O N THE O PTIMAL P LACEMENT OF M IX Z ONES : A G AME -T HEORETIC A PPROACH Mathias Humbert LCA1/EPFL January 19, 2009 Supervisors: Mohammad Hossein Manshaei.

Slides:



Advertisements
Similar presentations
On the Optimal Placement of Mix Zones Julien Freudiger, Reza Shokri and Jean-Pierre Hubaux PETS, 2009.
Advertisements

1 A Graph-Theoretic Network Security Game M. Mavronicolas , V. Papadopoulou , A. Philippou  and P. Spirakis § University of Cyprus, Cyprus  University.
1 University of Southern California Keep the Adversary Guessing: Agent Security by Policy Randomization Praveen Paruchuri University of Southern California.
This Segment: Computational game theory Lecture 1: Game representations, solution concepts and complexity Tuomas Sandholm Computer Science Department Carnegie.
(CS/SS 241) Introduction to SISL: Topics in Algorithmic game theory Adam Wierman – 258 Jorgensen John Ledyard – 102 Baxter Jason R. Marden – 335 Moore.
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
Border Games in Cellular Networks Infocom 2007 Márk Félegyházi*, Mario Čagalj†, Diego Dufour*, Jean- Pierre Hubaux* * Ecole Polytechnique Federale de Lausanne.
Congestion Games with Player- Specific Payoff Functions Igal Milchtaich, Department of Mathematics, The Hebrew University of Jerusalem, 1993 Presentation.
Bayesian Games Yasuhiro Kirihata University of Illinois at Chicago.
Chapter 6 Game Theory © 2006 Thomson Learning/South-Western.
Calibrated Learning and Correlated Equilibrium By: Dean Foster and Rakesh Vohra Presented by: Jason Sorensen.
Game Theory 1. Game Theory and Mechanism Design Game theory to analyze strategic behavior: Given a strategic environment (a “game”), and an assumption.
Nash equilibria in Electricity Markets: A comparison of different approaches Seminar in Electric Power Networks, 12/5/12 Magdalena Klemun Master Student,
Course: Applications of Information Theory to Computer Science CSG195, Fall 2008 CCIS Department, Northeastern University Dimitrios Kanoulas.
Short introduction to game theory 1. 2  Decision Theory = Probability theory + Utility Theory (deals with chance) (deals with outcomes)  Fundamental.
Game-theoretic analysis tools Necessary for building nonmanipulable automated negotiation systems.
Using Game Theoretic Approach to Analyze Security Issues In Ad Hoc Networks Term Presentation Name: Li Xiaoqi, Gigi Supervisor: Michael R. Lyu Department:
Chapter 6 © 2006 Thomson Learning/South-Western Game Theory.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Algoritmi per Sistemi Distribuiti Strategici
Harsanyi transformation Players have private information Each possibility is called a type. Nature chooses a type for each player. Probability distribution.
Beyond selfish routing: Network Formation Games. Network Formation Games NFGs model the various ways in which selfish agents might create/use networks.
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis By Byung-Gon Chun et al. UC Berkeley PODC’04.
AWESOME: A General Multiagent Learning Algorithm that Converges in Self- Play and Learns a Best Response Against Stationary Opponents Vincent Conitzer.
Dynamic Network Security Deployment under Partial Information George Theodorakopoulos (EPFL) John S. Baras (UMD) Jean-Yves Le Boudec (EPFL) September 24,
Long Term Evolution and Femtocells Mini-Project Security and Cooperation in Wireless Networks | EPFL January 19, 2010 By Igor Bilogrevic, LCA1 Supervisor:
Rationality and information in games Jürgen Jost TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAA A A A AAA Max Planck.
Nash Equilibrium - definition A mixed-strategy profile σ * is a Nash equilibrium (NE) if for every player i we have u i (σ * i, σ * -i ) ≥ u i (s i, σ.
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
Anonymizing Web Services Through a Club Mechanism With Economic Incentives Mamata Jenamani Leszek Lilien Bharat Bhargava Department of Computer Sciences.
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
Games of Incomplete Information. These games drop the assumption that players know each other’s preferences. Complete info: players know each other’s preferences.
1 Issues on the border of economics and computation נושאים בגבול כלכלה וחישוב Congestion Games, Potential Games and Price of Anarchy Liad Blumrosen ©
Strategic Game Theory for Managers. Explain What is the Game Theory Explain the Basic Elements of a Game Explain the Importance of Game Theory Explain.
Allerton 2011 September 28 Mathias Humbert, Mohammad Hossein Manshaei, and Jean-Pierre Hubaux EPFL - Laboratory for Communications and Applications (LCA1)
By: Gang Zhou Computer Science Department University of Virginia 1 A Game-Theoretic Framework for Congestion Control in General Topology Networks SYS793.
Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective
Chapter 9 Games with Imperfect Information Bayesian Games.
Revocation Games in Ephemeral Networks Maxim Raya, Mohammad Hossein Manshaei, Márk Félegyházi, Jean-Pierre Hubaux CCS 2008.
Game Theory The Prisoner’s Dilemma Game. “Strategic thinking is the art of outdoing an adversary, knowing that the adversary is trying to do the same.
A Game-Theoretic Model for Defending Against Malicious Users in RecDroid Bahman Rashidi December 5 th, 2014.
M9302 Mathematical Models in Economics Instructor: Georgi Burlakov 4.1.Dynamic Games of Incomplete Information Lecture
Games with Imperfect Information Bayesian Games. Complete versus Incomplete Information So far we have assumed that players hold the correct belief about.
Game-theoretic analysis tools Tuomas Sandholm Professor Computer Science Department Carnegie Mellon University.
\ B A \ Draw a graph to show the expected pay-off for A. What is the value of the game. How often should A choose strategy 1? If A adopts a mixed.
Game Theory: introduction and applications to computer networks Game Theory: introduction and applications to computer networks Introduction Giovanni Neglia.
On the Age of Pseudonyms in Mobile Ad Hoc Networks Julien Freudiger, Mohammad Hossein Manshaei, Jean-Yves Le Boudec and Jean-Pierre Hubaux Infocom 2010.
1 S ystems Analysis Laboratory Helsinki University of Technology Kai Virtanen, Tuomas Raivio and Raimo P. Hämäläinen Systems Analysis Laboratory Helsinki.
Coordination with Local Information Munther Dahleh Alireza Tahbaz-Salehi, John Tsitsiklis Spyros Zoumpouli.
UNCERTAINTY AND EXPECTED UTILITY Prof. Dr. Yeşim Kuştepeli ECO 4413 Game Theory 1.
Non-Cooperative Multi-Radio Channel Allocation in Wireless Networks Márk Félegyházi*, Mario Čagalj†, Shirin Saeedi Bidokhti*, Jean-Pierre Hubaux* * Ecole.
GameSec 2010 November 22, Berlin Mathias Humbert, Mohammad Hossein Manshaei, Julien Freudiger and Jean-Pierre Hubaux EPFL - Laboratory for Computer communications.
On Non-Cooperative Location Privacy: A Game-theoreticAnalysis
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish agents strategically interact in using a network They.
Algorithmic, Game-theoretic and Logical Foundations
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish users (i.e., players) strategically interact in using.
Designing Games for Distributed Optimization Na Li and Jason R. Marden IEEE Journal of Selected Topics in Signal Processing, Vol. 7, No. 2, pp ,
Frank Cowell: Games Uncertainty GAMES: UNCERTAINTY MICROECONOMICS Principles and Analysis Frank Cowell Almost essential Games: Mixed Strategies Almost.
1 Multi-radio Channel Allocation in Competitive Wireless Networks Mark Felegyhazi, Mario Čagalj, Jean-Pierre Hubaux EPFL, Switzerland IBC’06, Lisbon, Portugal.
Strategic Game Theory for Managers. Explain What is the Game Theory Explain the Basic Elements of a Game Explain the Importance of Game Theory Explain.
MAIN RESULT: We assume utility exhibits strategic complementarities. We show: Membership in larger k-core implies higher actions in equilibrium Higher.
5.1.Static Games of Incomplete Information
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
Presented By Siddartha Ailuri Graduate Student, EECS 04/07/17
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 2 Bayesian Games Zhu Han, Dusit Niyato, Walid Saad, Tamer.
Games with Imperfect Information Bayesian Games
Molly W. Dahl Georgetown University Econ 101 – Spring 2009
Information, Incentives, and Mechanism Design
Presentation transcript:

