4.7 Article

Game Theory Meets Network Security and Privacy

期刊

ACM COMPUTING SURVEYS
卷 45, 期 3, 页码 -

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.1145/2480741.2480742

关键词

Algorithms; Design; Economics; Security; Theory; Game theory; network security and privacy; intrusion detection system; location privacy; revocation; wireless security; cryptography; multiparty computation

资金

  1. National Security Agency (NSA) through the Information Trust Institute of the University of Illinois

向作者/读者索取更多资源

This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in addressing different forms of security and privacy problems in computer networks and mobile applications. We organize the presented works in six main categories: security of the physical and MAC layers, security of self-organizing networks, intrusion detection systems, anonymity and privacy, economics of network security, and cryptography. In each category, we identify security problems, players, and game models. We summarize the main results of selected works, such as equilibrium analysis and security mechanism designs. In addition, we provide a discussion on the advantages, drawbacks, and future direction of using game theory in this field. In this survey, our goal is to instill in the reader an enhanced understanding of different research approaches in applying game-theoretic methods to network security. This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据