Abstract
To formulate a network security problem, Mavronicholas et al. [6] introduced a strategic game on an undirected graph whose nodes are exposed to infection by attackers, and whose edges are protected by a defender. Subsequently, MedSalem et al. [9] generalized the model so that they have many defenders instead of a single defender. Then in [1], we introduced a new network game with the roles of players interchanged, and obtained a graph-theoretic characterization of its pure Nash equilibria. In this paper we study mixed Nash equilibria for stochastic strategies in this new game, and then we generalize our network game to an asynchronous game, where two players repeatedly execute simultaneous games. Although the asynchronous game is formally an infinite game, we show that it has a stable solution by reducing it to a finite game.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ahmad Termimi, A.G., Tanaka, K.: Network Games with Many Attackers and Defenders. In: Proceedings of Research Institute for Mathematical Sciences (RIMS) Kôkyûroku, vol. 1729, pp. 146–151. Kyoto University (2011)
Blackwell, D.: Infinite G δ games with imperfect information. In: Zastosowania Matematyki Applicationes Mathematicae, Hugo Steinhaus Jubilee, vol. X, pp. 99–101 (1969)
Gelastou, M., Mavronicholas, M., Papadopoulou, V.G., Philippou, A., Spirakis, P.: The Power of the Defender. In: CD-ROM Proceedings of the 2nd International Workshop on Incentive-Based Computing (July 2006)
Hall, P.: On representatives of subsets. J. London Math. Soc. 10, 26–30 (1935)
Martin, D.A.: The determinacy of Blackwell games. Journal Symbolic Logic 63(4), 1565–1581 (1998)
Mavronicholas, M., Papadopoulou, V.G., Philippou, A., Spirakis, P.G.: A Network Game with Attacker and Protector Entities. In: Deng, X., Du, D.-Z. (eds.) ISAAC 2005. LNCS, vol. 3827, pp. 288–297. Springer, Heidelberg (2005)
Mavronicolas, M., Papadopoulou, V.G., Philippou, A., Spirakis, P.G.: A Graph-Theoretic Network Security Game. In: Deng, X., Ye, Y. (eds.) WINE 2005. LNCS, vol. 3828, pp. 969–978. Springer, Heidelberg (2005)
Mavronicolas, M., Michael, L., Papadopoulou, V.G., Philippou, A., Spirakis, P.G.: The Price of Defense. In: Královič, R., Urzyczyn, P. (eds.) MFCS 2006. LNCS, vol. 4162, pp. 717–728. Springer, Heidelberg (2006)
Ould-MedSalem, M., Manoussakis, Y., Tanaka, K.: A Game on Graphs with Many non-Centralized Defenders. In: 22nd European Conference on Operations Research (EURO XXII), Prague, July 8-11 (2007)
Nash, J.: Equilibrium Points in n-Person Games. Proceedings of the National Academy of Sciences 36, 48–49 (1950)
Nash, J.F.: Noncooperative Games. Annals of Maths 54, 286–295 (1951)
West, D.B.: Introduction to Graph Theory, 2nd edn. Prentice Hall (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ghani, A.T.A., Tanaka, K. (2011). Network Games with and without Synchroneity. In: Baras, J.S., Katz, J., Altman, E. (eds) Decision and Game Theory for Security. GameSec 2011. Lecture Notes in Computer Science, vol 7037. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25280-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-25280-8_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25279-2
Online ISBN: 978-3-642-25280-8
eBook Packages: Computer ScienceComputer Science (R0)