Efficient network security as a strategic game

被引:0
|
作者
Schlake, Fari [1 ]
Mili, Lamine [1 ]
机构
[1] Virginia Tech, Bradley Dept Elect & Comp Engn, Falls Church, VA 22043 USA
关键词
strategic form games; mechanism design theory; game theory; incentive compatibility; dominant strategy; protocol design; cyber security; performance optimisation; network management;
D O I
10.1504/IJCIS.2013.054968
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
We implement game and mechanism design theories to develop a network-wide autonomous consumer-centric and delay-efficient security protocol, DSIC-S. It induces a dominant strategy incentive compatible equilibrium among all rational and selfish nodes. We show that our protocol is network-wide socially desirable and Pareto optimal. DSIC-S guarantees the delivery of consumer's security services within desired levels, naturally and trustfully, reinforced by our nesting security model. We address resource management and delay-efficiency through synergy of several design aspects. We propose a scenario-based security model with different levels. We incorporate a valuation system to integrate the caused delay at each node in selection of security algorithms without consumer's knowledge of the actual delays. We achieve this by incorporating our valuation system, in particular that of the consumer's, in the calculation of the credit transfers with Vickrey-Clarke-Groves (VCG) payments and Clarke's pivotal rule. We prove that DSIC-S design solves the revelation theorem's problem of misrepresentation of agents' private information in mechanism design theory. We propose an incentive model and incorporate the valuations in these incentives. The simulations validate our theoretical results. They prove the significance of our model and show the correlation of the credit transfers to actual delays and security valuations.
引用
收藏
页码:243 / 273
页数:31
相关论文
共 50 条
  • [31] Game theory in network security for digital twins in industry
    Feng, Hailin
    Chen, Dongliang
    Lv, Haibin
    Lv, Zhihan
    DIGITAL COMMUNICATIONS AND NETWORKS, 2024, 10 (04) : 1068 - 1078
  • [32] A "Game of Like" : Online Social Network Sharing As Strategic Interaction
    Genot, Emmanuel J.
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2023, (379): : 299 - 307
  • [33] Bounded Budget Betweenness Centrality Game for Strategic Network Formations
    Bei, Xiaohui
    Chen, Wei
    Teng, Shang-Hua
    Zhang, Jialin
    Zhu, Jiajie
    ALGORITHMS - ESA 2009, PROCEEDINGS, 2009, 5757 : 227 - +
  • [34] Bounded budget betweenness centrality game for strategic network formations
    Bei, Xiaohui
    Chen, Wei
    Teng, Shang-Hua
    Zhang, Jialin
    Zhu, Jiajie
    THEORETICAL COMPUTER SCIENCE, 2011, 412 (52) : 7147 - 7168
  • [35] Strategic Arrivals into Queueing Networks: The Network Concert Queueing Game
    Honnappa, Harsha
    Jain, Rahul
    OPERATIONS RESEARCH, 2015, 63 (01) : 247 - 259
  • [36] A Strategic Analysis of Attacker-Defender Repeated Game in Smart Grid Security
    Paul, Shuva
    Ni, Zhen
    2019 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2019,
  • [37] Food web conservation vs. strategic threats: A security game approach
    Gatmiry, Zohreh S.
    Hafezalkotob, Ashkan
    Bafruei, Morteza Khakzar
    Soltani, Roya
    ECOLOGICAL MODELLING, 2021, 442
  • [38] Strategic Approaches in Network Communication and Information Security Risk Assessment
    Alsafwani, Nadher
    Fazea, Yousef
    Alnajjar, Fuad
    INFORMATION, 2024, 15 (06)
  • [39] Network Security Games: Combining Game Theory, Behavioral Economics, and Network Measurements
    Christin, Nicolas
    DECISION AND GAME THEORY FOR SECURITY: GAMESEC 2011, 2011, 7037 : 4 - 6
  • [40] Distributed strategic learning and game theoretic formulation of network embedded coding
    Esposito, Christian
    Castiglione, Aniello
    Palmieri, Francesco
    Pop, Florin
    JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 28 : 426 - 438