Efficient network security as a strategic game

被引:0
作者
Schlake, Fari [1 ]
Mili, Lamine [1 ]
机构
[1] Virginia Tech, Bradley Dept Elect & Comp Engn, Falls Church, VA 22043 USA
关键词
strategic form games; mechanism design theory; game theory; incentive compatibility; dominant strategy; protocol design; cyber security; performance optimisation; network management;
D O I
10.1504/IJCIS.2013.054968
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
We implement game and mechanism design theories to develop a network-wide autonomous consumer-centric and delay-efficient security protocol, DSIC-S. It induces a dominant strategy incentive compatible equilibrium among all rational and selfish nodes. We show that our protocol is network-wide socially desirable and Pareto optimal. DSIC-S guarantees the delivery of consumer's security services within desired levels, naturally and trustfully, reinforced by our nesting security model. We address resource management and delay-efficiency through synergy of several design aspects. We propose a scenario-based security model with different levels. We incorporate a valuation system to integrate the caused delay at each node in selection of security algorithms without consumer's knowledge of the actual delays. We achieve this by incorporating our valuation system, in particular that of the consumer's, in the calculation of the credit transfers with Vickrey-Clarke-Groves (VCG) payments and Clarke's pivotal rule. We prove that DSIC-S design solves the revelation theorem's problem of misrepresentation of agents' private information in mechanism design theory. We propose an incentive model and incorporate the valuations in these incentives. The simulations validate our theoretical results. They prove the significance of our model and show the correlation of the credit transfers to actual delays and security valuations.
引用
收藏
页码:243 / 273
页数:31
相关论文
共 50 条
  • [21] A Game-Based Mechanism of Relay Selection for Wireless Network Security
    Hong, Ying
    Huang, Kaizhi
    Luo, Wenyu
    Lin, Shengbin
    2014 IEEE 79TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-SPRING), 2014,
  • [22] Network Security Situation Assessment Method Based on Markov Game Model
    Li, Xi
    Lu, Yu
    Liu, Sen
    Nie, Wei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (05): : 2414 - 2428
  • [23] Game of information security investment: Impact of attack types and network vulnerability
    Wu, Yong
    Feng, Gengzhong
    Wang, Nengmin
    Liang, Huigang
    EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (15-16) : 6132 - 6146
  • [24] Security enhancement for software defined network using game theoretical approach
    Anithaashri, T. P.
    Ravichandran, G.
    Baskaran, R.
    COMPUTER NETWORKS, 2019, 157 : 112 - 121
  • [25] An Analyzing Method for Computer Network Security Based on Markov Game Model
    Wang, Changchun
    Shi, Changhui
    Wang, Chong
    Fu, Ying
    PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 454 - 458
  • [26] Inter-Session Network Coding with Strategic Users: A Game-Theoretic Analysis of the Butterfly Network
    Mohsenian-Rad, Hamed
    Huang, Jianwei
    Wong, Vincent W. S.
    Jaggi, Sidharth
    Schober, Robert
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2013, 61 (04) : 1473 - 1484
  • [27] A Survey of Game Theoretic Methods for Cyber Security
    Wang, Yuan
    Wang, Yongjun
    Liu, Jing
    Huang, Zhijian
    Xie, Peidai
    2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016), 2016, : 631 - 636
  • [28] Game Theory Meets Information Security Management
    Fielder, Andrew
    Panaousis, Emmanouil
    Malacaria, Pasquale
    Hankin, Chris
    Smeraldi, Fabrizio
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 15 - 29
  • [29] A survey on game theoretic approaches for privacy preservation in data mining and network security
    Shah, Hitarth
    Kakkad, Vishruti
    Patel, Reema
    Doshi, Nishant
    16TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2019),THE 14TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2019),THE 9TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, 2019, 155 : 686 - 691
  • [30] Strategic Resource Pricing and Allocation in a 5G Network Slicing Stackelberg Game
    Datar, Mandar
    Altman, Eitan
    Le Cadre, Helene
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (01): : 502 - 520