Abstract

P2P network is one of the most extensive network frameworks for wireless sensor network (WSN) in Internet of Things (IoT). The peers in WSN are rational and often free ride to save power of electricity and calculation, due to the fact that the usability is of great variability and unpredictability. Such a phenomenon tremendously reduces the quality of service (QoS) in WSN. Rational exchange protocol aims at promoting QoS and guaranteeing security and fairness. However, existing schemes have taken only complete information into account, which is not up to realistic environment. The peers in realistic environment indeed possess incomplete information, which is, however, still not thoroughly investigated so far. In this paper, under asymmetric information (a typical incomplete information), an entropy based incentive model is well designed based on Markov model and QoS evaluation model to help peers cooperate in WSNs. A concrete utility function with entropy is constructed to evaluate decision utility in P2P network. Finally, an entropy based rational exchange protocol is proposed based on the presented incentive model and concrete utility function, with analysis of correctness, security, fairness, and robustness, respectively. The proposed protocol can facilitate rational peers positively and sensibly participating in services and prevent free riding for rational peers. Hence, it further promotes QoS and guarantees security and fairness simultaneously in WSNs.

1. Introduction

Wireless sensor network (WSN) contains massive static and dynamic wireless sensors that extremely lack electricity and calculation. Due to that, sensors are highly willing to intentionally free ride [14] for better efficiency selfishly. Especially, in P2P network, which is one of the most extensive network frameworks for WSNs, peers (i.e., wireless sensors) are rational in fact. Rational peers make decisions to maximize their own benefit first and tremendously reduce the quality of service (QoS) of WSNs. To prevent free riding of rational peers and promote QoS, rational protocols have been widely investigated in security community [58].

Rational cryptography is a fresh and important branch in cryptographic research field, where rational exchange protocol is compatible and applicable for WSNs. Rational exchange protocol, which promotes peers to positively provide various services (data transmitting, data sharing, data distributing, etc.), aims at promoting QoS in WSNs. Simultaneously, rational exchange protocol guarantees both security and fairness for peers in WSNs, which are practical and necessary requirement in realistic environments.

Existing rational exchange protocols have been widely investigated since they were proposed by Syverson [9] in 1998. After that, extensive research work has been done under complete information [1014], which means that each peer in WSN is fully aware of characteristics of participants, strategic space, and utility function about others. In realistic environments, however, the information is not always available (type, reputation, QoS, etc.), in which information is incomplete. A typical phenomenon is under asymmetric information [15], where, between two communicating peers, one possesses private information while the other is not aware of that. Unfortunately, rational exchange protocol under asymmetric information is not well considered so far and should be investigated thoroughly.

We focus on, in this paper, proposing a rational exchange protocol with security and fairness under asymmetric information. Also, it is applied in wireless sensor networks aiming at promoting QoS of peers. The dominating contributions are as follows.(1)To quantify utilities of participants, a dynamic game model with entropy is presented. In such a model, the utility for participants can be quantitatively analyzed. Furthermore, a selective basis of strategies in a game is explicitly provided (Section 2.1).(2)Under asymmetric information, a Markov-based entropy function and a QoS evaluation model are designed. A utility function with entropy is further concreted to measure fairness of rational exchange protocol (Section 3).(3)A concrete rational exchange protocol under asymmetric information is presented with through analysis of correctness, security, fairness, and robustness. Additionally, the proposed utility function with entropy is simulated and appropriateness is declared (Section 4).

The rest of this paper is organized as follows. Section 2 introduces the problem definition and preliminaries. Under asymmetric information, Section 3 presents a utility function with entropy based on Markov-based entropy function and QoS evaluation model. The concrete rational exchange protocol is proposed in Section 4 with thorough analysis. The simulation of utility function with entropy is presented in Section 5. Finally, the related work is summarized in Section 6 and this paper is concluded in Section 7.

2. Problem Definition and Preliminaries

In this section, we formally define a dynamic game model in which a utility function with entropy can be derived. Following that, a rational exchange protocol is formalized.

