Interdependent Security Game Design over Constrained Linear Influence Networks

نویسندگان

  • Tansu Alpcan Department of Electrical and Electronic Engineering, The University of Melbourne, Melbourne, Australia.
چکیده مقاله:

In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through security investments considering the network structure, costs and constraints, which have been set by the network owner. However, decisions of selfish entities to maximize their utilities do not always lead to a socially optimum solution. Therefore, motivating players to reach the social optimum is of high value from the network owner’s point of view. The network owner wants to maximize the overall network security by designing the game's parameters. As far as we know, there is no notable work in the context of linear influence networks to introduce appropriate game design for this purpose. This paper presents design methods that make use of the adjustments of players’ costs, interdependencies, and constraints to align players' incentives with a network-wide global objective. We present a comprehensive investigation of existence and uniqueness conditions of Nash Equilibrium in such environments. Furthermore, numerical results of applying the proposed mechanisms in a sample real-world example are illustrated.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Game Over Interdependent Networks: Rationality Makes the System Inherent Deficient

Many real-world systems are composed of interdependent networks that rely on one another. Such networks are typically designed and operated by different entities, who aim at maximizing their own interest. In this paper, we study the game over interdependent networks, investigating how the rational behaviors of entities impact the whole system. We first introduce a mathematical model to quantify...

متن کامل

Interdependent Security in Interconnected Networks

In an interdependent world, the risks faced by any individual, firm, region, or country depend not only on its own choices but also on those of others. In the context of terrorism, the risks faced by any airline, for example, are tied to the security standards of other carriers and airports. To illustrate this point, consider the destruction of Pan Am flight 103 in 1988. In Malta, terrorists ch...

متن کامل

Becoming Cybercriminals: Incentives in Networks with Interdependent Security - Incentives in Networks with Interdependent Security

We study users’ incentives to become cybercriminals when network security is interdependent. We present a game-theoretic model in which each player (i.e., network user) decides his type, honest or malicious. Honest users represent law-abiding network users, while malicious users represent cybercriminals. After deciding on their types, the users make their security choices. We will follow [29], ...

متن کامل

Redundant Design in Interdependent Networks

Modern infrastructure networks are often coupled together and thus could be modeled as interdependent networks. Overload and interdependent effect make interdependent networks more fragile when suffering from attacks. Existing research has primarily concentrated on the cascading failure process of interdependent networks without load, or the robustness of isolated network with load. Only limite...

متن کامل

Quality-driven Cross Layer Design for Multimedia Security over Resource Constrained Wireless Sensor Networks

The strong need for security guarantee, e.g., integrity and authenticity, as well as privacy and confidentiality in wireless multimedia services has driven the development of an emerging research area in low cost Wireless Multimedia Sensor Networks (WMSNs). Unfortunately, those conventional encryption and authentication techniques cannot be applied directly to WMSNs due to inborn challenges suc...

متن کامل

A Game-Theoretic Framework for Securing Interdependent Assets in Networks

The prevalence of networked engineered systems in the twenty-first century has made it increasingly challenging to ensure their security and resiliency. While the growing interdependency between cyber and physical entities has led to improved system performance, it has also led to new avenues for attackers to target a large number of entities by exploiting those interdependencies. The magnitude...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ذخیره در منابع من قبلا به منابع من ذحیره شده

{@ msg_add @}


عنوان ژورنال

دوره 11  شماره 2

صفحات  95- 111

تاریخ انتشار 2019-07-01

با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023