Abstract
In this paper we consider a dilemma that arises in bandwidth scanning problems associated with the design of agents’ scanning strategies based on the principle of rationality and the principle of insufficient reasons. On one hand, engaging tools that estimate a network’s parameters allows an agent to act rationally to maximize its payoff. On the other hand, utilizing such engagement incurs extra costs associated with scanning. In particular, if the agent does not employ such tools, then the involved expenses can be reduced, although such a strategy might also cause a reduction in detection probability since in such cases the agent has to design strategy based on the principle of insufficient reasons (also called principle of indifference). In this paper we model this dilemma as a non-zero sum stochastic game between two players (Scanner and Invader). The equilibrium is found in closed form in stationary strategies via solving the corresponding Shapley-Bellman equations, and its dependence on network parameters is illustrated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Anindya, I.C., Kantarcioglu, M.: Adversarial anomaly detection using centroid-based clustering. In: IEEE International Conference on Information Reuse and Integration (IRI), pp. 1–8 (2018)
Baston, V., Garnaev, A.: A search game with a protector. Nav. Res. Logist. 47, 85–96 (2000)
Belavagi, M.C., Muniyal, B.: Game theoretic approach towards intrusion detection. In: Proceedings of the International Conference on Inventive Computation Technologies (ICICT) (2016)
Calinescu, G., Kapoor, S., Qiao, K., Shin, J.: Stochastic strategic routing reduces attack effects. In: Proceedings of the IEEE Global Communications Conference (GLOBECOM), pp. 1–5 (2011)
Comaniciu, C., Mandayam, N.B., Poor, H.V.: A Wireless Networks Multiuser Detection in Cross-Layer Design. Springer, New York (2005). https://doi.org/10.1007/0-387-27750-1
Dambreville, F., Le Cadre, J.P.: Detection of a Markovian target with optimization of the search efforts under generalized linear constraints. Nav. Res. Logist. 49, 117–142 (2002)
Garnaev, A.: A remark on a helicopter and submarine game. Nav. Res. Logist. 40, 745–753 (1993)
Garnaev, A., Baykal-Gursoy, M., Poor, H.V.: A game theoretic analysis of secret and reliable communication with active and passive adversarial modes. IEEE Trans. Wireless Commun. 15, 2155–2163 (2016)
Garnaev, A., Hayel, Y., Altman, E., Avrachenkov, K.: Jamming game in a dynamic slotted ALOHA network. In: Jain, R., Kannan, R. (eds.) GameNets 2011. LNICST, vol. 75, pp. 429–443. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-30373-9_30
Garnaev, A., Trappe, W., Kung, C.T.: Dependence of optimal monitoring strategy on the application to be protected. In: Proceedings of the IEEE Global Communications Conference (GLOBECOM), pp. 1054–1059 (2012)
Garnaev, A., Trappe, W., Kung, C.-T.: Optimizing scanning strategies: selecting scanning bandwidth in adversarial RF environments. In: Proceedings of the 8th International Conference on Cognitive Radio Oriented Wireless Networks (Crowncom), pp. 148–153 (2013)
Guan, S., Wang, J., Jiang, C., Tong, J., Ren, Y.: Intrusion detection for wireless sensor networks: a multi-criteria game approach. In: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–6 (2018)
Jaynes, E.T.: Probability Theory: The Logic of Science. Cambridge University Press, New York (2003)
Koopman, B.: Search and Screening. General Principles with Historical Applications. Pergamon Press (1980)
Liu, S., Chen, Y., Trappe, W., Greenstein, L.J.: ALDO: an anomaly detection framework for dynamic spectrum access networks. In: Proceedings of the IEEE International Conference on Computer (INFOCOM), pp. 675–683 (2009)
Ma, Y., Cao, H., Ma, J.: The intrusion detection method based on game theory in wireless sensor network. In: Proceedings of the First IEEE International Conference on Ubi-Media Computing (2008)
Nguyen, K.C., Alpcan, T., Basar, T.: Stochastic games for security in networks with interdependent nodes. In: Proceedings of the International Conference on Game Theory for Network (GameNets), pp. 697–703 (2009)
Owen, G.: Game Theory. Academic Press, New York (1982)
Poongothai, T., Jayarajan, K.: A noncooperative game approach for intrusion detection in mobile adhoc networks. In: Proceedings of the International Conference on Computing, Communication and Networking (2008)
Sauder, D.W., Geraniotis, E.: Signal detection games with power constraints. IEEE Trans. Inf. Theory 40, 795–807 (1994)
Shen, S.: A game-theoretic approach for optimizing intrusion detection strategy in WSNs. In: Proceedings of the 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC) (2011)
Vamvoudakis, K.G., Hespanha, J.P., Sinopoli, B., Mo, Y.: Adversarial detection as a zero-sum game. In: Proceedings of the 51st IEEE Conference on Decision and Control (CDC), pp. 7133–7138 (2012)
Wang, B., Wu, Y., Liu, K.J.R., Clancy, T.C.: An anti-jamming stochastic game for cognitive radio networks. IEEE J. Sel. Areas Commun. 29, 877–889 (2011)
Wang, X., Feng, R., Wu, Y., Che, S., Ren, Y.: A game theoretic malicious nodes detection model in MANETs. In: Proceedings of the IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS), pp. 1–6 (2012)
Acknowledgement
This work was supported in part by the U.S. National Science Foundation under grants CNS-1909186 and ECCS-2128451.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
A Appendix
A Appendix
1.1 A.1 Proof of Lemma 1
First, note that (12), (14) and (15) imply (a) and (b).