For facile understanding, the primary notations are listed in Table 1.

2.1. Definition of Dynamic Game with Entropy

In this section, a dynamic game model with entropy is introduced to pave the way to quantify utilities of participants.

Definition 1 (dynamic game model with entropy). A dynamic game model with entropy contains a seven-tuple , where the elements are formally defined as follows. (i) is a set of participants, in which is a participant.(ii) is a set of sequences of actions containing all participants’ actions. A sequence consists of participant’s specific actions in a dynamic game. satisfies the following characteristics.(1)The empty sequence is .(2)If a sequence of actions satisfies that and , then holds.(3)If any and holds, then the infinite sequence of actions holds.(iii) is participant ’s information set denoting the previous information of other participants in a game. An information set is formally denoted as , where is the previous action sequences of the other participants and the corresponding probability distribution is such that .(iv) is a set of optional actions, in which and is the optional actions of participant .(v) is a participant function, to determine the next participant of nonterminal sequence of actions.(vi) is a preference relation for participant under a set of mixed strategies. Generally, the utility function of participant is the preference. The preference relation means that and is the willing action sequence for participant .(vii) is a mixed strategy entropy function for participant . It is a probability distribution function of strategies on . Given the round number of a game, the entropy function of participant in th round is , in which is the total entropy of participant during a whole game.

So far, we define a novel dynamic game model to analyze the rational exchange protocol that will be proposed in the following.

2.2. Definition of Rational Exchange Protocol

In this paper, rational exchange protocol is thoroughly investigated under two participants. Such a protocol can be facilely generalized into multiple participants in theory.

Definition 2 (rational exchange protocol with entropy). A rational exchange protocol with entropy contains a five-tuple , in which is a conditional entropy, and are the participants, is a bulletin board, and is the concrete exchange protocol. Additionally, is formally defined as follows. (i)Setup: generate the secret and public keys for and and other public parameters.(ii)Rational exchange: participants and own information and , respectively. and rationally exchange their information, which means that and correctly get and , respectively, or get nothing.

A rational exchange protocol must satisfy the following four pivotal requirements.

Correctness. Such a requirement provides a guarantee that, when is finished, and can successfully exchange and . Additionally, both and receive the positive feedbacks and credits that are defined later, in time.

Security. Both and must be prevented from adversary’s cracking. That means there is no illegal participant that can derive anything from encrypted information during the exchange. Additionally, such a protocol can not reveal anything valuable during interactive processes.

Fairness. Since all participants are rational and aim at maximizing their own benefit, a rational exchange protocol is fair when the expected utilities for all the participants are maximized.

Robustness. The protocol is steady. That means even when the protocol is destabilized or interrupted, the fairness is still satisfied.

3. Utility Function with Entropy under Asymmetric Information

Before designing and representing a formal rational exchange protocol, a utility function capability for the dynamic game model with entropy is proposed in this section. Specifically, a Markov-based entropy function and a QoS evaluation model under asymmetric information are sequentially designed. Based on both of them, a utility function with entropy is concreted under asymmetric information.

3.1. Markov-Based Entropy Function

Under asymmetric information, participant does not completely know, before exchanging information, about other participants’ a priori information (i.e., participant’s type). Additionally, participant’s status relies only on the last past status. Hence, we introduce Markov chain to evaluate participant’s information entropy.

Participants in our model are categorized into four types according to the contribution of participant in the system.(i)Positive: such a participant provides service with a higher probability (e.g., ). Here, positive participant’s QoS is preferable. He can transfer to be ordinary.(ii)Ordinary: such a participant provides service with a moderate probability (e.g., ). He can transfer to be positive or negative.(iii)Negative: such a participant provides service with a lower probability (e.g., ). He can transfer to be ordinary or outside.(iv)Outside: such a participant does not provide any service (e.g., ) and does always free ride. He can transfer to be only negative.

In the transfer, each participant stays in a specific type with a specific probability and each transfer occurs with a specific probability too. The transfer between participants with different types is illustrated in Figure 1.

