Fraud Detection and Deterrence in Electronic Voting Machines: A Game-Theoretic Approach

被引:0
|
作者
Vora, Anuj S. [1 ]
Kulkarni, Ankur A. [2 ]
机构
[1] Delft Univ Technol, Delft Ctr Syst & Control, NL-2628 CD Delft, Netherlands
[2] Indian Inst Technol, Syst & Control Engn, Mumbai 400076, Maharashtra, India
关键词
D O I
10.1109/CDC49753.2023.10384221
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study a setting where a detector wishes to detect and deter adversarial manipulation in an electronic voting machine. An adversary tries to win the election by tampering the votes while obfuscating its manipulation. We pose this problem as a game between the detector and the adversary and characterize the equilibrium payoffs for the players and the asymptotic nature of these payoffs. We find that if the detector is too cautious, then in equilibrium the adversary wins with a probability higher than its prior probability of winning. We derive an expression for the deterrence threshold, i.e., the minimum level of false-alarm that the detector should endure so that the adversary is not any better off by the manipulation. With this, asymptotically, the detector can ensure that the probability of missed-detection becomes zero by appropriately adjusting the rate of decay of probability of false-alarm. But if this rate of decay is too 'fast', then the adversary can get an arbitrarily high probability of winning in spite of having a vanishing prior probability of winning. We then extend the results to a setting where the detector has incomplete information about the adversary.
引用
收藏
页码:3832 / 3837
页数:6
相关论文
共 50 条
  • [41] A Game-theoretic Approach to Data Interaction
    McCamish, Ben
    Ghadakchi, Vahid
    Termehchy, Arash
    Touri, Behrouz
    Cotilla-Sanchez, Eduardo
    Huang, Liang
    Changpinyo, Soravit
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 2020, 45 (01):
  • [42] A GAME-THEORETIC APPROACH TO INTEGRATION OF MODULES
    BOZMA, HI
    DUNCAN, JS
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1994, 16 (11) : 1074 - 1086
  • [43] A Game-Theoretic Approach to Peer Disagreement
    Heesen, Remco
    van der Kolk, Pieter
    ERKENNTNIS, 2016, 81 (06) : 1345 - 1368
  • [44] Two game-theoretic problems of approach
    Ershov, A. A.
    Ushakov, A., V
    Ushakov, V. N.
    SBORNIK MATHEMATICS, 2021, 212 (09) : 1228 - 1260
  • [45] A Game-Theoretic Approach to Hypergraph Clustering
    Bulo, Samuel Rota
    Pelillo, Marcello
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2013, 35 (06) : 1312 - 1327
  • [46] Portfolio Selection: A Game-Theoretic Approach
    Simonian, Joseph
    JOURNAL OF PORTFOLIO MANAGEMENT, 2019, 45 (06): : 108 - 116
  • [47] Game-theoretic approach for information sharing
    Raweewan, Morrakot
    Ferrell, William G., Jr.
    2ND IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, PROCEEDINGS, 2007, : 111 - +
  • [48] Alignment patterns, crisis bargaining, and extended deterrence: A game-theoretic analysis
    Zagare, FC
    Kilgour, DM
    INTERNATIONAL STUDIES QUARTERLY, 2003, 47 (04) : 587 - 615
  • [49] DETERRENCE VERSUS DEFENSE - A GAME-THEORETIC MODEL OF STAR-WARS
    BRAMS, SJ
    KILGOUR, DM
    INTERNATIONAL STUDIES QUARTERLY, 1988, 32 (01) : 3 - 28