Applications of Economic and Pricing Models for Wireless Network Security: A Survey

Date

7/27/2017

Journal Title

Journal ISSN

Volume Title

Publisher

IEEE Communications Surveys & Tutorials

Abstract

This paper provides a comprehensive literature review on applications of economic and pricing theory to security issues in wireless networks. Unlike wireline networks, the broadcast nature and the highly dynamic change of network environments pose a number of nontrivial challenges to security design in wireless networks. While the security issues have not been completely solved by traditional or system-based solutions, economic and pricing models recently were employed as one efficient solution to discourage attackers and prevent attacks to be performed. In this paper, we review economic and pricing approaches proposed to address major security issues in wireless networks including eavesdropping attack, denial-of-service (DoS) attack such as jamming and distributed DoS, and illegitimate behaviors of malicious users. Additionally, we discuss integrating economic and pricing models with cryptography methods to reduce information privacy leakage as well as to guarantee the confidentiality and integrity of information in wireless networks. Finally, we highlight important challenges, open issues and future research directions of applying economic and pricing models to wireless security issues.

Description

Keywords

Security, wireless networks, pricing models, economic theories

Citation

Copyright 2017 IEEE Communications Surveys & Tutorials. This is a pre-print version of a published paper that is available at: https://ieeexplore.ieee.org/abstract/document/7994586. Recommended citation: Luong, Nguyen Cong, Dinh Thai Hoang, Ping Wang, Dusit Niyato, and Zhu Han. "Applications of economic and pricing models for wireless network security: A survey." IEEE Communications Surveys & Tutorials 19, no. 4 (2017): 2735-2767. DOI: 10.1109/COMST.2017.2732462. This item has been deposited in accordance with publisher copyright and licensing terms and with the author's permission.