The constraint rules for participant’s action are as follows.(1)Allow participant to be outside when he first participates in a game.(2)Every other period with time , the mechanism figures out the distribution of all participants’ types.

By following the above constraints, every period, the probability for participant serving participant is estimated based on Markov chain. Based on the distribution in Step, the transfer matrix of participants’ types can be resolved. Specifically, at th period, the transfer matrix is , and the steady-state vector is derived by resolving a system of linear equations . Here, . The probability of service is , where is the vector containing all membership functions corresponding to all participants’ types (i.e., by embedding membership functions, the values of probabilities that participant provides service can be estimated in advance; thus, participant will be further convinced of his decision). In our construction, () stands for the tendency of maintaining a specific type (positive, ordinary, negative, and outside) for a participant. Finally, the probability matrix of service for all participants is , where .

According to the analysis of Shannon entropy and perceptive information, when a system achieves steady, ’s total quantity of services coming from other participants is , where . From the aspect of expectation, is larger; also ’s willingness to participate in exchanging information is stronger. The expectation for the whole system is , which is changing with periods.

The ultimate entropy of -orderly discrete information source with memory is the -orderly conditional entropy for a steady system. That means , in which . The ultimate entropy weighs the average quantity of information of all symbols that the information source sends. That means all the participants in an exchange protocol achieve steady.

3.2. QoS Evaluation Model under Asymmetric Information

Asymmetric information is a typically incomplete information. It means that, in an exchange protocol, a participant’s information is complete, and the other’s is incomplete. The former is advantageous participant, and the latter is disadvantageous participant. A rational participant makes decision through observing information that other participants reveal and deducing other participants’ actions, in order to make his own expected utility maximum.

In this section, a deducing method is presented to turn asymmetric information into weakened-symmetric information. Based on that, a QoS evaluation model under asymmetric information is proposed for guaranteeing disadvantage and advantageous participants’ fairness simultaneously.

For a disadvantageous participant (i.e., receiver) and an advantageous participant (i.e., sender) in a rational exchange protocol, the receiver derives a random variable about the exchanging information according to his own prior knowledge. The realistic information is estimated by . In such a case, is the uncertainty of on the condition that is known. Here, let be the prior uncertainty and be the posterior uncertainty. The mutual information entropy is , which stands for the average quantity of information that is derived from about . If , then and asymmetry of two participants is removed. The random variable can be corrected according to Bayes rules with exchanging information. The transform process is shown in Figure 2.

Let be the quantity of exchanging information that the receiver does not know. To overcome the asymmetry of information, in fact, the receiver corrects service quantity by Bayes probability principle with other participants’ valuation about the exchanging information and derives the posterior probability distribution .

Definition 3 (QoS evaluation mechanism). In a QoS evaluation mechanism, a list is maintained along with a whole rational exchange protocol. For participant , the element in the list contains a three-tuple . Here, is the unique identifier, is the number of positive feedbacks, is the set of records for th round, in which is the set of th round actions, is the comment about quality of information in th round, and is the vector of credits for th round information exchange.
Specifically, the list above is maintained at a bulletin board. After th round exchange between sender and receiver , the following steps are carried out. (1) comments on such an exchange and uploads to the bulletin board. The bulletin board records actions in this exchange as .(2) rates the quality of the exchanged information as and uploads it to the bulletin board.(3) can make a positive feedback by setting if is greater than a threshold and a negative feedback by setting if is smaller than a threshold.(4)If there are multiple receivers () in the system, rates the quality of the exchanged information as and makes a positive feedback for the other participants who make a consistent credit .

By embedding such a QoS evaluation mechanism, all participants are further more willing to really evaluate the quality of exchanged information, in order to maximize credit and number of positive feedbacks. It is vital to measure participant’s long-term utility.

3.3. Utility Function with Entropy

By comprehensive consideration of long-term utility and short-term utilities, the utility function with entropy is proposed for participant .

Here, is the unitary cost for participating in an exchange and obtaining a unitary contribution value. is the contribution value in which the contribution weight falls in .

