Efficient network security as a strategic game

被引:0
|
作者
Schlake, Fari [1 ]
Mili, Lamine [1 ]
机构
[1] Virginia Tech, Bradley Dept Elect & Comp Engn, Falls Church, VA 22043 USA
关键词
strategic form games; mechanism design theory; game theory; incentive compatibility; dominant strategy; protocol design; cyber security; performance optimisation; network management;
D O I
10.1504/IJCIS.2013.054968
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
We implement game and mechanism design theories to develop a network-wide autonomous consumer-centric and delay-efficient security protocol, DSIC-S. It induces a dominant strategy incentive compatible equilibrium among all rational and selfish nodes. We show that our protocol is network-wide socially desirable and Pareto optimal. DSIC-S guarantees the delivery of consumer's security services within desired levels, naturally and trustfully, reinforced by our nesting security model. We address resource management and delay-efficiency through synergy of several design aspects. We propose a scenario-based security model with different levels. We incorporate a valuation system to integrate the caused delay at each node in selection of security algorithms without consumer's knowledge of the actual delays. We achieve this by incorporating our valuation system, in particular that of the consumer's, in the calculation of the credit transfers with Vickrey-Clarke-Groves (VCG) payments and Clarke's pivotal rule. We prove that DSIC-S design solves the revelation theorem's problem of misrepresentation of agents' private information in mechanism design theory. We propose an incentive model and incorporate the valuations in these incentives. The simulations validate our theoretical results. They prove the significance of our model and show the correlation of the credit transfers to actual delays and security valuations.
引用
收藏
页码:243 / 273
页数:31
相关论文
共 50 条
  • [21] A dynamic Bayesian security game framework for strategic defense mechanism design
    Farhang, Sadegh, 1600, Springer Verlag (8840):
  • [22] Analysis of Strategic Security Through Game Theory for Mobile Social Networks
    Guglielmi, Anna V.
    Badia, Leonardo
    2017 IEEE 22ND INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2017,
  • [23] Time to up the game? Middle Eastern security and Chinese strategic involvement
    Hai Yang
    Asia Europe Journal, 2018, 16 : 283 - 296
  • [24] Smartphone Strategic Sampling in Defending Enterprise Network Security
    Li, Feng
    Peng, Wei
    Huang, Chin-Tser
    Zou, Xukai
    2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013,
  • [25] Strategic Defense and Attack in Deception based Network Security
    Fraunholz, Daniel
    Schotten, Hans Dieter
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 156 - 161
  • [26] Efficient Heuristic Policy Optimisation for a Challenging Strategic Card Game
    Montoliu, Raul
    Gaina, Raluca D.
    Perez-Liebana, Diego
    Delgado, Daniel
    Lucas, Simon
    APPLICATIONS OF EVOLUTIONARY COMPUTATION, EVOAPPLICATIONS 2020, 2020, 12104 : 403 - 418
  • [27] An Efficient Episode Matching For Network Security
    Zhang, Ruhui
    Du, Ye
    Wang, Xing
    Zhao, Bin
    2011 SECOND INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND EDUCATION APPLICATION (ICEA 2011), 2011, : 73 - +
  • [29] Teaching Network Security Through a Scavenger Hunt Game
    Katsadouros, Evangelos
    Kogias, Dimitris
    Toumanidis, Lazaros
    Chatzigeorgiou, Christos
    Patrikakis, Charalampos Z.
    PROCEEDINGS OF 2017 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE (EDUCON2017), 2017, : 1802 - 1805
  • [30] Game theory in network security for digital twins in industry
    Hailin Feng
    Dongliang Chen
    Haibin Lv
    Zhihan Lv
    Digital Communications and Networks, 2024, 10 (04) : 1068 - 1078