Deception, identity, and security: the game theory of sybil attacks.
William CaseyAnsgar KellnerParisa MemarmoshrefiJose Andre MoralesBud MishraPublished in: Commun. ACM (2019)
Keyphrases
- game theory
- malicious users
- security threats
- security problems
- security mechanisms
- game theoretic
- computer security
- malicious nodes
- security vulnerabilities
- security measures
- cyber attacks
- security risks
- security protocols
- multi agent systems
- security issues
- cooperative
- java card
- countermeasures
- chosen plaintext
- mechanism design
- nash equilibrium
- denial of service attacks
- cryptographic protocols
- fictitious play
- information security
- statistical physics
- identity management
- resource allocation
- intrusion detection
- multi agent learning
- security requirements
- sensitive data
- incomplete information
- wireless sensor networks
- biometric template
- decision theory
- network security
- financial crisis
- nash equilibria
- cooperative game theory
- biometric data
- access control
- key management
- solution concepts
- belief propagation
- dos attacks