Wiretapping a Hidden Network
نویسندگان
چکیده
We consider the problem of maximizing the probability of hitting a strategically chosen hidden virtual network by placing a wiretap on a single link of a communication network. This can be seen as a twoplayer win-lose (zero-sum) game that we call the wiretap game. The value of this game is the greatest probability that the wiretapper can secure for hitting the virtual network. The value is shown to equal the reciprocal of the strength of the underlying graph. We efficiently compute a unique partition of the edges of the graph, called the prime-partition, and find the set of pure strategies of the hider that are best responses against every maxmin strategy of the wiretapper. Using these special pure strategies of the hider, which we call omniconnected-spanning-subgraphs, we define a partial order on the elements of the prime-partition. From the partial order, we obtain a linear number of simple two-variable inequalities that define the maxmin-polytope, and a characterization of its extreme points. Our definition of the partial order allows us to find all equilibrium strategies of the wiretapper that minimize the number of pure best responses of the hider. Among these strategies, we efficiently compute the unique strategy that maximizes the least punishment that the hider incurs for playing a pure strategy that is not a best response. Finally, we show that this unique strategy is the nucleolus of the recently studied simple cooperative spanning connectivity game.
منابع مشابه
National Security on the Line
INTRODUCTION................................................................................... 409 I. FEDERAL WIRETAPPING LAWS: A SHORT HISTORY............ 412 II. EXTENDING CALEA --WHAT DOES LAW ENFORCEMENT WANT? .......................................................... 418 III. HOW DOES NETWORK-SWITCHING TECHNOLOGY WORK?..........................................................................
متن کاملSecurity Analysis and Evaluation of Random Linear Network coding under Wiretapping Attack
This paper discussed the weak security of random linear network coding in wireless network in view of network coding weak security theory where the wiretapper can successfully obtain initial data and conditions threatening transmission security by decoding. The experiment results displayed, in wireless network, the relationship between decodes success probability of multi-node co-wiretapping, t...
متن کاملEthical Dilemma of Governmental Wiretapping
USA Government wiretapping activities is a very controversial issue. Undoubtedly this technology can assist law enforced authority to detect / identify unlawful or hostile activities; however, this task raises severe privacy concerns. In this paper, we have discussed this complex information technology issue of governmental wiretapping and how it effects both public and private liberties. Legis...
متن کاملIXmaps - Tracking your personal data through the NSA's warrantless wiretapping sites
The National Security Agency’s ‘warrantless wiretapping program’ is arguably one of the largest domestic surveillance operations in history. It also represents among the most serious contemporary challenges to democratic governance and civil liberties. This paper reports on the development of the IXmaps interactive mapping application designed to show internet users how their personal traffic m...
متن کاملArtificial Neural Networks as Analytic Tools in an ERP Study of Face Memory
Despite inquiry, the existence of early event-related potential (ERP) correlates of face memory has yet to be confirmed. We investigated the possibility that such correlates exist but cannot be reliably detected by linear analysis. We compared the abilities of artificial neural networks (ANN’s) and ANOVA in classifying ERP’s from right temporal areas elicited by recognized and novel faces. ANOV...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009