TY - JOUR
T1 - Game theory meets network security and privacy
AU - Manshaei, Mohammad Hossein
AU - Zhu, Quanyan
AU - Alpcan, Tansu
AU - Basar, Tamer
AU - Hubaux, Jean Pierre
N1 - Copyright:
Copyright 2019 Elsevier B.V., All rights reserved.
PY - 2013/6
Y1 - 2013/6
N2 - This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in addressing different forms of security and privacy problems in computer networks and mobile applications. We organize the presented works in six main categories: security of the physical and MAC layers, security of self-organizing networks, intrusion detection systems, anonymity and privacy, economics of network security, and cryptography. In each category, we identify security problems, players, and game models. We summarize the main results of selected works, such as equilibrium analysis and security mechanism designs. In addition, we provide a discussion on the advantages, drawbacks, and future direction of using game theory in this field. In this survey, our goal is to instill in the reader an enhanced understanding of different research approaches in applying gametheoretic methods to network security. This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking.
AB - This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in addressing different forms of security and privacy problems in computer networks and mobile applications. We organize the presented works in six main categories: security of the physical and MAC layers, security of self-organizing networks, intrusion detection systems, anonymity and privacy, economics of network security, and cryptography. In each category, we identify security problems, players, and game models. We summarize the main results of selected works, such as equilibrium analysis and security mechanism designs. In addition, we provide a discussion on the advantages, drawbacks, and future direction of using game theory in this field. In this survey, our goal is to instill in the reader an enhanced understanding of different research approaches in applying gametheoretic methods to network security. This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking.
KW - Cryptography
KW - Game theory
KW - Intrusion detection system
KW - Location privacy
KW - Multiparty computation
KW - Network security and privacy
KW - Revocation
KW - Wireless security
UR - http://www.scopus.com/inward/record.url?scp=84874284297&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84874284297&partnerID=8YFLogxK
U2 - 10.1145/2480741.2480742
DO - 10.1145/2480741.2480742
M3 - Review article
AN - SCOPUS:84874284297
VL - 45
JO - ACM Computing Surveys
JF - ACM Computing Surveys
SN - 0360-0300
IS - 3
M1 - 25
ER -