Game theory meets network security and privacy

Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Tamer Basar, Jean Pierre Hubaux

Research output: Contribution to journalArticle

Abstract

This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in addressing different forms of security and privacy problems in computer networks and mobile applications. We organize the presented works in six main categories: security of the physical and MAC layers, security of self-organizing networks, intrusion detection systems, anonymity and privacy, economics of network security, and cryptography. In each category, we identify security problems, players, and game models. We summarize the main results of selected works, such as equilibrium analysis and security mechanism designs. In addition, we provide a discussion on the advantages, drawbacks, and future direction of using game theory in this field. In this survey, our goal is to instill in the reader an enhanced understanding of different research approaches in applying gametheoretic methods to network security. This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking.

Original languageEnglish (US)
Article number25
JournalACM Computing Surveys
Volume45
Issue number3
DOIs
StatePublished - Jun 2013

Fingerprint

Network Security
Network security
Game theory
Game Theory
Privacy
Computer networks
Intrusion detection
Computer Networks
Telecommunication networks
Cryptography
Game
Economics
Equilibrium Analysis
Network Intrusion Detection
Mechanism Design
Mobile Applications
Anonymity
Self-organizing
Networking
Communication Networks

Keywords

  • Cryptography
  • Game theory
  • Intrusion detection system
  • Location privacy
  • Multiparty computation
  • Network security and privacy
  • Revocation
  • Wireless security

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Manshaei, M. H., Zhu, Q., Alpcan, T., Basar, T., & Hubaux, J. P. (2013). Game theory meets network security and privacy. ACM Computing Surveys, 45(3), [25]. https://doi.org/10.1145/2480741.2480742

Game theory meets network security and privacy. / Manshaei, Mohammad Hossein; Zhu, Quanyan; Alpcan, Tansu; Basar, Tamer; Hubaux, Jean Pierre.

In: ACM Computing Surveys, Vol. 45, No. 3, 25, 06.2013.

Research output: Contribution to journalArticle

Manshaei, MH, Zhu, Q, Alpcan, T, Basar, T & Hubaux, JP 2013, 'Game theory meets network security and privacy', ACM Computing Surveys, vol. 45, no. 3, 25. https://doi.org/10.1145/2480741.2480742
Manshaei, Mohammad Hossein ; Zhu, Quanyan ; Alpcan, Tansu ; Basar, Tamer ; Hubaux, Jean Pierre. / Game theory meets network security and privacy. In: ACM Computing Surveys. 2013 ; Vol. 45, No. 3.
@article{408f2a7ff32b46e98e2245ccd3e65f81,
title = "Game theory meets network security and privacy",
abstract = "This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in addressing different forms of security and privacy problems in computer networks and mobile applications. We organize the presented works in six main categories: security of the physical and MAC layers, security of self-organizing networks, intrusion detection systems, anonymity and privacy, economics of network security, and cryptography. In each category, we identify security problems, players, and game models. We summarize the main results of selected works, such as equilibrium analysis and security mechanism designs. In addition, we provide a discussion on the advantages, drawbacks, and future direction of using game theory in this field. In this survey, our goal is to instill in the reader an enhanced understanding of different research approaches in applying gametheoretic methods to network security. This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking.",
keywords = "Cryptography, Game theory, Intrusion detection system, Location privacy, Multiparty computation, Network security and privacy, Revocation, Wireless security",
author = "Manshaei, {Mohammad Hossein} and Quanyan Zhu and Tansu Alpcan and Tamer Basar and Hubaux, {Jean Pierre}",
year = "2013",
month = "6",
doi = "10.1145/2480741.2480742",
language = "English (US)",
volume = "45",
journal = "ACM Computing Surveys",
issn = "0360-0300",
publisher = "Association for Computing Machinery (ACM)",
number = "3",

}

TY - JOUR

T1 - Game theory meets network security and privacy

AU - Manshaei, Mohammad Hossein

AU - Zhu, Quanyan

AU - Alpcan, Tansu

AU - Basar, Tamer

AU - Hubaux, Jean Pierre

PY - 2013/6

Y1 - 2013/6

N2 - This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in addressing different forms of security and privacy problems in computer networks and mobile applications. We organize the presented works in six main categories: security of the physical and MAC layers, security of self-organizing networks, intrusion detection systems, anonymity and privacy, economics of network security, and cryptography. In each category, we identify security problems, players, and game models. We summarize the main results of selected works, such as equilibrium analysis and security mechanism designs. In addition, we provide a discussion on the advantages, drawbacks, and future direction of using game theory in this field. In this survey, our goal is to instill in the reader an enhanced understanding of different research approaches in applying gametheoretic methods to network security. This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking.

AB - This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in addressing different forms of security and privacy problems in computer networks and mobile applications. We organize the presented works in six main categories: security of the physical and MAC layers, security of self-organizing networks, intrusion detection systems, anonymity and privacy, economics of network security, and cryptography. In each category, we identify security problems, players, and game models. We summarize the main results of selected works, such as equilibrium analysis and security mechanism designs. In addition, we provide a discussion on the advantages, drawbacks, and future direction of using game theory in this field. In this survey, our goal is to instill in the reader an enhanced understanding of different research approaches in applying gametheoretic methods to network security. This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking.

KW - Cryptography

KW - Game theory

KW - Intrusion detection system

KW - Location privacy

KW - Multiparty computation

KW - Network security and privacy

KW - Revocation

KW - Wireless security

UR - http://www.scopus.com/inward/record.url?scp=84874284297&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84874284297&partnerID=8YFLogxK

U2 - 10.1145/2480741.2480742

DO - 10.1145/2480741.2480742

M3 - Article

VL - 45

JO - ACM Computing Surveys

JF - ACM Computing Surveys

SN - 0360-0300

IS - 3

M1 - 25

ER -