Applications of group testing to security decision-making in networks

Sadegh Bolouki, Donya G. Dobakhshari, Tamer Basar, Vijay Gupta, Angelia Nedich

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper presents a group testing approach toward a security decision-making problem. We consider a game model for a network of firms where each firm decides to invest some amount, viewed as its action, on its security. The utility functions are then defined in such a way to capture the interdependent structure of the network. We propose and analyze two algorithms for the firms to update their investments based on incomplete information they receive at any given stage of the game. This so-called incomplete information, which is provided by an independent entity, is the outcome of a (security) test performed on a selected group of firms rather than a single firm due to privacy concerns. Our arguments finally lead to a number of fundamental group testing problems which are inherently different from the classical group testing problem and its alternative versions.

Original languageEnglish (US)
Title of host publication2017 IEEE 56th Annual Conference on Decision and Control, CDC 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2929-2934
Number of pages6
ISBN (Electronic)9781509028733
DOIs
StatePublished - Jun 28 2017
Event56th IEEE Annual Conference on Decision and Control, CDC 2017 - Melbourne, Australia
Duration: Dec 12 2017Dec 15 2017

Publication series

Name2017 IEEE 56th Annual Conference on Decision and Control, CDC 2017
Volume2018-January

Other

Other56th IEEE Annual Conference on Decision and Control, CDC 2017
Country/TerritoryAustralia
CityMelbourne
Period12/12/1712/15/17

ASJC Scopus subject areas

  • Decision Sciences (miscellaneous)
  • Industrial and Manufacturing Engineering
  • Control and Optimization

Fingerprint

Dive into the research topics of 'Applications of group testing to security decision-making in networks'. Together they form a unique fingerprint.

Cite this