TY - GEN
T1 - Combating Online Counterfeits
T2 - 11th Conference on Decision and Game Theory for Security, GameSec 2020
AU - Zhao, Yuhan
AU - Zhu, Quanyan
N1 - Publisher Copyright:
© 2020, Springer Nature Switzerland AG.
PY - 2020
Y1 - 2020
N2 - Counterfeiting has been a pervasive threat to the security of supply chains. With the development of cyber technologies, traditional supply chains move their logistics to the cyberspace for better efficiency. However, counterfeiting threats still exist and may even cause worse consequences. It is imperative to find mitigating strategies to combat counterfeiting in the cyber supply chain. In this paper, we establish a games-in-games framework to capture the interactions of counterfeiting activities in the cyber supply chain. Specifically, the sellers in the cyber supply chain play a Stackelberg game with consumers, while sellers compete with each other by playing a Nash game. All sellers and consumers aim to maximize their utilities. We design algorithms to find the best response of all participants and analyze the equilibrium of the supply chain system. Finally, we use case studies to demonstrate the equilibrium behavior and propose effective anti-counterfeit strategies.
AB - Counterfeiting has been a pervasive threat to the security of supply chains. With the development of cyber technologies, traditional supply chains move their logistics to the cyberspace for better efficiency. However, counterfeiting threats still exist and may even cause worse consequences. It is imperative to find mitigating strategies to combat counterfeiting in the cyber supply chain. In this paper, we establish a games-in-games framework to capture the interactions of counterfeiting activities in the cyber supply chain. Specifically, the sellers in the cyber supply chain play a Stackelberg game with consumers, while sellers compete with each other by playing a Nash game. All sellers and consumers aim to maximize their utilities. We design algorithms to find the best response of all participants and analyze the equilibrium of the supply chain system. Finally, we use case studies to demonstrate the equilibrium behavior and propose effective anti-counterfeit strategies.
KW - Anti-counterfeit strategy
KW - Cyber supply chain
KW - Game theory
KW - Games-in-games framework
KW - Supply chain security
UR - http://www.scopus.com/inward/record.url?scp=85098266685&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85098266685&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-64793-3_18
DO - 10.1007/978-3-030-64793-3_18
M3 - Conference contribution
AN - SCOPUS:85098266685
SN - 9783030647926
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 326
EP - 345
BT - Decision and Game Theory for Security - 11th International Conference, GameSec 2020, Proceedings
A2 - Zhu, Quanyan
A2 - Baras, John S.
A2 - Poovendran, Radha
A2 - Chen, Juntao
PB - Springer Science and Business Media Deutschland GmbH
Y2 - 28 October 2020 through 30 October 2020
ER -