Topology Design Games and Dynamics in Adversarial Environments

被引:5
作者
Ciftcioglu, Ertugrul Necdet [1 ,2 ]
Pal, Siddharth [3 ]
Chan, Kevin S. [5 ]
Cansever, Derya H. [6 ]
Swami, Ananthram
Singh, Ambuj K. [5 ,7 ]
Basu, Prithwish [4 ]
机构
[1] US Army, Res Lab, Adelphi, MD 20783 USA
[2] IBM Res, Yorktown Hts, NY 10598 USA
[3] Raytheon BBN Technol, Cambridge, MA 02138 USA
[4] Raytheon BBN Technol, Network & Commun Technol Business Unit, Cambridge, MA 02138 USA
[5] US Army, Res Lab, Adelphi, MD 20783 USA
[6] US Army, Commun & Elect Res & Dev Ctr, Aberdeen Proving Ground, MD 21001 USA
[7] Univ Calif Santa Barbara, Comp Sci, Santa Barbara, CA 93106 USA
关键词
Network design; game theory; topology control; multi-stage games;
D O I
10.1109/JSAC.2017.2659582
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We study the problem of network topology design within a set of policy-compliant topologies as a game between a designer and an adversary. At any time instant, the designer aims to operate the network in an optimal topology within the set of policy compliant topologies with respect to a desired network property. Simultaneously, the adversary counters the designer trying to force operation in a suboptimal topology. Specifically, if the designer and the attacker choose the same link in the current topology to defend/grow and attack, respectively, then the latter is thwarted. However, if the defender does not correctly guess where the attacker is going to attack, and, hence, acts elsewhere, the topology reverts to the best policy-compliant configuration after a successful attack. We show the existence of various mixed strategy equilibria in this game and systematically study its structural properties. We study the effect of parameters, such as probability of a successful attack, and characterize the steady state behavior of the underlying Markov chain. While the intuitive adversarial strategy here is to attack the most important links, the Nash equilibrium strategy is for the designer to defend the most crucial links and for the adversary to focus attack on the lesser crucial links. We validate these properties through two use cases with example sets of network topologies. Next, we consider a multi-stage framework where the designer is not only interested in the instantaneous network property costs but a discounted sum of costs over many time instances. We establish structural properties of the equilibrium strategies in the multi-stage setting, and also demonstrate that applying algorithms based on the Q-Learning and Rollout methods can result in significant benefits for the designer compared with strategies resulting from a one-shot based game.
引用
收藏
页码:628 / 642
页数:15
相关论文
共 25 条
  • [1] [Anonymous], 2003, Proceedings of the 22nd Annual Symposium on Principles of Distributed Computing, DOI [10.1145/872035.872088, DOI 10.1145/872035.872088]
  • [2] [Anonymous], 1994, P 11 INT C INT C MAC
  • [3] The Internet of Things: A survey
    Atzori, Luigi
    Iera, Antonio
    Morabito, Giacomo
    [J]. COMPUTER NETWORKS, 2010, 54 (15) : 2787 - 2805
  • [4] Bertsekas D., 2001, Dynamic Programming and Optimal Control, V1
  • [5] Rollout algorithms for stochastic scheduling problems
    Bertsekas, DP
    Castañon, DA
    [J]. JOURNAL OF HEURISTICS, 1999, 5 (01) : 89 - 108
  • [6] Ciftcioglu E. N., 2016, P IEEE WIOPT, P1
  • [7] Ciftcioglu EN, 2015, IEEE MILIT COMMUN C, P1397, DOI 10.1109/MILCOM.2015.7357640
  • [8] Cui Y., 2001, P IEEE INT C MULT EX, P1025
  • [9] Demaine ED, 2010, LECT NOTES COMPUT SC, V6139, P420
  • [10] Durumeric Z., 2013, Proc. of IMC '13, DOI 10.1145/2504730.2504755