DocumentCode :
1661306
Title :
Multiagent Communication Security in Adversarial Settings
Author :
Okamoto, Steven ; Paruchuri, Praveen ; Wang, Yonghong ; Sycara, Katia ; Marecki, Janusz ; Srivatsa, Mudhakar
Author_Institution :
Comput. Sci. Dept., Carnegie Mellon Univ., Pittsburgh, PA, USA
Volume :
2
fYear :
2011
Firstpage :
296
Lastpage :
303
Abstract :
In many exciting multiagent applications - including future battlefields, law enforcement, and commerce - agents must communicate in inherently or potentially hostile environments in which an adversaries disrupt or intercept the communication between agents for malicious purposes, but the wireless ad hoc networks often proposed for these applications are particularly susceptible to attack. Intelligent agents must balance network performance with possible harm suffered from an adversary´s attack, while accounting for the broadcast nature of their communication and heterogenous vulnerabilities of communication links. Furthermore, they must do so when the adversary is also actively and rationally attempting to counter their efforts. We address this challenge in this paper by representing the problem as a game between a sender agent choosing communication paths through a network and an adversary choosing nodes and links to attack. We introduce a network-flow-based approach for compactly representing the competing objectives of network performance and security from adversary attack, and provide a polynomial-time algorithm for finding the equilibrium strategy for the sender. Through empirical evaluation we show how this technique improves upon existing approaches.
Keywords :
ad hoc networks; computational complexity; game theory; multi-agent systems; telecommunication computing; telecommunication security; adversarial settings; adversary attack; intelligent agents; malicious purposes; multiagent communication security; network performance; network security game; network-flow-based approach; polynomial-time algorithm; wireless ad hoc networks; Batteries; Game theory; Games; Jamming; Matrix decomposition; Routing; Security; communication security; multiagent communication; network security game; zero-sum game;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Web Intelligence and Intelligent Agent Technology (WI-IAT), 2011 IEEE/WIC/ACM International Conference on
Conference_Location :
Lyon
Print_ISBN :
978-1-4577-1373-6
Electronic_ISBN :
978-0-7695-4513-4
Type :
conf
DOI :
10.1109/WI-IAT.2011.252
Filename :
6040793
Link To Document :
بازگشت