000124733 001__ 124733
000124733 005__ 20190331192709.0
000124733 0247_ $$2doi$$a10.1109/JSAC.2008.080928
000124733 022__ $$a0733-8716
000124733 02470 $$2ISI$$a000258913800028
000124733 037__ $$aARTICLE
000124733 245__ $$aGame Theoretic Modeling of Malicious Users in Collaborative Networks
000124733 269__ $$a2008
000124733 260__ $$bInstitute of Electrical and Electronics Engineers$$c2008
000124733 336__ $$aJournal Articles
000124733 500__ $$a©2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
000124733 520__ $$aIf a network is to operate successfully, its users need to collaborate. Collaboration takes the form of following a network protocol and involves some resource expenditure on the part of the user. Therefore, users cannot automatically be expected to follow the protocol if they are not forced to. The situation is exacerbated by the presence of malicious users whose objective is to damage the network and increase the cost incurred by the legitimate users. The legitimate users are, at least initially, unaware of the type (legitimate or malicious) of the other users. Our contribution is a model for the strategic interaction of legitimate and malicious users as described above. The model is based on repeated graphical games with incomplete information. We describe and analyze two specific instantiations, aiming to demonstrate the model's expressive power and tractability. The main benefit we see from using game theory for this essentially security problem is the ability to bound the damage caused by the malicious users.
000124733 6531_ $$acollaborative networks
000124733 6531_ $$aincomplete information
000124733 6531_ $$arepeated games
000124733 6531_ $$asecurity
000124733 700__ $$aTheodorakopoulos, George
000124733 700__ $$aBaras, John S.
000124733 773__ $$j26$$tIEEE Journal on Selected Areas in Communications$$k7$$q1317-1327
000124733 8564_ $$uhttps://infoscience.epfl.ch/record/124733/files/gtjb-jsac08.pdf$$zPreprint$$s268410$$yPreprint
000124733 909C0 $$xU10427$$0252453$$pLCA2
000124733 909CO $$ooai:infoscience.tind.io:124733$$qGLOBAL_SET$$pIC$$particle
000124733 917Z8 $$x181059
000124733 917Z8 $$x148230
000124733 937__ $$aLCA-ARTICLE-2008-027
000124733 973__ $$rREVIEWED$$sPUBLISHED$$aOTHER
000124733 980__ $$aARTICLE