In the equation, reflects short-term benefit and reflects long-term benefit for participant. In fact, in realistic scenarios, short-term benefit is more crucial than long-term benefit. In order to respond to such a correlation, it is necessary to take the logarithm of in the equation. By logarithm, the protocol is able to prevent participants with long-term benefit doing one-time deceive and provides rational fair from a new point of view. Through the combination of both, the utility function is more practical than others proposed in existing schemes.

Additionally, the product of information entropy , which is the quantization of QoS, and constitutes the unitary revenue. Furthermore, multiplied by is ’s revenue. According to the definition, is the cost in total. Hence, the eventual utility for participant is formalized and quantized by (1).

4. The Rational Exchange Protocol

In this section, the proposed concrete rational exchange protocol under asymmetric information is presented at the beginning. Following that, the detailed analysis is thoroughly stated. Additionally, theoretical comparisons between rational exchange protocols are represented to declare the presented rational exchange protocol’s superiority.

4.1. Construction

Assume that there is no trusted third party in the proposed rational exchange protocol with multiple participants. That means each participant makes decision by maximizing his utility. Such a participant is rational and enjoys equal status, without considering compromising between participants.

In the concrete protocol, any two participants directly exchange information with each other. Assume that a sender and a receiver exchange and in the rational exchange protocol. Under asymmetric information, is the advantageous participant and is the disadvantage one. Additionally, is channel-sensitive and takes a long time to be transmitted, but the time to transmit is short and negligible. There is also a bulletin board in the protocol to only manage all participants’ account information and nothing else.

Setup. A weakly secret bit commitment function is adopted, in which can only be derived over time since it is encrypted. An asymmetric encryption algorithm and a symmetric encryption algorithm are adopted. The corresponding decryption algorithms are and . According to the adopted asymmetric encryption algorithm , is generated for participant as the public-private key pair, and is generated for participant too. Additionally, the bulletin board is initialized by maintaining QoS evaluation mechanism with an empty list.

Rational Exchange. and rationally exchange information and by executing the following steps. The interactive processes for two participants are illustrated in Figure 3.(1)The disadvantageous participant calculates the conditional entropy according to the advantageous participant ’s number of positive feedbacks . He makes decision by checking . If he wishes to exchange information, then he continues to do the following steps. Otherwise, the protocol halts.(2) randomly chooses a session key for and sends to , in which .(3)After receiving , decrypt and derive and by checking . If does not hold, then halts. Otherwise, randomly chooses a session key for and sends to , in which . Such a process provides an evidence for possible disputation in future.(4) downloads from the bulletin board . derives , , and by decrypting . If does not hold, then halts. Otherwise, sends to and simultaneously, in which .(5)After receiving , if does not holds, sends and to . Then, checks the validation of received information from . If the information is valid, marks invalid and rates a negative feedback for according to the QoS evaluation mechanism proposed in Section 3.2. Additionally, the feedback information about from other participants is also rated in a similar way.

According to the principle of long-term utility maximization for rational participants, rational participants will not deceive others in a game. We analyze possible deceiving behaviors in the following.

Step (2 ). The possible deceiving is that sends a fake . In such a case, in Step (5), can verify the truth of and figure out the deceiving. Indeed, can not deny such a deceiving. Meanwhile, is still secretive and still does not get . At the moment, reports the deceiving of to and posts a negative feedback for . invalidates information and keeps a record. Other participants will deny the validation of . In this way, does not get and indeed gets a serious negative feedback. In a long-term game, will not send a fake ever.

Step (3 ). The possible deceiving, in this process, is that sends a fake . Due to the characteristics of , over time , can not derive using . Other participants will also observe that is deceiving and will not exchange anything else with . In a long-term game, ’s utility decreases dramatically, and hence he will not send a fake ever.

Step (4 ). deceives by not sending even over time or sending a fake . can post a negative feedback for and gain the supports from other participants. In such a case, ’s utility is , in which . Obviously, the loss of utility for is great. Hence, will not deceive in this process.

