How to Choose Communication Links in an Adversarial Environment?
نویسندگان
چکیده
Given the topology of a network, characterized by an undirected graph, we consider the following game situation: a network manager is choosing (as communication infrastructure) a spanning tree of the graph, and an attacker is trying to disrupt the communication tree by attacking one link of the network. Attacking a link has a certain cost for the attacker who also has the option of not attacking. We model the interaction between the network manager and the attacker as a bimatrix game and study the set of mixed strategy Nash equilibria. We define the notion of critical subset of links and determine the structure of a particular set of Nash equilibria when the attack cost is non-zero. In each NE of this set, the attacker targets edges in critical subsets and all edges in the same critical subset are attacked with the same probability. For the game of zero cost of attack considered in [8], we characterize the set of all Nash equilibria. Some implications of the results are discussed and a detailed proof of the NE theorem is provided.
منابع مشابه
CMUnited: A Team of Robotic Soccer Agents Collaborating in an Adversarial Environment
Robotic soccer involves multiple agents that need to collaborate in an adversarial environment to achieve speciic objectives. In this paper, we describe the robotic agents and architecture that we have developed to enter RoboCup-97. The framework integrates high-level and low-level reasoning as an overall wireless communication system of small-size robots, an overhead vision camera for percepti...
متن کاملDesign of Network Topology in an Adversarial Environment
We study the strategic interaction between a network manager whose goal is to choose (as communication infrastructure) a spanning tree of a network given as an undirected graph, and an attacker who is capable of attacking a link in the network. We model their interaction as a zero-sum game and discuss a particular set of Nash equilibria. More specifically, we show that there always exists a Nas...
متن کاملAn Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine
Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...
متن کاملMultilateral Bargaining in Networks
We introduce a noncooperative multilateral bargaining model for a network-restricted environment, in which players can communicate only with their neighbors. Each player can strategically choose the bargaining partners among the neighbors and buy their communication links with upfront transfers. We characterize a condition on network structures for efficient equilibria: An efficient stationary ...
متن کاملInvestigation to Reliability of Optical Communication Links using Auto-Track Subsystems in Presence of Different Beam Divergences
In this paper, we investigate the effects of auto-tracking subsystem together with different beam divergences on SNR, BER and stability of FSO communication links. For this purpose we compute the values of power, SNR and BER on receiver, based on analytic formula of Gaussian beam on receiver plane. In this computation the atmospheric effects including absorption, scattering and turbulence are c...
متن کامل