Visible to the public Game Theory Meets Network Security and PrivacyConflict Detection Enabled

TitleGame Theory Meets Network Security and Privacy
Publication TypeJournal Article
Year of Publication2013
AuthorsMohammad Hossein Manshaei, Isfahan University of Technology, Quanyan Zhu, University of Illinois at Urbana-Champaign, Tansu Alpcan, University of Melbourne, Tamer Başar, University of Illinois at Urbana-Champaign, Jean-Pierre Hubaux, Ecole Polytechnique Federal de Lausanne
JournalACM Computing Surveys
Volume45
Issue3
Pagination06/2013
Keywordscryptography, game theory, intrusion detection system, location privacy, multiparty computation, network security and privacy, NSA SoS Lablets Materials, revocation, science of security, Toward a Theory of Resilience in Systems: A Game-Theoretic Approach, UIUC, wireless security
Abstract

This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in addressing different forms of security and privacy problems in computer networks and mobile applications. We organize the presented works in six main categories: security of the physical and MAC layers, security of self-organizing networks, intrusion detection systems, anonymity and privacy, economics of network security, and cryptography. In each category, we identify security problems, players, and game models. We summarize the main results of selected works, such as equilibrium analysis and security mechanism designs. In addition, we provide a discussion on the advantages, drawbacks, and future direction of using game theory in this field. In this survey, our goal is to instill in the reader an enhanced understanding of different research approaches in applying gametheoretic methods to network security. This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking.

Citation Keynode-32232

Other available formats:

Game Theory Meets Network Security and Privacy
AttachmentSize
bytes