4.2. Theoretical Analysis

The correctness, security, fairness, and robustness of the proposed rational exchange protocol are analyzed, respectively, in this section.

Correctness. According to the concrete rational exchange protocol, the sender finally receives and the corresponding rating . In one hand, the possible deceiving is that send a fake session key to in Step. In such a case, after a period , all participants will observe the deceiving since will be decrypted due to the inherent property of weakly secret bit commitment function. For long-term utility, will also never do deceiving. On the other hand, due to the high relation between and , participant will rate to acquire more positive feedbacks.

In the whole protocol, all participants are constrained by ratings and utility. In an exchange, specifically, is highly correlated to participant ’s reputation and is prerequisite for participant to exchange information. For long-term utility, all participants are of high willingness to positively and honestly participate in an exchange. Hence, both and can prompt all participants to positively participate the protocol.

Hence, the protocol is correct.

Security. On one hand, security of the presented rational exchange protocol relies on the security of adopted asymmetric and symmetric encryption algorithms, which are assumed to be secure. Specifically, in Step, is in the encrypted form, whose security relies on the security of adopted encryption algorithms. It means that will not be revealed until the adopted encryption algorithms are breaking. In fact, there is no adversary that can break such algorithms. Hence, information in Step is secure. Similarly, information in Step and is secure too.

Also, on the other hand, security relies on the interactive process during the whole protocol. In the following, the presented rational exchange protocol is proved to be secure under BAN logic [16]. For facile analysis, the presented rational exchange is formalized as follows. Note that Step and are not interactive and hence can be ignored in the analysis of security. However, it does not put any negative effect on security of the presented rational exchange protocol.

: .

: .

: .

The following assumptions are obvious and reasonable in the rational exchange protocol.

Theorem 4 (security). Under specific assumptions listed above, the presented rational exchange protocol is secure under BAN logic. Specifically, there are four potential objectives: ① ; ② ; ③ ; and ④.
If the protocol is secure under BAN logic, when the protocol is completely finished, all objectives are concluded. Additionally, after , objective ② is concluded. Furthermore, after , objectives ① and ③ are additively concluded.

Proof of Theorem 4. For ,For ,For ,

Fairness. When the protocol is finished, participant’s utility consists of two parts. The first part comes from the exchanged information. Let and be positive and negative utility, respectively. There is an assumption, in the protocol, that both and are equal-value. It means that both and hold. Hence, after exchanging information, ’s total utility is and ’s total utility is .

The remainder part is the utility derived from the contribution value. Here, participant ’s utility is . In this protocol, is ’s credit on ’s QoS. In a single interaction between and , for participant , the larger is, the larger is. Hence, will positively promote QoS. Certainly, the larger is, the larger is. Here, is the reference level for other participants that interacts with in future. Obviously, payments are proportional to utility for all participants. Hence, the presented rational exchange protocol is rationally fair. The quantitative analysis of fairness is elaborated in Section 5.

In a word, in the proposed rational exchange protocol, participants positively participate in executing the protocol. In such a way, all participants can obtain maximum expected utility. Hence, the protocol satisfies fairness.

Robustness. In the presented rational exchange protocol in Section 4.1, only Steps, , and may suffer destabilization or interruption.(i)In Step, participant can abort the protocol by sending nothing. In such a case, receives nothing and will not be executing the following steps. So, the utility for and is . The fairness is satisfied.(ii)In Step, after receiving sent by , can interrupt the protocol by not sending . Now, can not derive since the unawareness of . Hence, still knows nothing about and the protocol is still fair.(iii)In Step, can interrupt the protocol by not sending after receiving sent by . In such a case, can make an argument on this exchange, and will mark invalid and rate a negative feedback for according to the QoS evaluation mechanism proposed in Section 3.2. The negative feedback lowers and is a severe punishment for . Simultaneously, will also rate a low . Hence, ’s utility is inevitable lower than that before the exchange. Obviously, for long-term utility, will never destabilize the protocol to maximize his own utility. Hence, the protocol is still fair.

In Steps and , there is, obviously, no potential destabilization or interruption. Hence, in a word, the presented protocol is fair when destabilization or interruption occurs.

