TY - JOUR
T1 - Convergence analysis of Iterated Best Response for a trusted computation game
AU - Bopardikar, Shaunak D.
AU - Speranzon, Alberto
AU - Langbort, Cédric
N1 - Publisher Copyright:
© 2016 Elsevier Ltd
PY - 2017/4/1
Y1 - 2017/4/1
N2 - We introduce a game of trusted computation in which a sensor equipped with limited computing power leverages a central computer to evaluate a specified function over a large dataset, collected over time. We assume that the central computer can be under attack and we propose a strategy where the sensor retains a limited amount of the data to counteract the effect of attack. We formulate the problem as a two player game in which the sensor (defender) chooses an optimal fusion strategy using both the non-trusted output from the central computer and locally stored trusted data. The attacker seeks to compromise the computation by influencing the fused value through malicious manipulation of the data stored on the central computer. We first characterize all Nash equilibria of this game, which turn out to be dependent on parameters known to both players. Next we adopt an Iterated Best Response (IBR) scheme in which, at each iteration, the central computer reveals its output to the sensor, who then computes its best response based on a linear combination of its private local estimate and the untrusted third-party output. We characterize necessary and sufficient conditions for convergence of the IBR along with numerical results which show that the convergence conditions are relatively tight.
AB - We introduce a game of trusted computation in which a sensor equipped with limited computing power leverages a central computer to evaluate a specified function over a large dataset, collected over time. We assume that the central computer can be under attack and we propose a strategy where the sensor retains a limited amount of the data to counteract the effect of attack. We formulate the problem as a two player game in which the sensor (defender) chooses an optimal fusion strategy using both the non-trusted output from the central computer and locally stored trusted data. The attacker seeks to compromise the computation by influencing the fused value through malicious manipulation of the data stored on the central computer. We first characterize all Nash equilibria of this game, which turn out to be dependent on parameters known to both players. Next we adopt an Iterated Best Response (IBR) scheme in which, at each iteration, the central computer reveals its output to the sensor, who then computes its best response based on a linear combination of its private local estimate and the untrusted third-party output. We characterize necessary and sufficient conditions for convergence of the IBR along with numerical results which show that the convergence conditions are relatively tight.
KW - Adversarial machine learning
KW - Computational methods
KW - Game theory
KW - Iterated Best Response
UR - http://www.scopus.com/inward/record.url?scp=85010214350&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85010214350&partnerID=8YFLogxK
U2 - 10.1016/j.automatica.2016.11.046
DO - 10.1016/j.automatica.2016.11.046
M3 - Article
AN - SCOPUS:85010214350
SN - 0005-1098
VL - 78
SP - 88
EP - 96
JO - Automatica
JF - Automatica
ER -