Abstract
We study the strategic interaction between a network manager whose goal is to choose (as communication infrastructure) a spanning tree of a network given as an undirected graph, and an attacker who is capable of attacking a link in the network. We model their interaction as a zero-sum game and discuss a particular set of Nash equilibria. More specifically, we show that there always exists a Nash equilibrium under which the attacker targets a critical set of links. A set of links is called critical if it has maximum vulnerability, and the vulnerability of a set of links is defined as the minimum fraction of links the set has in common with a spanning tree. Using simple examples, we discuss the importance of critical subsets in the design of networks that are aimed to be robust against attackers. Finally, an algorithm is provided, to compute a critical subset of a given graph.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Awerbuch, B., Richa, A., Scheideler, C.: A Jamming-Resistant MAC Protocol for Single-Hop Wireless Networks. In: PODC 2008: Proceedings of the 27th ACM Symposium on Principles of Distributed Computing, pp. 45–54 (2008)
Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press, Cambridge (March 2004)
Catlin, P.A., Lai, H.-J., Shao, Y.: Edge-Connectivity and Edge-Disjoint Spanning Trees. Discrete Mathematics 309(5), 1033–1040 (2009)
Chopra, S.: On the Spanning Tree Polyhedron. Operations Research Letters 8(1), 25–29 (1989)
Commander, C.W., Pardalos, P.M., Ryabchenko, V., Uryasev, S., Zrazhevsky, G.: The Wireless Network Jamming Problem. J. Comb. Optim. 14(4), 481–498 (2007)
Cordovil, R., Fukuda, K., Moreira, M.L.: Clutters and Matroids. Discrete Math. 89(2), 161–171 (1991)
Cornuejols, G.: Combinatorial Optimization: Packing and Covering. Society for Industrial and Applied Mathematics, Philadelphia, PA, USA (2001)
Cunningham, W.H.: Optimal Attack and Reinforcement of a Network. J. ACM 32(3), 549–561 (1985)
Edmonds, J., Fulkerson, D.R.: Bottleneck Extrema. Journal of Combinatorial Theory (8), 299–306 (1970)
Fulkerson, D.R.: Blocking and Anti-Blocking Pairs of Polyhedra. Math. Programming (1), 168–194 (1971)
Gueye, A., Walrand, J.C., Anantharam, V.: Understanding the Design of Network Topology in Adversarial Environment (2010), http://www.eecs.berkeley.edu/~agueye/index.html
Gupta, A., Kumar, A., Pal, M., Roughgarden, T.: Approximation Via Cost-Sharing: A Simple Approximation Algorithm for the Multicommodity Rent-or-Buy Problem. J. ACMÂ 54(3), 11 (2007)
Gusfield, D.: Connectivity and Edge-Disjoint Spanning Trees. Information Processing Letters (16), 87–89 (1983)
Karger, D.R., Stein, C.: An o(n2) Algorithm for Minimum Cuts, New York, NY, USA, pp. 757–765 (1993)
Kruskal, J., Joseph, B.: On the Shortest Spanning Subtree of a Graph and the Traveling Salesman Problem. Proceedings of the American Mathematical Society 7(1), 48–50 (1956)
Fulkerson, D., Ford, L.: Flows in Networks, pp. 453–460. Princeton Univ. Press, Princeton (1962)
Matveev, A.O.: Maps on Posets, and Blockers. ArXiv Mathematics e-prints (November 2004)
Matveev, A.O.: On Blockers in Bounded Posets. Int. J. Math. Math. Sci. (26), 581–588
Nash-Williams, J.A.: Edge-Disjoint Spanning Trees of Finite Graphs. Journal London Math. Soc. (36), 445–450 (1961)
Prim, R.C.: Shortest Connection Networks and some Generalizations. Bell System Technology Journal 36, 1389–1401 (1957)
Robert, V.: Linear Programming: Foundations and Extensions. Springer, Heidelberg (2001)
Stoer, M., Wagner, F.: A simple min-cut algorithm. J. ACM 44(4), 585–591 (1997)
Tutte, W.T.: On the Problem of Decomposing a Graph into N Connected Factors. Journal of the London Mathematical Society (36), 221–230 (1961)
Neumann, J.v.: Zur Theorie der Gesellschaftspiele. Mathematische Annalen 100, 295–320 (1928)
Welsh, D.: Matroid Theory. Academic Press, New York (1976)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gueye, A., Walrand, J.C., Anantharam, V. (2010). Design of Network Topology in an Adversarial Environment. In: Alpcan, T., Buttyán, L., Baras, J.S. (eds) Decision and Game Theory for Security. GameSec 2010. Lecture Notes in Computer Science, vol 6442. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17197-0_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-17197-0_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17196-3
Online ISBN: 978-3-642-17197-0
eBook Packages: Computer ScienceComputer Science (R0)