• ثبت نام
    • ورود به سامانه
    مشاهده مورد 
    •   صفحهٔ اصلی
    • نشریات انگلیسی
    • The ISC International Journal of Information Security
    • Volume 11, Issue 2
    • مشاهده مورد
    •   صفحهٔ اصلی
    • نشریات انگلیسی
    • The ISC International Journal of Information Security
    • Volume 11, Issue 2
    • مشاهده مورد
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Interdependent Security Game Design over Constrained Linear Influence Networks

    (ندگان)پدیدآور
    Hasheminasab, Seyed AlirezaTork Ladani, BehrouzAlpcan, Tansu
    Thumbnail
    دریافت مدرک مشاهده
    FullText
    اندازه فایل: 
    1.672 مگابایت
    نوع فايل (MIME): 
    PDF
    نوع مدرک
    Text
    ORIGINAL RESEARCH PAPER
    زبان مدرک
    English
    نمایش کامل رکورد
    چکیده
    In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors' decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through security investments considering the network structure, costs and constraints, which have been set by the network owner. However, decisions of selfish entities to maximize their utilities do not always lead to a socially optimum solution. Therefore, motivating players to reach the social optimum is of high value from the network owner's point of view. The network owner wants to maximize the overall network security by designing the game's parameters. As far as we know, there is no notable work in the context of linear influence networks to introduce appropriate game design for this purpose. This paper presents design methods that make use of the adjustments of players' costs, interdependencies, and constraints to align players' incentives with a network-wide global objective. We present a comprehensive investigation of existence and uniqueness conditions of Nash Equilibrium in such environments. Furthermore, numerical results of applying the proposed mechanisms in a sample real-world example are illustrated.
    کلید واژگان
    Interdependent Security
    Nash equilibrium
    Social Optimum
    Game Design

    شماره نشریه
    2
    تاریخ نشر
    2019-07-01
    1398-04-10
    ناشر
    Iranian Society of Cryptology
    سازمان پدید آورنده
    Department of Computer Engineering, University of Isfahan, Isfahan, Iran
    Department of Computer Engineering, University of Isfahan, Isfahan, Iran.
    Department of Electrical and Electronic Engineering, The University of Melbourne, Melbourne, Australia.

    شاپا
    2008-2045
    2008-3076
    URI
    https://dx.doi.org/10.22042/isecure.2019.186923.467
    http://www.isecure-journal.com/article_92238.html
    https://iranjournals.nlai.ir/handle/123456789/73399

    مرور

    همه جای سامانهپایگاه‌ها و مجموعه‌ها بر اساس تاریخ انتشارپدیدآورانعناوینموضوع‌‌هااین مجموعه بر اساس تاریخ انتشارپدیدآورانعناوینموضوع‌‌ها

    حساب من

    ورود به سامانهثبت نام

    آمار

    مشاهده آمار استفاده

    تازه ترین ها

    تازه ترین مدارک
    © کليه حقوق اين سامانه برای سازمان اسناد و کتابخانه ملی ایران محفوظ است
    تماس با ما | ارسال بازخورد
    قدرت یافته توسطسیناوب