TY - JOUR ID - 92238 TI - Interdependent Security Game Design over Constrained Linear Influence Networks JO - The ISC International Journal of Information Security JA - ISECURE LA - en SN - 2008-2045 AU - Hasheminasab, Seyed Alireza AU - Tork Ladani, Behrouz AU - Alpcan, Tansu AD - Department of Computer Engineering, University of Isfahan, Isfahan, Iran AD - Department of Computer Engineering, University of Isfahan, Isfahan, Iran. AD - Department of Electrical and Electronic Engineering, The University of Melbourne, Melbourne, Australia. Y1 - 2019 PY - 2019 VL - 11 IS - 2 SP - 95 EP - 111 KW - Interdependent Security KW - Nash equilibrium KW - Social Optimum KW - Game Design DO - 10.22042/isecure.2019.186923.467 N2 - In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through security investments considering the network structure, costs and constraints, which have been set by the network owner. However, decisions of selfish entities to maximize their utilities do not always lead to a socially optimum solution. Therefore, motivating players to reach the social optimum is of high value from the network owner’s point of view. The network owner wants to maximize the overall network security by designing the game's parameters. As far as we know, there is no notable work in the context of linear influence networks to introduce appropriate game design for this purpose. This paper presents design methods that make use of the adjustments of players’ costs, interdependencies, and constraints to align players' incentives with a network-wide global objective. We present a comprehensive investigation of existence and uniqueness conditions of Nash Equilibrium in such environments. Furthermore, numerical results of applying the proposed mechanisms in a sample real-world example are illustrated. UR - https://www.isecure-journal.com/article_92238.html L1 - https://www.isecure-journal.com/article_92238_fe0ed7277ae612c237aa165696a1284d.pdf ER -