Fraud Detection and Deterrence in Electronic Voting Machines: A Game-Theoretic Approach

被引:0
|
作者
Vora, Anuj S. [1 ]
Kulkarni, Ankur A. [2 ]
机构
[1] Delft Univ Technol, Delft Ctr Syst & Control, NL-2628 CD Delft, Netherlands
[2] Indian Inst Technol, Syst & Control Engn, Mumbai 400076, Maharashtra, India
关键词
D O I
10.1109/CDC49753.2023.10384221
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study a setting where a detector wishes to detect and deter adversarial manipulation in an electronic voting machine. An adversary tries to win the election by tampering the votes while obfuscating its manipulation. We pose this problem as a game between the detector and the adversary and characterize the equilibrium payoffs for the players and the asymptotic nature of these payoffs. We find that if the detector is too cautious, then in equilibrium the adversary wins with a probability higher than its prior probability of winning. We derive an expression for the deterrence threshold, i.e., the minimum level of false-alarm that the detector should endure so that the adversary is not any better off by the manipulation. With this, asymptotically, the detector can ensure that the probability of missed-detection becomes zero by appropriately adjusting the rate of decay of probability of false-alarm. But if this rate of decay is too 'fast', then the adversary can get an arbitrarily high probability of winning in spite of having a vanishing prior probability of winning. We then extend the results to a setting where the detector has incomplete information about the adversary.
引用
收藏
页码:3832 / 3837
页数:6
相关论文
共 50 条
  • [31] A Game-Theoretic Approach to Anonymous Networking
    Venkitasubramaniam, Parv
    Tong, Lang
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (03) : 892 - 905
  • [32] Contention control: A game-theoretic approach
    Chen, Lijun
    Low, Steven H.
    Doyle, John C.
    PROCEEDINGS OF THE 46TH IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-14, 2007, : 6183 - 6189
  • [33] Strategies in Dialogues: A Game-Theoretic Approach
    Kacprzak, Magdalena
    Dziubinski, Marcin
    Budzynska, Katarzyna
    COMPUTATIONAL MODELS OF ARGUMENT, 2014, 266 : 333 - 344
  • [34] ALOHA networks: a game-theoretic approach
    Sebastián Marbán
    Peter van de Ven
    Peter Borm
    Herbert Hamers
    Mathematical Methods of Operations Research, 2013, 78 : 221 - 242
  • [35] A Game-theoretic Approach to Behavioural Visualisation
    Westergaard, Michael
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 208 (113-129) : 113 - 129
  • [36] The evolution of anisogamy: a game-theoretic approach
    Bulmer, MG
    Parker, GA
    PROCEEDINGS OF THE ROYAL SOCIETY B-BIOLOGICAL SCIENCES, 2002, 269 (1507) : 2381 - 2388
  • [37] A Game-Theoretic Approach to Peer Disagreement
    Remco Heesen
    Pieter van der Kolk
    Erkenntnis, 2016, 81 : 1345 - 1368
  • [38] A Game-Theoretic Approach to Network Slicing
    Yang, Xu
    Liu, Yue
    Chou, Ka Seng
    Cuthbert, Laurie
    2017 27TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2017, : 359 - 362
  • [39] A GAME-THEORETIC APPROACH TO SUBSIDIZING EMPLOYMENT
    SWALES, JK
    REGIONAL STUDIES, 1993, 27 (02) : 109 - 119
  • [40] A game-theoretic approach to constraint satisfaction
    Kolaitis, PG
    Vardi, MY
    SEVENTEENTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AAAI-2001) / TWELFTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE (IAAI-2000), 2000, : 175 - 181