Adversarial behavior in network mechanism design

نویسندگان

  • Anil Kumar Chorppath
  • Tansu Alpcan
چکیده

ABSTRACT This paper studies the effects of and countermeasures against adversarial behavior in network resource allocation mechanisms such as pricing and auctions. It models the heterogeneous behavior of users, which ranges from altruistic to selfish and even to malicious, using game theory. The paper adopts a mechanism design approach to quantify the effect of adversarial behavior and modify the mechanisms to respond. First, the Price of Malice of the existing network mechanisms to adversarial behavior, which ranges from extreme selfishness to destructive maliciousness, is analyzed. Then, two methods are discussed to counter such adversarial behavior: one is a differentiated pricing to punish the malicious users and another is a detection method based on the expected utility functions of the “regular” users on the network. Finally, the results obtained are illustrated with multiple examples and numerical simulations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automatic Colorization of Grayscale Images Using Generative Adversarial Networks

Automatic colorization of gray scale images poses a unique challenge in Information Retrieval. The goal of this field is to colorize images which have lost some color channels (such as the RGB channels or the AB channels in the LAB color space) while only having the brightness channel available, which is usually the case in a vast array of old photos and portraits. Having the ability to coloriz...

متن کامل

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

متن کامل

A/B Testing in Networks with Adversarial Members

Many researchers aŠempt to study the e‚ects of interventions in network systems. To simplify experimental design and analysis in these environments, simple assumptions are made about the behavior of its members. However, nodes may not respond to treatment, or may respond maliciously. Œese adversarial nodes inƒuence treatment topology by preventing or altering the expected network e‚ect, but may...

متن کامل

Internet network design for quality of service guarantee using Data Envelopment Analysis (DEA)

By developing the new services such as VoIP and Videoconference, using a mechanism is needed to support the quality of service of the application programs. Different models have been presented to guarantee the quality of service. Among these, the differentiated services can be mentioned which was presented by IETF. In the architecture of the differentiated services, no admission control mechani...

متن کامل

Network Utility Maximization in Adversarial Environments

Stochastic models have been dominant in network optimization theory for over two decades, due to their analytical tractability. However, these models fail to capture non-stationary or even adversarial network dynamics which are of increasing importance for modeling the behavior of networks under malicious attacks or characterizing short-term transient behavior. In this paper, we consider the ne...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011