- ISSN: 1796-2021 (Online); 2374-4367 (Print)
- Abbreviated Title: J. Commun.
- Frequency: Bimonthly
- DOI: 10.12720/jcm
- Abstracting/Indexing: Scopus, CNKI, EBSCO,
- DBLP, Google Scholar, etc.
- E-mail questions or comments to editor@jocm.us
- Acceptance Rate: 27%
- APC: 800 USD
- Average Days to Accept: 88 days
Home > Published Issues > 2012 > Volume 7, No. 6, June 2012 >
Surviving in Cyberspace: A Game Theoretic Approach
2. Syracuse University, Syracuse, NY 13244, USA
Abstract—As information systems become ever more complex and the interdependence of these systems increases, a mission-critical system should have the fight-through ability to sustain damage yet survive with mission assurance in cyberspace. To satisfy this requirement, in this paper we propose a game theoretic approach to binary voting with a weighted majority to aggregate observations among replicated nodes. Nodes are of two types: they either vote truthfully or are malicious and thus lie. Voting is
strategically performed based on a node’s belief about the
percentage of compromised nodes in the system. Voting is cast as a stage game model that is a Bayesian Zero-sum game. In the resulting Bayesian Nash equilibrium, if more than a critical proportion of nodes are compromised, their collective decision is only 50% reliable; therefore, no information is obtained from voting. We overcome this by formalizing a repeated game model that guarantees a highly reliable decision process even though nearly all nodes are compromised. A survival analysis is performed to derive the total time of mission survival for both a one-shot game and the repeated game. Mathematical proofs and simulations support our model.
Index Terms— Bayesian game, binary voting, cyberspace, fault-tolerant networks, fight-through, network security, survivability
Cite:Charles A. Kamhoua, Kevin A. Kwiat, and Joon S. Park
, "Surviving in Cyberspace: A Game Theoretic Approach," Journal of Communications, vol. 7, no.6, pp.436-450, 2012. Doi: 10.4304/jcm.7.6.436-450