Efficient network security as a strategic game

被引:0
|
作者
Schlake, Fari [1 ]
Mili, Lamine [1 ]
机构
[1] Virginia Tech, Bradley Dept Elect & Comp Engn, Falls Church, VA 22043 USA
关键词
strategic form games; mechanism design theory; game theory; incentive compatibility; dominant strategy; protocol design; cyber security; performance optimisation; network management;
D O I
10.1504/IJCIS.2013.054968
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
We implement game and mechanism design theories to develop a network-wide autonomous consumer-centric and delay-efficient security protocol, DSIC-S. It induces a dominant strategy incentive compatible equilibrium among all rational and selfish nodes. We show that our protocol is network-wide socially desirable and Pareto optimal. DSIC-S guarantees the delivery of consumer's security services within desired levels, naturally and trustfully, reinforced by our nesting security model. We address resource management and delay-efficiency through synergy of several design aspects. We propose a scenario-based security model with different levels. We incorporate a valuation system to integrate the caused delay at each node in selection of security algorithms without consumer's knowledge of the actual delays. We achieve this by incorporating our valuation system, in particular that of the consumer's, in the calculation of the credit transfers with Vickrey-Clarke-Groves (VCG) payments and Clarke's pivotal rule. We prove that DSIC-S design solves the revelation theorem's problem of misrepresentation of agents' private information in mechanism design theory. We propose an incentive model and incorporate the valuations in these incentives. The simulations validate our theoretical results. They prove the significance of our model and show the correlation of the credit transfers to actual delays and security valuations.
引用
收藏
页码:243 / 273
页数:31
相关论文
共 50 条
  • [41] A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network
    Chen, Juntao
    Touati, Corinne
    Zhu, Quanyan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 462 - 474
  • [42] An efficient design of CCMP for robust security network
    Bae, Duhyun
    Kim, Gwanyeon
    Kim, Jiho
    Park, Sehyun
    Song, Ohyoung
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005, 2006, 3935 : 352 - 361
  • [43] An efficient method for network security situation assessment
    Tao, Xiaoling
    Kong, Kaichuan
    Zhao, Feng
    Cheng, Siyan
    Wang, Sufang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (11)
  • [44] A Repeated Stochastic Game Approach for Strategic Network Selection in Heterogeneous Networks
    Li, Xin
    Huang, Qiuyuan
    Wu, Dapeng
    IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 88 - 93
  • [45] Efficient Datacenters Management for Network and Security Operations
    Paiusescu, Lucian
    Barbulescu, Mihai
    Vraciu, Valeriu
    Carabas, Mihai
    2018 17TH ROEDUNET IEEE INTERNATIONAL CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET), 2018,
  • [46] Enhanced IoV Security Network by Using Blockchain Governance Game
    Kim, Song-Kyoo
    MATHEMATICS, 2021, 9 (02) : 1 - 13
  • [47] Network Security Situation Assessment Based on Stochastic Game Model
    Zhang, Boyun
    Chen, Zhigang
    Tang, Wensheng
    Fan, Qiang
    Yan, Xiai
    Wang, Shulin
    ADVANCED INTELLIGENT COMPUTING, 2011, 6838 : 517 - +
  • [48] A Network Security Risk Assessment Framework Based on Game Theory
    He, Wei
    Xia, Chunhe
    Zhang, Cheng
    Ji, Yi
    Ma, Xinyi
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 742 - 746
  • [49] Research on the network security risk control based on game model
    Wang, Wangang (wangwg77@163.com), 1600, Universidad Central de Venezuela (55):
  • [50] Network security risk assessment studies based on the game theory
    Xu, Yan-Li
    Wang, Ling-Ling
    Liu, Jing
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2011, 32 (SUPPL.1): : 200 - 203