O N THE O PTIMAL P LACEMENT OF M IX Z ONES : A G AME -T HEORETIC A PPROACH Mathias Humbert LCA1/EPFL January 19, 2009 Supervisors: Mohammad Hossein Manshaei Julien Freudiger Jean-Pierre Hubaux Mini-project of the Security and Cooperation in Wireless Networks course

M OTIVATIONS Pratical case study on location privacy Use of the relevant information from Lausanne’s traffic data Game-theoretic model evaluating agents’ behaviors a priori Incomplete information game analysis 2

O UTLINE Lausanne traffic: a case study System model and mixing effectiveness Game-theoretic approach Game results: A complete information game Numerical evaluations An incomplete information game Conclusion and future work 3

L AUSANNE DOWNTOWN 4 Intersections’ statistics stored in 23 matrices (size = 5x5) Place Chauderon Place Chauderon: 23 intersections Traffic matrix:

S YSTEM MODEL Road network with N intersections Mobile nodes vs. Local passive adversary Nodes’ privacy-preserving mechanisms (at intersection i): Active mix zone (cost = c i m ) c i m = c i p + c i q = pseudonyms cost + silence cost Passive mix zone (cost = c i p ) Adversary’s tracking devices:: Sniffing station (cost = c s ) Mobility parameters: Relative traffic intensity λ i Mixing effectiveness m i 5 mix Traffic matrix:

