Abstract | ||
---|---|---|
Some users of a communications network may have more information about traffic on the network than do others - and this fact may be secret. Such information would allow the possessor to tailor its own traffic to the traffic of others, sending a larger amount of traffic when congestion is low and a smaller amount of traffic when congestion is high; this would help the possessor of secret information and (might) harm others.To study the impact of secret information we formulate a flow control game with incomplete information where users choose their flows in order to maximize their (expected) utilities given the actions of others. In this environment, the natural baseline notion is Bayesian Nash equilibrium (BNE); we establish the existence of BNE in pure strategies. To capture the effect of secret information, we assume that there is a user who knows the congestion created by other users, but that the presence of this user is not known by other users; thus this user has secret information. For this environment, we define a new equilibrium concept: the Bayesian Nash Equilibrium with Secret Information (BNE-SI) and establish its existence. We establish rigorous estimates for the benefit and harm that result from secret information; both the benefit and the harm are smaller for large networks than for small networks. Simulations confirm the estimates of benefit and harm for networks of different sizes and demonstrate that secret information may in fact benefit all users. Secret information may also harm other users in other scenarios. This analysis can be used as a starting point for securing communications networks, both from the network manager and the user's perspectives. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1109/CDC.2011.6161038 | 2011 50TH IEEE CONFERENCE ON DECISION AND CONTROL AND EUROPEAN CONTROL CONFERENCE (CDC-ECC) |
Keywords | Field | DocType |
games,expected utility,nash equilibrium,communication networks,bayesian nash equilibrium,secure communication,game theory,mathematical model,bayesian methods,bayesian method,network simulator,flow control,knowledge engineering | Telecommunications network,Computer science,Computer security,Harm,Game theory,Knowledge engineering,Network management,Bayesian game,Nash equilibrium,Complete information | Conference |
ISSN | Citations | PageRank |
0743-1546 | 0 | 0.34 |
References | Authors | |
0 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Khoa Tran Phan | 1 | 77 | 5.69 |
Mihaela Van Der Schaar | 2 | 3968 | 352.59 |
William R. Zame | 3 | 57 | 17.72 |