TY - GEN
T1 - Distributed aggregative games on graphs in adversarial environments
AU - Kiumarsi, Bahare
AU - Başar, Tamer
N1 - Publisher Copyright:
© 2018, Springer Nature Switzerland AG.
PY - 2018
Y1 - 2018
N2 - Existing solutions to aggregative games assume that all players are fully trustworthy for cooperative tasks or, in a worst-case scenario, are selfish players with no intent to intentionally harm the network. Nevertheless, the need to believe that players will behave consistently exposes the network to vulnerabilities associated with cyber-physical attacks. This paper investigates the effects of cyber-physical attacks on the outcome of distributed aggregative games (DAGs). More specifically, we are seeking to answer two main questions: (1) how a stealthy attack can deviate the game outcome from a cooperative Nash equilibrium, and by doing so, (2) by how much efficiency of a DAG degrades. To this end, we first show that adversaries can stealthily manipulate the outcome of a DAG by compromising the Nash equilibrium solution and consequently lead to an emergent misbehavior or no emergent behavior. This study will intensify the urgency of designing novel resilient solutions to DAGs so that the overall network sustains some notion of acceptable global behavior in the presence of malicious agents. Finally, we corroborate and illustrate our results by providing simulation examples. Simulations reveal that the adverse effect of a compromised agent is considerably worse than that of a selfish agent.
AB - Existing solutions to aggregative games assume that all players are fully trustworthy for cooperative tasks or, in a worst-case scenario, are selfish players with no intent to intentionally harm the network. Nevertheless, the need to believe that players will behave consistently exposes the network to vulnerabilities associated with cyber-physical attacks. This paper investigates the effects of cyber-physical attacks on the outcome of distributed aggregative games (DAGs). More specifically, we are seeking to answer two main questions: (1) how a stealthy attack can deviate the game outcome from a cooperative Nash equilibrium, and by doing so, (2) by how much efficiency of a DAG degrades. To this end, we first show that adversaries can stealthily manipulate the outcome of a DAG by compromising the Nash equilibrium solution and consequently lead to an emergent misbehavior or no emergent behavior. This study will intensify the urgency of designing novel resilient solutions to DAGs so that the overall network sustains some notion of acceptable global behavior in the presence of malicious agents. Finally, we corroborate and illustrate our results by providing simulation examples. Simulations reveal that the adverse effect of a compromised agent is considerably worse than that of a selfish agent.
KW - Adversarial environment
KW - Distributed aggregative games
UR - http://www.scopus.com/inward/record.url?scp=85055878120&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85055878120&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-01554-1_17
DO - 10.1007/978-3-030-01554-1_17
M3 - Conference contribution
AN - SCOPUS:85055878120
SN - 9783030015534
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 296
EP - 313
BT - Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Proceedings
A2 - Bushnell, Linda
A2 - Poovendran, Radha
A2 - Basar, Tamer
PB - Springer
T2 - 9th International Conference on Decision and Game Theory for Security, GameSec 2018
Y2 - 29 October 2018 through 31 October 2018
ER -