4.3. Theoretical Comparisons

Rational exchange protocol is a fresh and crucial branch in cryptographic research field. The greatest difference between our protocol and other related works is that related works have been investigated under complete (symmetric) information, while our protocol is very under asymmetric information. Theoretical comparisons are legibly declared in Table 2.

In rational exchange protocol, complete information is an ideal assumption which violates the requirements in realistic environment. Rational exchange protocol under imperfect information is first investigated in Alcaide’s protocol [11]. The complete but imperfect information in [11] is, however, not suitable for the scenarios in Section 1. In this paper, rational exchange protocol under asymmetric information is carefully designed with clear definition and much more compatible for practice.

It is striking that the utility in existing rational exchange protocol can not be quantized so far, since the absence of entropy. Information theory is introduced in this paper to quantize all participants’ utilities. Such a way is the first attempt to clearly evaluate participant’s utility. Participant can further make accurate decisions by observing participants’ utilities. Obviously, such a characteristic is more compatible and operable for real applications.

Rational fairness is an important characteristic for rational exchange protocol and has been attracting vastly attention in cryptographic community. Through analysis under a dynamic model with entropy in Section 4.2, rational fairness is guaranteed.

5. Simulation of Utility Function with Entropy

The utility function with entropy is kernel to guarantee the fairness of rational exchange protocol. In this section, through simulation, the proposed utility function with entropy is investigated in detail.

5.1. Simulation Environment

In the following simulation, the number of participants is assumed to be 10. When the system achieves stabilization after several rounds of information exchange, the current transfer matrix of participants’ types for each participant is assumed same and given as follows.

By resolving a system of linear equations , the steady-state vector is . The vector containing all membership functions is given as , in which great (i.e., closer to 1) indicates high-level accuracy of . Then, the probability of participant serving is . To evaluate participant’s credits on the process of information exchange, all the vectors of credits for participant are generated randomly such that and . In a similar way, the vector of positive feedbacks is calculated through the above probabilities for all participants in the protocol.

The contribution value for participant is , in which . Here, let , and and are derived. Given a unitary cost, the utility for each participant can be derived. All the values calculated in the above equations are listed below.

The matrix of credits is generated in the following.

Assume that participant will respond to a positive feedback when the credit is greater than . Obliviously, the vector of positive feedbacks is simulated in the following.

The utility for all participants is calculated in the following.

By observing the utilities for all participants, participant ’s utility is maximal and participant ’s utility is minimal. It is consistent with the generated credits that ’s credits are significantly greater than other participant’s and ’s credits are significantly smaller than other participant’s. Hence, the presented utility function with entropy appropriately reflects the realistic utilities for all participants.

5.2. Effect of Parameters

The utility function with entropy is thoroughly investigated by observing and ’s utilities by varying and , respectively.

Effect of . We vary to exhibit the effectiveness on the presented utility function. The simulation is illustrated in Figures 4 and 5. Specifically, in Figure 4, Figure 4(b) illustrates the particulars of utility ’s beginning tendency for participant . In a similar way, Figure 5(b) illustrates the details of ’s utility that is depicted in dotted rectangle in Figure 5(a). It is striking that participant’s utility decreases at the beginning, increases in the middle stage, and decreases again at the end. In general, participant ’s utility is acquired in exchange with other participants. The trends of utility function confirm real-world scenarios and are elaborately described in the following content.

At the very beginning, participant is considered to be outside indeed. Participant ’s utility coming from is assumed to be 0. During the first increasing of participant ’s service probability, is extremely small and less than a threshold. Although the probability increases, the incrementation does not put any positive effect on . still, however, pays out due to the participation in the exchange. The utility coming from such an incrementation does not counteract the payment. Hence, decreases in such a stage.

In the next stage, with the incrementation of ’s service probability, the utility coming from such an incrementation goes beyond the payment. Hence, increases along with the increasing of probability. Such a situation is compatible for practice and provides a guarantee of fairness for all participants.

