Fraud Detection and Deterrence in Electronic Voting Machines: A Game-Theoretic Approach

被引:0
|
作者
Vora, Anuj S. [1 ]
Kulkarni, Ankur A. [2 ]
机构
[1] Delft Univ Technol, Delft Ctr Syst & Control, NL-2628 CD Delft, Netherlands
[2] Indian Inst Technol, Syst & Control Engn, Mumbai 400076, Maharashtra, India
关键词
D O I
10.1109/CDC49753.2023.10384221
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study a setting where a detector wishes to detect and deter adversarial manipulation in an electronic voting machine. An adversary tries to win the election by tampering the votes while obfuscating its manipulation. We pose this problem as a game between the detector and the adversary and characterize the equilibrium payoffs for the players and the asymptotic nature of these payoffs. We find that if the detector is too cautious, then in equilibrium the adversary wins with a probability higher than its prior probability of winning. We derive an expression for the deterrence threshold, i.e., the minimum level of false-alarm that the detector should endure so that the adversary is not any better off by the manipulation. With this, asymptotically, the detector can ensure that the probability of missed-detection becomes zero by appropriately adjusting the rate of decay of probability of false-alarm. But if this rate of decay is too 'fast', then the adversary can get an arbitrarily high probability of winning in spite of having a vanishing prior probability of winning. We then extend the results to a setting where the detector has incomplete information about the adversary.
引用
收藏
页码:3832 / 3837
页数:6
相关论文
共 50 条
  • [21] A Game-Theoretic Approach to Graph Clustering
    Mandala, Supreet
    Kumara, Soundar
    Chatterjee, Kalyan
    INFORMS JOURNAL ON COMPUTING, 2014, 26 (03) : 629 - 643
  • [22] ALOHA networks: a game-theoretic approach
    Marban, Sebastian
    van de Ven, Peter
    Borm, Peter
    Hamers, Herbert
    MATHEMATICAL METHODS OF OPERATIONS RESEARCH, 2013, 78 (02) : 221 - 242
  • [23] Security in Networks: A Game-Theoretic Approach
    Gueye, Assane
    Walrand, Jean C.
    47TH IEEE CONFERENCE ON DECISION AND CONTROL, 2008 (CDC 2008), 2008, : 829 - 834
  • [24] Trading the Cloud: A Game-Theoretic Approach
    Zheng, Xianrong
    AMCIS 2020 PROCEEDINGS, 2020,
  • [25] Petty corruption: A game-theoretic approach
    Lambert-Mogiliansky, Ariane
    Majumdar, Mukul
    Radner, Roy
    INTERNATIONAL JOURNAL OF ECONOMIC THEORY, 2008, 4 (02) : 273 - 297
  • [26] Contested Logistics: A Game-Theoretic Approach
    Cerny, Jakub
    Ling, Chun Kai
    Chakrabarti, Darshan
    Zhang, Jingwen
    Farina, Gabriele
    Kroer, Christian
    Iyengar, Garud
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2024, 2025, 14908 : 124 - 146
  • [28] REASONING BY ARGUING - A GAME-THEORETIC APPROACH
    BAI, SO
    IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1992, 19 : 75 - 82
  • [29] Pollination and reward: A game-theoretic approach
    VegaRedondo, F
    GAMES AND ECONOMIC BEHAVIOR, 1996, 12 (01) : 127 - 142
  • [30] A Game-Theoretic Approach to Covert Communications
    Leong, Alex S.
    Quevedo, Daniel E.
    Dey, Subhrakanti
    2020 IEEE 31ST ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (IEEE PIMRC), 2020,