By symmetry, function \(\sum _{i=1}^n\gamma _i \sum _{i=1}^n (1/\gamma _i)\) achieves its minimum at such \(\gamma _i\in [0,1]\), \(i=1,\ldots ,n\) that \(\gamma _1=\dots =\gamma _n\). Meanwhile,
This jointly with (13) and (16), imply that
Finally, (b) and (30) imply (18), and the result follows. \(\blacksquare \)
1.2 A.2 Proof of Theorem 1
By (6)–(9), we have that \((\mathbb {R},\mathbb {R})\) is equilibrium with \(v_S\) and \(v_I\) as the corresponding accumulated payoffs if and only if the following relations hold:
with
Solving (31) and (32) by \(v_S\) and \(v_I\), respectively, imply (19). Substituting \(v_S\) and \(v_I\) given by (19) into (33) and (34) imply (20). \(\blacksquare \)
1.3 A.3 Proof of Theorem 2
By (6)–(9), we have that \((\mathbb {I},\mathbb {I})\) with \(v_S\) and \(v_I\) as the corresponding accumulated payoffs if and only if the following relations hold:
with
Solving (35) and (36) by \(v_S\) and \(v_I\), respectively, imply (21). Substituting \(v_S\) and \(v_I\) given by (21) into (37) and (38) imply (22). \(\blacksquare \)
1.4 A.4 Proof of Theorem 3
By (6)–(9), we have that \((\mathbb {R},\mathbb {I})\) is an equilibrium with \(v_S\) and \(v_I\) as the corresponding accumulated payoffs if and only if the following relations hold:
with
Solving (39) and (40) by \(v_S\) and \(v_I\), respectively, imply (23). Substituting \(v_S\) and \(v_I\) given by (23) into (41) and (42) imply (24). \(\blacksquare \)
1.5 A.5 Proof of Theorem 4
By (6)–(9), we have that \((\mathbb {I},\mathbb {R})\) is an equilibrium with \(v_S\) and \(v_I\) as the corresponding accumulated payoffs if and only if the following relations hold:
with
Straightforward calculation based on (43)–(46) implies the result. \(\blacksquare \)
1.6 A.6 Proof of Theorem 5
(b) follows from (a) and Theorem 1–Theorem 4.
Let us now prove (a). First note that by (2) we have that
Assume that (20) and (22) hold simultaneously. Then, (47) and the second of inequalities (20) imply
Combining this inequality with the second of inequalities (20) imply
Meanwhile, by (47),
and
By (50) and (51), we have that
This contradicts to (49). Thus, conditions (20) and (22) cannot hold simultaneously.
The remaining pairs of conditions can be checked similarly. \(\blacksquare \)
1.7 A.7 Proof of Theorem 6
First note that there exists at least one equilibrium in stochastic game \(\varGamma ,\) since \(\varGamma \) is a recursive game with discount factor \(\delta \in (0,1)\) [18].
By proofs of Theorem 1–Theorem 4, it follows that if equilibrium is in pure strategies, then it is given by Theorem 1–Theorem 4, and one of four conditions (20), (22), (24) and (26) have to hold. Moreover, by Theorem 5, only one of these four conditions can hold, and (a) follows.
Thus, if none of the four conditions (20), (22), (24) and (26) holds then the equilibrium is in mixed strategies. By (6)–(9), we have that \(((x,\overline{x}),(y,\overline{y}))\) with \(x\in (0,1)\) and \(y\in (0,1)\) is an equilibrium with \(v_S\) and \(v_I\) as the corresponding accumulated payoffs if and only if the following relations hold:
and
Solving (53) by y implies the second of two Eqs. (28). Solving (54) by y, we have that
Substituting this y into the second of two Eqs. (28) and solving by \(v_S\) implies the first of two Eqs. (27).
Solving (55) by x implies the first of (28). Solving (56) by x implies
Substituting this x into the first of two Eqs. (28) and solving by \(v_I\) implies the second of two Eqs. (27). \(\blacksquare \)
Rights and permissions
Copyright information
© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Garnaev, A., Trappe, W. (2022). A Stochastic Bandwidth Scanning Game. In: Fang, F., Shu, F. (eds) Game Theory for Networks. GameNets 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 457. Springer, Cham. https://doi.org/10.1007/978-3-031-23141-4_18
Download citation
DOI: https://doi.org/10.1007/978-3-031-23141-4_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-23140-7
Online ISBN: 978-3-031-23141-4
eBook Packages: Computer ScienceComputer Science (R0)