In the ending stage, if ’s service probability is close to 1, other participants will free ride potentially. Due to that, participant ’s credits and positive feedbacks will decrease. Following that, the utility inevitably decreases in future. That is still fair for all participants.

Effect of . We vary to exhibit the effectiveness on utility function. The simulation is illustrated in Figures 6 and 7. It is striking that the utility’s tendency is consistent with that while varying . Additionally, with greater , the utility’s discrimination is more prominent. In practice, is determined according to consumer’s realistic requirements.

5.3. Performance for Participants

In this section, performance for all participants is elaborated in detail by varying contribution weight and unitary cost , respectively.

Varying. In the evaluation of performance, contribution weight is varied in in Figure 8(a). Obviously, with the increment of , the discrimination between utilities for all participants is increasing significantly. The significant discrimination is important for practice, due to the fact that participant can facilely make decision without any doubt.

Wallrabenstein 2014 Varying . In the evaluation of performance, contribution weight is varied in in Figure 8(b). Obviously, with the increment of , the discrimination between utilities for all participants remains the same, due to the fact that a theoretical assumption that the probability of participant serving is is the same for all participants. Although the probabilities are completely different in practice, the discrimination remains the same since that the change of only lowers the coefficient of and does not change the monotonicity of utility in (1).

Cryptography and game theory both concentrate on designing protocol, in which participants are with potential conflicts of benefits [17, 18]. By combining both theories, rational secret sharing and rational secure multiparty computation are proposed by Halpern et al. [5] in 2004. In traditional cryptography, participants are assumed to be honest (strictly follow the protocol) or malicious (violate or destroy the protocol), and participants are however rational instead in practice for WSNs. That means all participants are highly willing to maximize their utilities by selecting their strategies during the whole protocol. That brings enormous challenge in designing protocols. Since the proposal of rational cryptography, there exist a number of studies [19, 20], such as rational secret sharing [21] and rational secure multiparty computation [5]. Indeed, rational exchange protocol, which guarantees security and fairness for peers in WSNs, is practical and necessary for realistic environments.

In 1998, Asokan [22] proposed an interactive protocol to exchange digital signature in a fair manner. It is the prototype of rational exchange protocol. The first real rational exchange protocol is proposed based on a weakly secret bit commitment function by Syverson [9] in the same year. In 2001, Buttyán et al. [10] analyzed the fairness of Syverson’s protocol based on game theory, and, in 2004, they modeled rational exchange protocol and further analyzed the fairness of Syverson’s protocol [13]. After that, Alcaide et al. modeled rational exchange protocol based on extended game theory and Bayesian game in [11], improved Syverson’s protocol in [23], and designed rational exchange protocol based on nature-inspired synthesis [12, 14]. However, all the above rational exchange protocols are constructed in environments with complete information, which is not perfectly compatible for scenarios mentioned in Section 1.

Rational participants possess asymmetric information about each other in real-world scenarios. Rational exchange protocol in such scenarios is not well investigated so far. By further combining information theory, rational exchange protocol is more practical and compatible for WSN. So far, information theory has been introduced into several cryptographic protocols [24, 25]. However, rational exchange protocol under asymmetric information is not thoroughly studied, which is striking in this paper.

7. Conclusion

In this paper, we presented a rational exchange protocol under asymmetric information, which is compatible and practical for WSNs. First of all, a dynamic game model with entropy is presented to quantify utilities of participants. In such a game, utilities for all participants can be quantized. Following that, a utility function with entropy is designed based on integrating a Markov-based entropy function and a novel QoS evaluation model. Furthermore, the concrete rational exchange protocol is presented with thorough analysis. Finally, the utility function with entropy is simulated. The simulation demonstrates effectiveness and availability of the presented rational exchange protocol.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Grant nos. 61702403, 61472298, 61662009, and 61472310), the Fundamental Research Funds for the Central Universities (Grant no. JB170308), the Project funded by China Postdoctoral Science Foundation (Grant no. 2018M633473), and the National Cryptography Development Foundation of China (Grant no. MMJJ20170129).