M IXING EFFECTIVENESS Mixing: uncertainty for an adversary trying to match nodes leaving the active mix zone to the entering ones => normalized entropy => relative traffic intensity 6 Smallest mixing between Chaudron & Bel-Air: m i = 0 (no uncertainty for the adversary) Greatest mixing at place Chaudron: m i = 0.74

G AME - THEORETIC APPROACH G = {P, S, U} 2 players: {mobile nodes, adversary} Nodes’ strategies s n,i (intersection i): Active mix zone (AMZ) Passive mix zone (PMZ) Nothing (NO) Adversary’s strategies s a,i : Sniffing station (SS) Nothing (NO) Payoffs: 7 Adversary Nodes 0 < λ i, m i, c i m, c s < 1

C OMPLETE INFORMATION GAME FOR ONE INTERSECTION Pure-strategy NE [theorem 1]: Mixed-strategy NE: Probabilities: p i = (λ i -c s ) /λ i m i 1- p i q i = min(c i q /λ i m i, 1) 0 1- q i mixed-strategy Nash equilibrium 8

N INTERSECTIONS - GAME Global NE = Union of local NE Global payoffs at equilibrium defined as Number of sniffing stations = W s (upper bound) Game = two maximisation problems: 9 Nodes Adversary

N INTERSECTIONS - GAME Algorithm converging to an equilibrium [theorem 2] 10 Remove sniffing stations at mixed NE first Remove sniffing stations at pure NE (Start with smallest adversary’s payoff) The nodes normally take advantage of the absence of sniffing station to deploy a passive mix zone As u i a = 0 at mixed-strategy NE and assuming (wlos) that m 1 < m 2 < … < m n

11 N UMERICAL RESULTS : LOW PLAYERS ’ COSTS Fixed (normalized) costs and unlimited nb of sniffing stations: limited Fixed (normalized) costs and limited nb of sniffing stations (W s = 5):

12 N UMERICAL RESULTS : MEDIUM SNIFFING COST Fixed (normalized) costs and unlimited nb of sniffing stations: limited Fixed (normalized) costs and limited nb of sniffing stations (W s = 5):

I NCOMPLETE INFORMATION GAME FOR ONE INTERSECTION Assumptions: Nodes do not know the sniffing cost Instead, they have a probability distribution on cost’s type Theorem 3: one pure-strategy Bayesian Nash equilibrium (BNE) with strategy profile defined by: 13 with (probability that the adversary installs a sniffing station) defined using the probability distribution on cost’s type Suboptimal BNE, such as (AMZ, NO) or (PMZ, SS) for nodes’ payoff can occur if nodes’ belief on sniffing station cost’s type is inacurrate

N INTERSECTIONS INCOMPLETE INFORMATION GAME Potential algorithm to converge to a Bayesian Nash equilibrium (ongoing work): 14 Complete knowledge for the adversary => remove sniffing stations leading to smallest payoffs at BNE Nodes know W s => put passive mix zones where adversary’s expected payoffs are the smallest

C ONCLUSION AND FUTURE WORK Prediction of nodes’ and adversary’s strategic behaviors using game theory Algorithms reaching an optimal (Bayesian) NE in complete and incomplete information games In incomplete information game, significant decrease of nodes’ location privacy due to lack of knowledge about adversary’s payoff Concrete application on a real city network Nodes and adversary often adopting complementary strategies Future work Evaluation of the incomplete information game with the real traffic data and various probability distributions on sniffing station cost 15

N UMERICAL EVALUATION OF OPTIMAL STRATEGIES WITH VARIABLE COSTS 16 1) Unlimited number of SS: 2) Limited number of SS:

B ACKUP : M IXING E FFECTIVENESS COMPUTATION Mixing: uncertainty for an adversary trying to match nodes leaving the active mix zone to the entering ones => entropy => relative traffic intensity Dfdf dfd 17

B ACKUP : B AYESIAN NE FOR THE I NCOMPLETE I NFORMATION G ONE INTERSECTION Nodes do not know the sniffing cost Instead, they have a probability distribution on cost’s type Theorem 3: one pure-strategy Bayesian Nash equilibrium (BNE) with strategy profile defined by: 18 With (probability that the adversary installs a sniffing station) defined using the cdf of the cost’s type: Suboptimal BNE, such as (AMZ, NO) or (PMZ, SS) for nodes’ payoff can occur if nodes’ belief on sniffing station cost’s type is inacurrate

B ACKUP : M OTIVATION Master project [1]: study of mobile nodes’ location privacy threatened by a local adversary Application of this work on a practical and real example Collaboration with people of TRANSP-OR research group at EPFL Lausanne’s traffic data based on actual road measurements and Swiss Federal census (more on this in next slide) Selection of the relevant information from the traffic data New game-theoretic model in order to exploit the provided data and evaluate nodes’ location privacy Incomplete information game to better model the players’ knowledge on payoffs and behaviors of other participants 19 [1] M. Humbert, Location Privacy amidst Local Eavesdroppers, Master thesis, 2009