Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Journal articles
  4. Game Theory Meets Network Security and Privacy
 
research article

Game Theory Meets Network Security and Privacy

Manshaei, Mohammad Hossein
•
Zhu, Quanyan
•
Alpcan, Tansu
Show more
2013
Acm Computing Surveys

This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in addressing different forms of security and privacy problems in computer networks and mobile applications. We organize the presented works in six main categories: security of the physical and MAC layers, security of self-organizing networks, intrusion detection systems, anonymity and privacy, economics of network security, and cryptography. In each category, we identify security problems, players, and game models. We summarize the main results of selected works, such as equilibrium analysis and security mechanism designs. In addition, we provide a discussion on the advantages, drawbacks, and future direction of using game theory in this field. In this survey, our goal is to instill in the reader an enhanced understanding of different research approaches in applying game-theoretic methods to network security. This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking.

  • Details
  • Metrics
Type
research article
DOI
10.1145/2480741.2480742
Web of Science ID

WOS:000321212300001

Author(s)
Manshaei, Mohammad Hossein
Zhu, Quanyan
Alpcan, Tansu
Basar, Tamer
Hubaux, Jean-Pierre  
Date Issued

2013

Publisher

Assoc Computing Machinery

Published in
Acm Computing Surveys
Volume

45

Issue

3

Start page

25

Subjects

Algorithms

•

Design

•

Economics

•

Security

•

Theory

•

Game theory

•

network security and privacy

•

intrusion detection system

•

location privacy

•

revocation

•

wireless security

•

cryptography

•

multiparty computation

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LDS  
Available on Infoscience
October 1, 2013
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/95246
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés