2018
DOI: 10.1109/tcns.2017.2728202
|View full text |Cite
|
Sign up to set email alerts
|

A Centrality-Based Security Game for Multihop Networks

Abstract: Abstract-We formulate a network security problem as a zero-sum game between an attacker who tries to disrupt a network by disabling one or more nodes, and the nodes of the network who must allocate limited resources in defense of the network. The utility of the zero-sum game can be one of several network performance metrics that correspond to node centrality measures. We first present a fast centralized algorithm that uses a monotone property of the utility function to compute saddle-point equilibrium strategi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(1 citation statement)
references
References 34 publications
0
1
0
Order By: Relevance
“…Physical layer SKG techniques offer several advantages as compared to traditional SKG algorithms, for instance, Diffie–Hellman protocol [16]. For example, the physical layer SKG does not need any computationally bounded adversary as it is based on channel randomness.…”
Section: Introductionmentioning
confidence: 99%
“…Physical layer SKG techniques offer several advantages as compared to traditional SKG algorithms, for instance, Diffie–Hellman protocol [16]. For example, the physical layer SKG does not need any computationally bounded adversary as it is based on channel randomness.…”
Section: Introductionmentioning
confidence: 99%