Wiretapping a Hidden Network

نویسندگان

  • Haris Aziz
  • Oded Lachish
  • Mike Paterson
  • Rahul Savani
چکیده

We consider the problem of maximizing the probability of hitting a strategically chosen hidden virtual network by placing a wiretap on a single link of a communication network. This can be seen as a twoplayer win-lose (zero-sum) game that we call the wiretap game. The value of this game is the greatest probability that the wiretapper can secure for hitting the virtual network. The value is shown to equal the reciprocal of the strength of the underlying graph. We efficiently compute a unique partition of the edges of the graph, called the prime-partition, and find the set of pure strategies of the hider that are best responses against every maxmin strategy of the wiretapper. Using these special pure strategies of the hider, which we call omniconnected-spanning-subgraphs, we define a partial order on the elements of the prime-partition. From the partial order, we obtain a linear number of simple two-variable inequalities that define the maxmin-polytope, and a characterization of its extreme points. Our definition of the partial order allows us to find all equilibrium strategies of the wiretapper that minimize the number of pure best responses of the hider. Among these strategies, we efficiently compute the unique strategy that maximizes the least punishment that the hider incurs for playing a pure strategy that is not a best response. Finally, we show that this unique strategy is the nucleolus of the recently studied simple cooperative spanning connectivity game.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

National Security on the Line

INTRODUCTION................................................................................... 409 I. FEDERAL WIRETAPPING LAWS: A SHORT HISTORY............ 412 II. EXTENDING CALEA --WHAT DOES LAW ENFORCEMENT WANT? .......................................................... 418 III. HOW DOES NETWORK-SWITCHING TECHNOLOGY WORK?..........................................................................

متن کامل

Security Analysis and Evaluation of Random Linear Network coding under Wiretapping Attack

This paper discussed the weak security of random linear network coding in wireless network in view of network coding weak security theory where the wiretapper can successfully obtain initial data and conditions threatening transmission security by decoding. The experiment results displayed, in wireless network, the relationship between decodes success probability of multi-node co-wiretapping, t...

متن کامل

Ethical Dilemma of Governmental Wiretapping

USA Government wiretapping activities is a very controversial issue. Undoubtedly this technology can assist law enforced authority to detect / identify unlawful or hostile activities; however, this task raises severe privacy concerns. In this paper, we have discussed this complex information technology issue of governmental wiretapping and how it effects both public and private liberties. Legis...

متن کامل

IXmaps - Tracking your personal data through the NSA's warrantless wiretapping sites

The National Security Agency’s ‘warrantless wiretapping program’ is arguably one of the largest domestic surveillance operations in history. It also represents among the most serious contemporary challenges to democratic governance and civil liberties. This paper reports on the development of the IXmaps interactive mapping application designed to show internet users how their personal traffic m...

متن کامل

Artificial Neural Networks as Analytic Tools in an ERP Study of Face Memory

Despite inquiry, the existence of early event-related potential (ERP) correlates of face memory has yet to be confirmed. We investigated the possibility that such correlates exist but cannot be reliably detected by linear analysis. We compared the abilities of artificial neural networks (ANN’s) and ANOVA in classifying ERP’s from right temporal areas elicited by recognized and novel faces. ANOV...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009