Correlation and Authentication in Repeated Games with Network Monitoring

نویسنده

  • TRISTAN TOMALA
چکیده

We study repeated games with network monitoring where players observe the moves of their neighbors. The Folk theorem holds for such a game if every feasible and individually rational payoff is an equilibrium payoff. Renault and Tomala [RT98] prove that given a network, the Folk theorem holds in Nash equilibria for every payoff function if and only if the graph is 2-connected. This paper shows that if players share correlated authentication keys, the connectivity requirement can be relaxed, i.e. the Folk theorem holds in correlated equilibria for every payoff function if and only if the graph is 2-edge-connected. The problem is also formulated in terms of communication protocol construction and the result is similar to others in the computer science literature: the distribution of private authentication keys helps reliability of communication. VERY PRELIMINARY DRAFT.

منابع مشابه

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

Communication in Repeated Network Games with Private Monitoring∗

I consider repeated games with private monitoring played on a social network. Each player has a set of neighbors with whom he interacts: a player’s payoff depends on his own and his neighbors’ actions only. Monitoring is private and imperfect: each player observes his stage payoff but not his neighbors’ actions. I introduce costless communication among players at each stage: communication can b...

متن کامل

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

متن کامل
عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007