Skip to main content

Game Theory for Security

  • 366 Accesses

Abstract

Game theory provides a mature mathematical foundation for making security decisions in a principled manner. Security games help formalizing security problems and decisions using quantitative models. The resulting analytical frameworks lead to better allocation of limited resources and result in more informed responses to security problems in complex systems and organizations. The game-theoretic approach to security is applicable to a wide variety of systems and critical infrastructures such as electricity, water, financial services, and communication networks.

This is a preview of subscription content, log in via an institution.

References

  • Alpcan T, Başar T (2011) Network security: a decision and game theoretic approach. Cambridge University Press, Cambridge, UK. http://www.tansu.alpcan.org/book.php

  • Alpcan T, Buttyan L, Baras J (eds) (2010) Proceedings of the first international conference on decision and game theory for security, GameSec 2010, Berlin, 22–23 Nov 2010. Lecture notes in computer science, vol 6442. Springer, Berlin/Heidelberg. doi:10.1007/978-3-642-17197-0

    Google Scholar 

  • Altman E, Başar T, Kavitha V (2010) Adversarial control in a delay tolerant network. In: Alpcan T, Buttyán L, Baras J (eds) Decision and game theory for security. Lecture notes in computer science, vol 6442. Springer, Berlin/Heidelberg, pp 87–106. http://dx.doi.org/10.1007/978-3-642-17197-0_6, 10.1007/978-3-642-17197-0_6

  • Baras J, Katz J, Altman E (eds) (2011) Proceedings of the second international conference on decision and game theory for security, GameSec 2011, College Park, 14–15 Nov 2011. Lecture notes in computer science, vol 7037. Springer, Berlin/Heidelberg. doi:10.1007/978-3-642-25280-8

    Google Scholar 

  • Buttyan L, Hubaux JP (2008) Security and cooperation in wireless networks. Cambridge University Press, Cambridge. http://secowinet.epfl.ch

  • Chorppath AK, Alpcan T (2011) Adversarial behavior in network mechanism design. In: Proceedings of the of 4th international workshop on game theory in communication networks (Gamecomm), ENS, Cachan

    Google Scholar 

  • Grossklags J, Walrand JC (eds) (2012) Proceedings of the third international conference on decision and game theory for security, GameSec 2012, Budapest, 5–6 Nov 2012. Lecture notes in computer science, vol 7638. Springer

    Google Scholar 

  • Gueye A, Walrand J, Anantharam V (2010) Design of network topology in an adversarial environment. In: Alpcan T, Buttyán L, Baras J (eds) Decision and game theory for security. Lecture notes in computer science, vol 6442. Springer, Berlin/Heidelberg, pp 1–20. http://dx.doi.org/10.1007/978-3-642-17197-0_1, 10.1007/978-3-642-17197-0_1

  • Guikema SD (2009) Game theory models of intelligent actors in reliability analysis: an overview of the state of the art. In: Bier VM, Azaiez MN (eds) Game theoretic risk analysis of security threats, Springer, New York, pp 1–19. doi:10.1007/978-0-387-87767-9

    Google Scholar 

  • Kantarcioglu M, Bensoussan A, Hoe S (2011) Investment in privacy-preserving technologies under uncertainty. In: Baras J, Katz J, Altman E (eds) Decision and game theory for security. Lecture notes in computer science, vol 7037. Springer, Berlin/Heidelberg, pp 219–238. http://dx.doi.org/10.1007/978-3-642-25280-8_17, 10.1007/978-3-642-25280-8_17

  • Kashyap A, Başar T, Srikant R (2004) Correlated jamming on MIMO Gaussian fading channels. IEEE Trans Inf Theory 50(9):2119–2123. doi:10.1109/TIT.2004.833358

    Article  Google Scholar 

  • Kodialam M, Lakshman TV (2003) Detecting network intrusions via sampling: a game theoretic approach. In: Proceedings of 22nd IEEE conference on computer communications (Infocom), San Fransisco, vol 3, pp 1880–1889

    Google Scholar 

  • Law YW, Alpcan T, Palaniswami M (2012) Security games for voltage control in smart grid. In: 50th annual Allerton conference on communication, control, and computing (Allerton 2012), Monticello, IL, USA, pp 212–219. doi:10.1109/Allerton.2012.6483220

    Google Scholar 

  • Manshaei MH, Zhu Q, Alpcan T, Başar T, Hubaux JP (2013) Game theory meets network security and privacy. ACM Comput Surv 45(3):25:1–25:39. doi:10.1145/2480741.2480742, http://doi.acm.org/10.1145/2480741.2480742

  • Miura-Ko RA, Yolken B, Bambos N, Mitchell J (2008) Security investment games of interdependent organizations. In: 46th annual Allerton conference, Monticello, IL, USA

    Google Scholar 

  • Mounzer J, Alpcan T, Bambos N (2010) Dynamic control and mitigation of interdependent IT security risks. In: Proceedings of the IEEE conference on communication (ICC), Cape Town. IEEE Communications Society

    Google Scholar 

  • Roth A (2008) The price of malice in linear congestion games. In: WINE ’08: proceedings of the 4th international workshop on internet and network economics, Shanghai, pp 118–125

    Google Scholar 

  • Tambe M (2011) Security and game theory: algorithms, deployed systems, lessons learned. Cambridge University Press, New York, NY, USA. http://books.google.com.au/books?id=hjjkJ7u209YC

  • Zander J (1990) Jamming games in slotted Aloha packet radio networks. In: IEEE military communications conference (MILCOM), Morleley, vol 2, pp 830–834. doi:10.1109/MILCOM.1990.117531

    Google Scholar 

  • Zhang N, Yu W, Fu X, Das S (2010) gPath: a game-theoretic path selection algorithm to protect Tor’s anonymity. In: Alpcan T, Buttyán L, Baras J (eds) Decision and game theory for security. Lecture notes in computer science, vol 6442. Springer, Berlin/Heidelberg, pp 58–71. http://dx.doi.org/10.1007/978-3-642-17197-0_4, 10.1007/978-3-642-17197-0_4

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tansu Alpcan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this entry

Cite this entry

Alpcan, T. (2013). Game Theory for Security. In: Baillieul, J., Samad, T. (eds) Encyclopedia of Systems and Control. Springer, London. https://doi.org/10.1007/978-1-4471-5102-9_37-1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-5102-9_37-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, London

  • Online ISBN: 978-1-4471-5102-9

  • eBook Packages: Springer Reference EngineeringReference Module Computer Science and Engineering

Publish with us

Policies and ethics

Chapter history

  1. Latest

    Game Theory for Security
    Published:
    10 September 2019

    DOI: https://doi.org/10.1007/978-1-4471-5102-9_37-2

  2. Original

    Game Theory for Security
    Published:
    28 February 2014

    DOI: https://doi.org/10.1007/978-1-4471-5102-9_37-1