Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
3 results
Search Results
Item Adaptive Selection of Cryptographic Protocols in Wireless Sensor Networks using Evolutionary Game Theory(Elsevier B.V., 2016) Arora, S.; Singh, P.; Gupta, A.J.Game theory applies to scenarios wherein multiple players with contrary motives contend with each other. Various solutions based on Game theory have been recently proposed which dealt with security aspects of wireless sensor networks (WSNs). However, the nodes have limited capability of rationality and evolutionary learning which makes it unfavorable to apply conventional game theory in WSNs. Evolutionary Game Theory (EGT) relies on bounded rationality assumption which is in harmony with the wireless sensor networks characteristics. Based on EGT, authors propose an adaptive security model for WSNs for the selection of cryptographic protocols during runtime. The authors formulate this selection in WSNs with the help of an evolutionary game to obtain the evolutionarily stable strategy (ESS) for the system. In this model, the sensor nodes dynamically adapt their defensive strategies to attain the most efficient defense, corresponding to the attackers' varied strategies. Further, the simulations convey that the proposed system converges rapidly to the Evolutionary Stable Strategy. Not only the system converges, but also forms a stable system which was verified by deliberately destabilizing the system. Results show that the nodes quickly return to ESS even after perturbation. © 2016 The Authors.Item Adaptive Selection of Cryptographic Protocols in Wireless Sensor Networks using Evolutionary Game Theory(Elsevier B.V., 2016) Arora, S.; Singh, P.; Gupta, A.J.Game theory applies to scenarios wherein multiple players with contrary motives contend with each other. Various solutions based on Game theory have been recently proposed which dealt with security aspects of wireless sensor networks (WSNs). However, the nodes have limited capability of rationality and evolutionary learning which makes it unfavorable to apply conventional game theory in WSNs. Evolutionary Game Theory (EGT) relies on bounded rationality assumption which is in harmony with the wireless sensor networks characteristics. Based on EGT, authors propose an adaptive security model for WSNs for the selection of cryptographic protocols during runtime. The authors formulate this selection in WSNs with the help of an evolutionary game to obtain the evolutionarily stable strategy (ESS) for the system. In this model, the sensor nodes dynamically adapt their defensive strategies to attain the most efficient defense, corresponding to the attackers' varied strategies. Further, the simulations convey that the proposed system converges rapidly to the Evolutionary Stable Strategy. Not only the system converges, but also forms a stable system which was verified by deliberately destabilizing the system. Results show that the nodes quickly return to ESS even after perturbation. © 2016 The Authors.Item Broker-based mechanism for cloud provider selection(Inderscience Publishers, 2020) Achar, R.; Santhi Thilagam, P.; Acharya, S.Cloud computing has recently emerged as a new computing paradigm for delivering on demand virtualised computing resources over the internet on a pay-as-use basis. Applications hosted in cloud have different requirements which include both low level (resource) requirements and high level (performance) requirements. However, most of the cloud providers satisfy SLAs based on resource requirements rather than providing performance guarantees to applications. This gap creates a need for selecting a more suitable cloud provider who can satisfy performance requirements of applications along with resource requirements. This work aims at proposing a broker-based approach to rank cloud providers based on QoS requirements of customers. It helps the SaaS providers to save cost and complexity in choosing a suitable cloud provider for hosting applications. The experimental results show that proposed approach selects the suitable cloud provider for hosting various types of applications satisfying the needs of different cloud customers. © 2020 Inderscience Enterprises Ltd.
