Efficient network security as a strategic game

被引:0
作者
Schlake, Fari [1 ]
Mili, Lamine [1 ]
机构
[1] Virginia Tech, Bradley Dept Elect & Comp Engn, Falls Church, VA 22043 USA
关键词
strategic form games; mechanism design theory; game theory; incentive compatibility; dominant strategy; protocol design; cyber security; performance optimisation; network management;
D O I
10.1504/IJCIS.2013.054968
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
We implement game and mechanism design theories to develop a network-wide autonomous consumer-centric and delay-efficient security protocol, DSIC-S. It induces a dominant strategy incentive compatible equilibrium among all rational and selfish nodes. We show that our protocol is network-wide socially desirable and Pareto optimal. DSIC-S guarantees the delivery of consumer's security services within desired levels, naturally and trustfully, reinforced by our nesting security model. We address resource management and delay-efficiency through synergy of several design aspects. We propose a scenario-based security model with different levels. We incorporate a valuation system to integrate the caused delay at each node in selection of security algorithms without consumer's knowledge of the actual delays. We achieve this by incorporating our valuation system, in particular that of the consumer's, in the calculation of the credit transfers with Vickrey-Clarke-Groves (VCG) payments and Clarke's pivotal rule. We prove that DSIC-S design solves the revelation theorem's problem of misrepresentation of agents' private information in mechanism design theory. We propose an incentive model and incorporate the valuations in these incentives. The simulations validate our theoretical results. They prove the significance of our model and show the correlation of the credit transfers to actual delays and security valuations.
引用
收藏
页码:243 / 273
页数:31
相关论文
共 50 条
[41]   Energy Efficient Based Channel Assignment Game Algorithm for Wireless Sensor Network [J].
Xiao-Chen Hao ;
Xiao-Yue Ru ;
Xi-Da Li ;
Min-Jie Xin .
Wireless Personal Communications, 2015, 85 :2749-2771
[42]   Energy Efficient Based Channel Assignment Game Algorithm for Wireless Sensor Network [J].
Hao, Xiao-Chen ;
Ru, Xiao-Yue ;
Li, Xi-Da ;
Xin, Min-Jie .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (04) :2749-2771
[43]   A probabilistic automata-based network attack-defense game model for data security by using security service chain [J].
Liu, Hao ;
Wang, Chong ;
Wu, Zhonghai .
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2025, 28 (01)
[44]   An Efficient Game for Coordinating Electric Vehicle Charging [J].
Zou, Suli ;
Ma, Zhongjing ;
Liu, Xiangdong ;
Hiskens, Ian .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (05) :2374-2389
[45]   A Game-Theoretical Framework for Industrial Control System Security [J].
Colbert, Edward J. M. ;
Zhu, Quanyan ;
Rieger, Craig G. .
DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 :469-470
[46]   Enhanced Network Intrusion Detection System for Internet of Things Security Using Multimodal Big Data Representation with Transfer Learning and Game Theory [J].
Ullah, Farhan ;
Turab, Ali ;
Ullah, Shamsher ;
Cacciagrano, Diletta ;
Zhao, Yue .
SENSORS, 2024, 24 (13)
[47]   Enhancing network security through integration of game theory in software-defined networking framework [J].
Razvan, Florea ;
Mitica, Craus .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (03)
[48]   A Strategic Framework for Managing Internet Security [J].
Sitnikova, Elena ;
Asgarkhani, Mehdi .
2014 11TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2014, :947-955
[50]   MODELING, GAME-THEORY, AND STRATEGIC MANAGEMENT [J].
SALONER, G .
STRATEGIC MANAGEMENT JOURNAL, 1991, 12 :119-136