Visible to the public Biblio

Filters: Keyword is coalitional game  [Clear All Filters]
2022-10-16
Arfaoui, Amel, Kribeche, Ali, Senouci, Sidi Mohammed.  2020.  Cooperative MIMO for Adaptive Physical Layer Security in WBAN. ICC 2020 - 2020 IEEE International Conference on Communications (ICC). :1–7.
Internet of Things (IoT) is becoming an emerging paradigm to provide pervasive connectivity where “anything“ can be connected “anywhere” at “anytime” via massive deployment of physical objects like sensors, controllers, and actuators. However, the open nature of wireless communications and the energy constraint of the IoT devices impose strong security concerns. In this context, traditional cryptographic techniques may not be suitable in such a resource-constrained network. To address this problem, an effective security solution that ensures a trade-off between security effectiveness and energy efficiency is required. In this paper, we exploit cooperative transmission between sensor nodes in IoT for e-Health application, as a promising technique to enhance the physical layer security of wireless communications in terms of secrecy capacity while considering the resource-impoverished devices. Specifically, we propose a dynamic and cooperative virtual multiple-input and multiple-output (MIMO) configuration approach based on game theory to preserve the confidentiality of the transmitted messages with high energy savings. For this purpose, we model the physical layer security cooperation problem as a non-transferable coalition formation game. The set of cooperative devices form a virtual dynamically-configured MIMO network that is able to securely and efficiently transmit data to the destination. Simulation results show that the proposed game-based virtual MIMO configuration approach can improve the average secrecy capacity per device as well as the network lifetime compared to non-cooperative transmission.
2018-10-26
Halabi, T., Bellaiche, M., Abusitta, A..  2018.  A Cooperative Game for Online Cloud Federation Formation Based on Security Risk Assessment. 2018 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2018 4th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom). :83–88.

Cloud federations allow Cloud Service Providers (CSPs) to deliver more efficient service performance by interconnecting their Cloud environments and sharing their resources. However, the security of the federated Cloud service could be compromised if the resources are shared with relatively insecure and unreliable CSPs. In this paper, we propose a Cloud federation formation model that considers the security risk levels of CSPs. We start by quantifying the security risk of CSPs according to well defined evaluation criteria related to security risk avoidance and mitigation, then we model the Cloud federation formation process as a hedonic coalitional game with a preference relation that is based on the security risk levels and reputations of CSPs. We propose a federation formation algorithm that enables CSPs to cooperate while considering the security risk introduced to their infrastructures, and refrain from cooperating with undesirable CSPs. According to the stability-based solution concepts that we use to evaluate the game, the model shows that CSPs will be able to form acceptable federations on the fly to service incoming resource provisioning requests whenever required.