15,469 research outputs found

    Game Theory Meets Network Security: A Tutorial at ACM CCS

    Full text link
    The increasingly pervasive connectivity of today's information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and authenticity. However, with the growing sophistication of the attacks and the complexity of the system, the protection using traditional methods could be cost-prohibitive. A new perspective and a new theoretical foundation are needed to understand security from a strategic and decision-making perspective. Game theory provides a natural framework to capture the adversarial and defensive interactions between an attacker and a defender. It provides a quantitative assessment of security, prediction of security outcomes, and a mechanism design tool that can enable security-by-design and reverse the attacker's advantage. This tutorial provides an overview of diverse methodologies from game theory that includes games of incomplete information, dynamic games, mechanism design theory to offer a modern theoretic underpinning of a science of cybersecurity. The tutorial will also discuss open problems and research challenges that the CCS community can address and contribute with an objective to build a multidisciplinary bridge between cybersecurity, economics, game and decision theory

    Applications of Repeated Games in Wireless Networks: A Survey

    Full text link
    A repeated game is an effective tool to model interactions and conflicts for players aiming to achieve their objectives in a long-term basis. Contrary to static noncooperative games that model an interaction among players in only one period, in repeated games, interactions of players repeat for multiple periods; and thus the players become aware of other players' past behaviors and their future benefits, and will adapt their behavior accordingly. In wireless networks, conflicts among wireless nodes can lead to selfish behaviors, resulting in poor network performances and detrimental individual payoffs. In this paper, we survey the applications of repeated games in different wireless networks. The main goal is to demonstrate the use of repeated games to encourage wireless nodes to cooperate, thereby improving network performances and avoiding network disruption due to selfish behaviors. Furthermore, various problems in wireless networks and variations of repeated game models together with the corresponding solutions are discussed in this survey. Finally, we outline some open issues and future research directions.Comment: 32 pages, 15 figures, 5 tables, 168 reference

    Understanding and Managing Behavioural Risks -The Case of Food Risks Caused by Malpractice in Poultry Production

    Get PDF
    The probability that actors in economic relationships break rules increases with the profits they thus expect to earn. It decreases with the probability and level of short- and long-term losses resulting from disclosure. It also decreases with the level of social context factors and intrinsic values which shield actors from yielding to economic temptations. This paper assesses the relative merits of various scientific approaches concerned with risks in economic relationships and outlines their contribution to the study of opportunistic rule-breaking. Since the identification of (misdirected) economic incentives faced by firms and individuals represents the starting point for a systematic analysis of opportunism in any field, we also outline a microeconomic approach that systematically provides this crucial information. The approach is applied to the problem of food quality and safety threatened by opportunistic malpractice of food business operators. Its essentials are illustrated through a study which systematically searches for the temptations to break production-related rules in the poultry industries.asymmetric information, control theories, economic misconduct, game theory, moral hazard, principal-agent model, opportunism, protective factors, relational risks, Food Consumption/Nutrition/Food Safety, A13, K32, K42,

    Transforming Energy Networks via Peer to Peer Energy Trading: Potential of Game Theoretic Approaches

    Get PDF
    Peer-to-peer (P2P) energy trading has emerged as a next-generation energy management mechanism for the smart grid that enables each prosumer of the network to participate in energy trading with one another and the grid. This poses a significant challenge in terms of modeling the decision-making process of each participant with conflicting interest and motivating prosumers to participate in energy trading and to cooperate, if necessary, for achieving different energy management goals. Therefore, such decision-making process needs to be built on solid mathematical and signal processing tools that can ensure an efficient operation of the smart grid. This paper provides an overview of the use of game theoretic approaches for P2P energy trading as a feasible and effective means of energy management. As such, we discuss various games and auction theoretic approaches by following a systematic classification to provide information on the importance of game theory for smart energy research. Then, the paper focuses on the P2P energy trading describing its key features and giving an introduction to an existing P2P testbed. Further, the paper zooms into the detail of some specific game and auction theoretic models that have recently been used in P2P energy trading and discusses some important finding of these schemes.Comment: 38 pages, single column, double spac

    Computational Mechanism Design: A Call to Arms

    No full text
    Game theory has developed powerful tools for analyzing decision making in systems with multiple autonomous actors. These tools, when tailored to computational settings, provide a foundation for building multiagent software systems. This tailoring gives rise to the field of computational mechanism design, which applies economic principles to computer systems design

    Three alternative (?) stories on the late 20th-century rise of game theory

    Get PDF
    The paper presents three different reconstructions of the 1980s boom of game theory and its rise to the present status of indispensable tool-box for modern economics. The first story focuses on the Nash refinements literature and on the development of Bayesian games. The second emphasizes the role of antitrust case law, and in particular of the rehabilitation, via game theory, of some traditional antitrust prohibitions and limitations which had been challenged by the Chicago approach. The third story centers on the wealth of issues classifiable under the general headline of "mechanism design" and on the game theoretical tools and methods which have been applied to tackle them. The bottom lines are, first, that the three stories need not be viewed as conflicting, but rather as complementary, and, second, that in all stories a central role has been played by John Harsanyi and Bayesian decision theory.game theory; mechanism design; refinements of Nash equilibrium; antitrust law; John Harsanyi
    • 

    corecore