamical and diversity attacking strategies in the simulation of reputation management scheme evaluation. To that end, we apply evolutionary game theory to model the evolution process of malicious users' attacking strategies, and discuss the methodology of the evaluation simulations. We further apply our evaluation method to a reputation management scheme with multiple utility functions, and discuss the evaluation results. The results indicate that our evaluation method is able to depict the evolving process of the dynamic attacking strategies in a vehicular network, and the final state of the simulation could be used to quantify the protection effectiveness of the reputation management scheme.

READ FULL TEXT

page 1

page 5

research
10/26/2022

Access Service Records Based Trust Management Scheme for Internet of Things

The distributed structure of the Internet of things has gradually replac...
research
02/14/2021

Responsibility Management through Responsibility Networks

The safety management is critically important in the workplace. Unfortun...
research
11/08/2018

An Efficient Anonymous Authentication Scheme for Internet of Vehicles

Internet of Vehicles (IoV) is an intelligent application of IoT in smart...
research
02/23/2021

An Interaction-aware Evaluation Method for Highly Automated Vehicles

It is important to build a rigorous verification and validation (V V) ...
research
10/05/2018

Group Handover Management in Mobile Femtocellular Network Deployment

The mobile femtocell is the new paradigm for the femtocellular network d...
research
08/01/2021

Correlation of biological and computer viruses through evolutionary game theory

Computer viruses have many similarities to biological viruses, and their...
research
06/07/2023

Constraint-based recommender system for crisis management simulations

In the context of the evacuation of populations, some citizens/volunteer...

Please sign up or login with your details

Forgot password? Click here to reset