2015
DOI: 10.2139/ssrn.2631443
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Design and Defense of Networks Under Link Attacks

Abstract: Networks facilitate the exchange of goods and information and create benefits. We consider a network with n complementary nodes, i.e. nodes that need to be connected to generate a positive payoff. This network may face intelligent attacks on links. To study how the network should be designed and protected, we develop a strategic model inspired by Dziubiński and Goyal (2013) with two players: a Designer and an Adversary. First, the Designer forms costly protected and non-protected links. Then, the Adversary att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(14 citation statements)
references
References 29 publications
0
14
0
Order By: Relevance
“…Related Works: Security is a critical concern for infrastructure networks [3,4]. e method in our work is relevant to the recent advances in adversarial networks [5,6] and network formation games [7,8]. In particular, we jointly design the optimal protection and recovery strategies for infrastructure networks.…”
Section: Introductionmentioning
confidence: 99%
“…Related Works: Security is a critical concern for infrastructure networks [3,4]. e method in our work is relevant to the recent advances in adversarial networks [5,6] and network formation games [7,8]. In particular, we jointly design the optimal protection and recovery strategies for infrastructure networks.…”
Section: Introductionmentioning
confidence: 99%
“…Our approach is related to the recent advances in research on network formation [5], adversarial networks [6], [7], and network games [8], [9]. In particular, we address a heterogeneous multilayer network design problem and apply the framework to smart infrastructure networks.…”
Section: Introductionmentioning
confidence: 99%
“…Note that different cases corresponding to k 1 mod 2 = 0 or n 2 (k 2 + 1) mod 2 = 1 can be studied in a similar fashion as in our current context. The only difference is that for certain system parameters, s D 0 is not an optimal strategy comparing with s D n2−1 by following a similar analysis in [10]. Therefore, based on the above conditions, the scenarios that we analyze are quite general and conform with the situations in the adversarial IoT networks.…”
Section: Optimal Strategy and Construction Of Iot Networkmentioning
confidence: 96%
“…In this work, we investigate the secure design of IoT network by considering its connectivity measure [9], [10], [26], [27] through the lens of graph theory [28]. Comparing with the previous works [9], [10] that have focused on a single-layer adversarial network design, we model the IoT as a two-layer network and strategically design each layer of the network with heterogeneous security requirements. The current work is also related to the secure and resilient interdependent critical infrastructures [29]- [33] in which a holistic design approach is required.…”
Section: A Related Workmentioning
confidence: 99%