Interdependent Security Game Design over Constrained Linear Influence Networks
Authors
Abstract:
In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through security investments considering the network structure, costs and constraints, which have been set by the network owner. However, decisions of selfish entities to maximize their utilities do not always lead to a socially optimum solution. Therefore, motivating players to reach the social optimum is of high value from the network owner’s point of view. The network owner wants to maximize the overall network security by designing the game's parameters. As far as we know, there is no notable work in the context of linear influence networks to introduce appropriate game design for this purpose. This paper presents design methods that make use of the adjustments of players’ costs, interdependencies, and constraints to align players' incentives with a network-wide global objective. We present a comprehensive investigation of existence and uniqueness conditions of Nash Equilibrium in such environments. Furthermore, numerical results of applying the proposed mechanisms in a sample real-world example are illustrated.
similar resources
Game Over Interdependent Networks: Rationality Makes the System Inherent Deficient
Many real-world systems are composed of interdependent networks that rely on one another. Such networks are typically designed and operated by different entities, who aim at maximizing their own interest. In this paper, we study the game over interdependent networks, investigating how the rational behaviors of entities impact the whole system. We first introduce a mathematical model to quantify...
full textInterdependent Security in Interconnected Networks
In an interdependent world, the risks faced by any individual, firm, region, or country depend not only on its own choices but also on those of others. In the context of terrorism, the risks faced by any airline, for example, are tied to the security standards of other carriers and airports. To illustrate this point, consider the destruction of Pan Am flight 103 in 1988. In Malta, terrorists ch...
full textBecoming Cybercriminals: Incentives in Networks with Interdependent Security - Incentives in Networks with Interdependent Security
We study users’ incentives to become cybercriminals when network security is interdependent. We present a game-theoretic model in which each player (i.e., network user) decides his type, honest or malicious. Honest users represent law-abiding network users, while malicious users represent cybercriminals. After deciding on their types, the users make their security choices. We will follow [29], ...
full textRedundant Design in Interdependent Networks
Modern infrastructure networks are often coupled together and thus could be modeled as interdependent networks. Overload and interdependent effect make interdependent networks more fragile when suffering from attacks. Existing research has primarily concentrated on the cascading failure process of interdependent networks without load, or the robustness of isolated network with load. Only limite...
full textQuality-driven Cross Layer Design for Multimedia Security over Resource Constrained Wireless Sensor Networks
The strong need for security guarantee, e.g., integrity and authenticity, as well as privacy and confidentiality in wireless multimedia services has driven the development of an emerging research area in low cost Wireless Multimedia Sensor Networks (WMSNs). Unfortunately, those conventional encryption and authentication techniques cannot be applied directly to WMSNs due to inborn challenges suc...
full textA Game-Theoretic Framework for Securing Interdependent Assets in Networks
The prevalence of networked engineered systems in the twenty-first century has made it increasingly challenging to ensure their security and resiliency. While the growing interdependency between cyber and physical entities has led to improved system performance, it has also led to new avenues for attackers to target a large number of entities by exploiting those interdependencies. The magnitude...
full textMy Resources
Journal title
volume 11 issue 2
pages 95- 111
publication date 2019-07-01
By following a journal you will be notified via email when a new issue of this journal is published.
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023