Adversarial Behavior in Network Games

This paper studies the effects of and countermeasures against adversarial behavior in network resource allocation mechanisms such as auctions and pricing schemes. It models the heterogeneous behavior of users, which ranges from altruistic to selfish and to malicious, within the analytical framework of game theory. A mechanism design approach is adopted to quantify the effect of adversarial behavior, which ranges from extreme selfishness to destructive maliciousness. First, the well-known result on the Vicrey–Clarke–Groves (VCG) mechanism losing its efficiency property in the presence of malicious users is extended to the case of divisible resource allocation to motivate the need to quantify the effect of malicious behavior. Then, the Price of Malice of the VCG mechanism and of some other network mechanisms are derived. In this context, the dynamics and convergence properties of an iterative distributed pricing algorithm are analyzed. The resistance of a mechanism to collusions is investigated next, and the effect of collusion of some malicious users is quantified. Subsequently, the assumption that the malicious user has information about the utility function of selfish users is relaxed, and a regression-based iterative learning scheme is presented and applied to both pricing and auction mechanisms. Differentiated pricing as a method to counter adversarial behaviors is proposed and briefly discussed. The results obtained are illustrated with numerical examples and simulations.

[1]  Éva Tardos,et al.  The effect of collusion in congestion games , 2006, STOC '06.

[2]  Rayadurgam Srikant,et al.  The Mathematics of Internet Congestion Control , 2003 .

[3]  Nick Netzer,et al.  An Externality-Robust Auction: Theory and Experimental Evidence , 2014, Games Econ. Behav..

[4]  Eitan Altman,et al.  A Jamming Game in Wireless Networks with Transmission Cost , 2007, NET-COOP.

[5]  R.T. Maheswaran,et al.  Social welfare of selfish agents: motivating efficiency for divisible resources , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[6]  R. Aumann Correlated Equilibrium as an Expression of Bayesian Rationality Author ( s ) , 1987 .

[7]  Maria-Florina Balcan,et al.  Reducing mechanism design to algorithm design via machine learning , 2007, J. Comput. Syst. Sci..

[8]  Tansu Alpcan,et al.  A utility-based congestion control scheme for Internet-style networks with delay , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[9]  Eitan Altman,et al.  From Altruism to Non-Cooperation in Routing Games , 2008, ArXiv.

[10]  Gaurab Aryal,et al.  Is Collusion Proof Auction Expensive? Estimates from Highway Procurements , 2014 .

[11]  Christopher K. I. Williams,et al.  Gaussian Processes for Machine Learning (Adaptive Computation and Machine Learning) , 2005 .

[12]  Frank Kelly,et al.  Rate control for communication networks: shadow prices, proportional fairness and stability , 1998, J. Oper. Res. Soc..

[13]  Holger Boche,et al.  Pricing mechanisms for multi-carrier wireless systems , 2011, 2011 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).

[14]  Stefan Schmid,et al.  When selfish meets evil: byzantine players in a virus inoculation game , 2006, PODC '06.

[15]  Holger Boche,et al.  Mechanisms and Games for Dynamic Spectrum Allocation: Games and mechanisms for networked systems: incentives and algorithms* , 2013 .

[16]  John C. Harsanyi,et al.  Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..

[17]  Moshe Babaioff,et al.  Congestion games with malicious players , 2009, Games Econ. Behav..

[18]  Christos H. Papadimitriou,et al.  Worst-case equilibria , 1999 .

[19]  Silvio Micali,et al.  Collusive dominant-strategy truthfulness , 2012, J. Econ. Theory.

[20]  J. Morgan,et al.  The Spite Motive and Equilibrium Behavior in Auctions , 2003 .

[21]  John S. Baras,et al.  Game Theoretic Modeling of Malicious Users in Collaborative Networks , 2008, IEEE Journal on Selected Areas in Communications.

[22]  Po-An Chen,et al.  Altruism, selfishness, and spite in traffic routing , 2008, EC '08.

[23]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[24]  Michael L. Honig,et al.  Auction-Based Spectrum Sharing , 2006, Mob. Networks Appl..

[25]  J. Goodman Note on Existence and Uniqueness of Equilibrium Points for Concave N-Person Games , 1965 .

[26]  Rayadurgam Srikant,et al.  The Mathematics of Internet Congestion Control (Systems and Control: Foundations and Applications) , 2004 .

[27]  Tim Roughgarden The price of anarchy is independent of the network topology , 2003, J. Comput. Syst. Sci..

[28]  Srikrishna Bhashyam,et al.  A Convex Optimization Framework for Almost Budget Balanced Allocation of a Divisible Good , 2011, IEEE Transactions on Automation Science and Engineering.

[29]  John Musacchio,et al.  Unilateral altruism in network routing games with atomic players , 2011, International Conference on NETwork Games, Control and Optimization (NetGCooP 2011).

[30]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[31]  Tansu Alpcan,et al.  Nash equilibrium design and optimization , 2009, 2009 International Conference on Game Theory for Networks.

[32]  Gaurab Aryal,et al.  Estimating Revenue Under Collusion-Proof Auctions , 2012 .

[33]  S. Micali,et al.  Revenue in Truly Combinatorial Auctions and Adversarial Mechanism Design , 2007 .

[34]  John N. Tsitsiklis,et al.  Parallel and distributed computation , 1989 .

[35]  Eitan Altman,et al.  Revisiting collusion in routing games: A load balancing problem , 2011, International Conference on NETwork Games, Control and Optimization (NetGCooP 2011).

[36]  Tansu Alpcan,et al.  Network Security , 2010 .

[37]  Aaron Roth,et al.  The Price of Malice in Linear Congestion Games , 2008, WINE.

[38]  Tansu Alpcan,et al.  Learning user preferences in mechanism design , 2011, IEEE Conference on Decision and Control and European Control Conference.

[39]  H. Vincent Poor,et al.  Mechanisms and Games for Dynamic Spectrum Allocation: Preface , 2013 .

[40]  Holger Boche,et al.  A Unified Mechanism Design Framework for Networked Systems , 2010, ArXiv.

[41]  J. Harsanyi Games with Incomplete Information Played by 'Bayesian' Players, Part III. The Basic Probability Distribution of the Game , 1968 .

[42]  William Vickrey,et al.  Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .

[43]  John N. Tsitsiklis,et al.  Efficiency loss in a network resource allocation game: the case of elastic supply , 2005, IEEE Trans. Autom. Control..

[44]  Yoav Shoham,et al.  Spiteful Bidding in Sealed-Bid Auctions , 2007, IJCAI.

[45]  Tansu Alpcan,et al.  A globally stable adaptive congestion control scheme for Internet-style networks with delay , 2005, IEEE/ACM Transactions on Networking.

[46]  H. Moulin,et al.  Strategyproof sharing of submodular costs:budget balance versus efficiency , 2001 .