Skip to main content

Network Games with and without Synchroneity

  • Conference paper
Decision and Game Theory for Security (GameSec 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7037))

Included in the following conference series:

Abstract

To formulate a network security problem, Mavronicholas et al. [6] introduced a strategic game on an undirected graph whose nodes are exposed to infection by attackers, and whose edges are protected by a defender. Subsequently, MedSalem et al. [9] generalized the model so that they have many defenders instead of a single defender. Then in [1], we introduced a new network game with the roles of players interchanged, and obtained a graph-theoretic characterization of its pure Nash equilibria. In this paper we study mixed Nash equilibria for stochastic strategies in this new game, and then we generalize our network game to an asynchronous game, where two players repeatedly execute simultaneous games. Although the asynchronous game is formally an infinite game, we show that it has a stable solution by reducing it to a finite game.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ahmad Termimi, A.G., Tanaka, K.: Network Games with Many Attackers and Defenders. In: Proceedings of Research Institute for Mathematical Sciences (RIMS) Kôkyûroku, vol. 1729, pp. 146–151. Kyoto University (2011)

    Google Scholar 

  2. Blackwell, D.: Infinite G δ games with imperfect information. In: Zastosowania Matematyki Applicationes Mathematicae, Hugo Steinhaus Jubilee, vol. X, pp. 99–101 (1969)

    Google Scholar 

  3. Gelastou, M., Mavronicholas, M., Papadopoulou, V.G., Philippou, A., Spirakis, P.: The Power of the Defender. In: CD-ROM Proceedings of the 2nd International Workshop on Incentive-Based Computing (July 2006)

    Google Scholar 

  4. Hall, P.: On representatives of subsets. J. London Math. Soc. 10, 26–30 (1935)

    MATH  Google Scholar 

  5. Martin, D.A.: The determinacy of Blackwell games. Journal Symbolic Logic 63(4), 1565–1581 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  6. Mavronicholas, M., Papadopoulou, V.G., Philippou, A., Spirakis, P.G.: A Network Game with Attacker and Protector Entities. In: Deng, X., Du, D.-Z. (eds.) ISAAC 2005. LNCS, vol. 3827, pp. 288–297. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Mavronicolas, M., Papadopoulou, V.G., Philippou, A., Spirakis, P.G.: A Graph-Theoretic Network Security Game. In: Deng, X., Ye, Y. (eds.) WINE 2005. LNCS, vol. 3828, pp. 969–978. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. Mavronicolas, M., Michael, L., Papadopoulou, V.G., Philippou, A., Spirakis, P.G.: The Price of Defense. In: Královič, R., Urzyczyn, P. (eds.) MFCS 2006. LNCS, vol. 4162, pp. 717–728. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  9. Ould-MedSalem, M., Manoussakis, Y., Tanaka, K.: A Game on Graphs with Many non-Centralized Defenders. In: 22nd European Conference on Operations Research (EURO XXII), Prague, July 8-11 (2007)

    Google Scholar 

  10. Nash, J.: Equilibrium Points in n-Person Games. Proceedings of the National Academy of Sciences 36, 48–49 (1950)

    Article  MATH  MathSciNet  Google Scholar 

  11. Nash, J.F.: Noncooperative Games. Annals of Maths 54, 286–295 (1951)

    Article  MATH  MathSciNet  Google Scholar 

  12. West, D.B.: Introduction to Graph Theory, 2nd edn. Prentice Hall (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ghani, A.T.A., Tanaka, K. (2011). Network Games with and without Synchroneity. In: Baras, J.S., Katz, J., Altman, E. (eds) Decision and Game Theory for Security. GameSec 2011. Lecture Notes in Computer Science, vol 7037. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25280-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25280-8_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25279-2

  • Online ISBN: 978-3-642-25280-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics