Multiagent Communication Security in Non-Zero Sum Adversarial Settings

نویسندگان

  • Steven Okamoto
  • Noam Hazon
  • Yonghong Wang
  • Katia Sycara
  • Janusz Marecki
  • Mudhakar Srivatsa
چکیده

In future battlefields and other emerging multiagent applications, agents must communicate in an inherently hostile environment in which an adversary has strong incentives to disrupt or intercept communication. Intelligent agents must balance network performance with possible harm suffered from the adversary’s attacks, given that the adversary is actively and rationally balancing his own costs for attacking the network with the possible harm inflicted. The SAFER algorithm was proposed to meet these challenges in the absence of attack costs for the adversary, by representing the problem as a zero-sum game between a sender agent choosing communication paths through a network and an adversary choosing nodes to attack. However, this zero-sum assumption is often violated in real applications. In this paper we extend the previous approach to a non-zero sum game where attacking a node causes the adversary to incur a cost which factors into the adversary’s payoff but not into the sender’s payoff. We characterize properties of the equilibrium in this new game and provide a polynomial time algorithm for finding a Nash equilibrium. We also consider a sequential form of the game where the sender plays first and the adversary observes the sender’s action before launching his attack. We show that in this case the sender can actually improve his payoff, and provide a polynomial time algorithm for finding an equilibrium strategy for the sequential game when the adversary can attack a single node.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Non-Stationary Policy Learning in 2-Player Zero Sum Games

A key challenge in multiagent environments is the construction of agents that are able to learn while acting in the presence of other agents that are simultaneously learning and adapting. These domains require on-line learning methods without the benefit of repeated training examples, as well as the ability to adapt to the evolving behavior of other agents in the environment. The difficulty is ...

متن کامل

Coordinating Randomized Policies for Increasing Security in Multiagent Systems

Despite significant recent advances in decision theoretic frameworks for reasoning about multiagent teams, little attention has been paid to applying such frameworks in adversarial domains, where the agent team may face security threats from other agents. This paper focuses on domains where such threats are caused by unseen adversaries whose actions or payoffs are unknown. In such domains, acti...

متن کامل

The sum-annihilating essential ideal graph of a commutative ring

Let $R$ be a commutative ring with identity. An ideal $I$ of a ring $R$is called an annihilating ideal if there exists $rin Rsetminus {0}$ such that $Ir=(0)$ and an ideal $I$ of$R$ is called an essential ideal if $I$ has non-zero intersectionwith every other non-zero ideal of $R$. Thesum-annihilating essential ideal graph of $R$, denoted by $mathcal{AE}_R$, isa graph whose vertex set is the set...

متن کامل

Increasing Security through Communication and Policy Randomization in Multiagent Systems

Despite significant recent advances in decision theoretic frameworks for reasoning about multiagent teams, little attention has been paid to applying such frameworks in adversarial domains, where the agent team may face security threats from other agents. This paper focuses on domains where such threats are caused by unseen adversaries whose actions or payoffs are unknown. In such domains, acti...

متن کامل

Privacy-Preserving Data Mining in Presence of Covert Adversaries

Disclosure of the original data sets is not acceptable due to privacy concerns in many distributed data mining settings. To address such concerns, privacy-preserving data mining has been an active research area in recent years. All the recent works on privacy-preserving data mining have considered either semi-honest or malicious adversarial models, whereby an adversary is assumed to follow or a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011