Analyzing Incentives for Protocol Compliance in Complex Domains: A Case Study of Introduction-Based Routing

Formal analyses of incentives for compliance with network protocols often appeal to gametheoretic models and concepts. Applications of game-theoretic analysis to network security have generally been limited to highly stylized models, where simplified environments enable tractable study of key strategic variables. We propose a simulation-based approach to gametheoretic analysis of protocol compliance, for scenarios with large populations of agents and large policy spaces. We define a general procedure for systematically exploring a structured policy space, directed expressly to resolve the qualitative classification of equilibrium behavior as compliant or non-compliant. The techniques are illustrated and exercised through an extensive case study analyzing compliance incentives for introduction-based routing. We find that the benefits of complying with the protocol are particularly strong for nodes subject to attack, and the overall compliance level achieved in equilibrium, while not universal, is sufficient to support the desired security goals of the protocol.

[1]  Lin Chen,et al.  Selfishness, Not Always A Nightmare: Modeling Selfish MAC Behaviors in Wireless Mobile Ad Hoc Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[2]  V. Georgiev Using Game Theory to Analyze Wireless Ad Hoc Networks . ” , 2008 .

[3]  Yoav Shoham,et al.  Essentials of Game Theory: A Concise Multidisciplinary Introduction , 2008, Essentials of Game Theory: A Concise Multidisciplinary Introduction.

[4]  Jens Grossklags,et al.  Ad-blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance , 2012, WEIS.

[5]  Colin Camerer Behavioral Game Theory: Experiments in Strategic Interaction , 2003 .

[6]  Michael P. Wellman,et al.  Incentivizing Responsible Networking via Introduction-Based Routing , 2011, TRUST.

[7]  Walid Saad,et al.  Game Theory in Wireless and Communication Networks: Applications of game theory in communications and networking , 2011 .

[8]  Simon Parsons,et al.  A novel method for automatic strategy acquisition in N-player non-zero-sum games , 2006, AAMAS '06.

[9]  Maxim Raya,et al.  Security Games in Online Advertising: Can Ads Help Secure the Web? , 2010, WEIS.

[10]  Peter McBurney,et al.  Evolutionary mechanism design: a review , 2010, Autonomous Agents and Multi-Agent Systems.

[11]  Paul W. Goldberg,et al.  Learning equilibria of games via payoff queries , 2013, EC '13.

[12]  Michael P. Wellman,et al.  Methods for empirical game-theoretic analysis (extended abstract) , 2006 .

[13]  Zhu Han,et al.  Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .

[14]  Allen B. MacKenzie,et al.  Using game theory to analyze wireless ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[15]  Ashish Sureka,et al.  Using tabu best-response search to find pure strategy nash equilibria in normal form games , 2005, AAMAS '05.

[16]  Richard Al-Bayaty,et al.  On optimal decisions in an introduction-based reputation protocol , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[17]  Michael P. Wellman,et al.  Approximate Strategic Reasoning through Hierarchical Reduction of Large Symmetric Games , 2005, AAAI.

[18]  Saurabh Ganeriwal,et al.  On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[19]  Rajarshi Das,et al.  Choosing Samples to Compute Heuristic-Strategy Nash Equilibrium , 2003, AMEC.

[20]  Michael P. Wellman,et al.  Searching for approximate equilibria in empirical games , 2008, AAMAS.

[21]  Michael P. Wellman,et al.  EGTAOnline: An Experiment Manager for Simulation-Based Game Studies , 2012, MABS.

[22]  Michael P. Wellman,et al.  Strategy exploration in empirical games , 2010, AAMAS.

[23]  Chase Qishi Wu,et al.  A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[24]  Nicolas Christin,et al.  Secure or insure?: a game-theoretic analysis of information security games , 2008, WWW.

[25]  Michael P. Wellman,et al.  Stronger CDA strategies through empirical game-theoretic analysis and reinforcement learning , 2009, AAMAS.