Anonymity under flow insertion: A game theoretic approach

P. Venkitasubramaniam
{"title":"Anonymity under flow insertion: A game theoretic approach","authors":"P. Venkitasubramaniam","doi":"10.1109/MILCOM.2010.5680085","DOIUrl":null,"url":null,"abstract":"The problem of anonymous wireless networking is considered when an adversary is capable of controlling a subset of routes in the network. For a desired quality-of-service (QoS), as measured by network throughput, the problem of maximizing anonymity is studied from a game-theoretic perspective. Anonymity is quantified using conditional entropy of the routes given the adversary's observation. The problem of optimizing anonymity is posed as a two player zero-sum game between the network designer and the adversary; the task of the adversary is to choose a subset of flows to control so that anonymity of routes is minimum whereas the task of the network designer is to maximize anonymity by choosing a subset of nodes to evade flow detection by generating independent transmission schedules. It is shown that a unique Nash equilibrium exists for the game in the class of randomized strategies. The Nash equilibrium conditions are then used to derive properties of the optimal strategies of the network designer and the adversary.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.2010.5680085","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The problem of anonymous wireless networking is considered when an adversary is capable of controlling a subset of routes in the network. For a desired quality-of-service (QoS), as measured by network throughput, the problem of maximizing anonymity is studied from a game-theoretic perspective. Anonymity is quantified using conditional entropy of the routes given the adversary's observation. The problem of optimizing anonymity is posed as a two player zero-sum game between the network designer and the adversary; the task of the adversary is to choose a subset of flows to control so that anonymity of routes is minimum whereas the task of the network designer is to maximize anonymity by choosing a subset of nodes to evade flow detection by generating independent transmission schedules. It is shown that a unique Nash equilibrium exists for the game in the class of randomized strategies. The Nash equilibrium conditions are then used to derive properties of the optimal strategies of the network designer and the adversary.
流插入下的匿名:一个博弈论方法
当攻击者能够控制网络中的路由子集时,就会考虑匿名无线网络的问题。从博弈论的角度研究了以网络吞吐量为度量标准的期望服务质量(QoS)的匿名最大化问题。匿名性是量化使用条件熵的路由给定对手的观察。优化匿名性的问题是网络设计者和对手之间的两方零和博弈;攻击者的任务是选择一个流的子集来控制,使路由的匿名性最小,而网络设计者的任务是通过选择一个节点的子集来通过生成独立的传输调度来逃避流量检测,从而使匿名性最大化。证明了在随机化策略类中,该博弈存在唯一的纳什均衡。然后利用纳什均衡条件推导出网络设计者和对手的最优策略的性质。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信