Optimal Consumer-Centric Delay-Efficient Security Management in Multi-Agent Networks: A Game and Mechanism Design Theoretic Approach
The main aspiration behind the contributions of this research work is the achievement of simultaneuos delay-efficiency, autonomy, and security through innovative protocol design to address complex real-life problems. To achieve this, we take a holistic approach. We apply theoretical mathematical mod...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
Virginia Tech
2017
|
Subjects: | |
Online Access: | http://hdl.handle.net/10919/77362 http://scholar.lib.vt.edu/theses/available/etd-04122012-094602/ |
id |
ndltd-VTETD-oai-vtechworks.lib.vt.edu-10919-77362 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-VTETD-oai-vtechworks.lib.vt.edu-10919-773622020-09-29T05:34:14Z Optimal Consumer-Centric Delay-Efficient Security Management in Multi-Agent Networks: A Game and Mechanism Design Theoretic Approach Schlake, Farimehr Electrical and Computer Engineering Mili, Lamine M. Clauer, C. Robert Centeno, Virgilio A. Chen, Ing-Ray Eltoweissy, Mohamed Y. Incentive Compatibility Dominant Strategy IPsec QoS ATM Delay Security Protocol Performance Optimization Mechanism Design Theory Game Theory Bayesian Games The main aspiration behind the contributions of this research work is the achievement of simultaneuos delay-efficiency, autonomy, and security through innovative protocol design to address complex real-life problems. To achieve this, we take a holistic approach. We apply theoretical mathematical modeling implementing implications of social-economic behavioral characteristics to propose a cross-layer network security protocol. We further complement this approach by a layer-specific focus with implementations at two lower OSI layers. For the cross-layer design, we suggest the use of game and mechanism design theories. We design a network-wide consumer-centric and delay-efficient security protocol, DSIC-S. It induces a Dominant Strategy Incentive Compatible equilibrium among all rational and selfish nodes. We prove it is network-wide socially desirable and Pareto optimal. We address resource management and delay-efficiency through synergy of several design aspects. We propose a scenario-based security model with different levels. Furthermore, we design a valuation system to integrate the caused delay in selection of security algorithms at each node without consumer's knowledge of the actual delays. We achieve this by incorporating the consumer's valuation system, in the calculation of the credit transfers through the Vickrey-Clarke-Groves (VCG) payments with Clarke's pivotal rule. As the utmost significant contribution of this work, we solve the revelation theorem's problem of misrepresentation of agents' private information in mechanism design theory through the proposed design. We design an incentive model and incorporate the valuations in the incentives. The simulations validate the theoretical results. They prove the significance of this model and among others show the correlation of the credit transfers to actual delays and security valuations. In the layer-specific approach for the network-layer, we implement the DSIC-S protocol to extend current IPsec and IKEv2 protocols. IPsec-O and IKEv2-O inherit the strong properties of DSIC-S through the proposed extensions. Furthermore, we propose yet another layer-specific protocol, the SME_Q, for the datalink layer based on ATM. We develop an extensive simulation software, SMEQSIM, to simulate ATM security negotiations. We simulate the proposed protocol in a comprehensive real-life ATM network and prove the significance of this research work. Ph. D. 2017-04-06T15:45:19Z 2017-04-06T15:45:19Z 2012-04-10 2012-04-12 2016-10-18 2012-05-01 Dissertation Text etd-04122012-094602 http://hdl.handle.net/10919/77362 http://scholar.lib.vt.edu/theses/available/etd-04122012-094602/ en_US In Copyright http://rightsstatements.org/vocab/InC/1.0/ application/pdf Virginia Tech |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
topic |
Incentive Compatibility Dominant Strategy IPsec QoS ATM Delay Security Protocol Performance Optimization Mechanism Design Theory Game Theory Bayesian Games |
spellingShingle |
Incentive Compatibility Dominant Strategy IPsec QoS ATM Delay Security Protocol Performance Optimization Mechanism Design Theory Game Theory Bayesian Games Schlake, Farimehr Optimal Consumer-Centric Delay-Efficient Security Management in Multi-Agent Networks: A Game and Mechanism Design Theoretic Approach |
description |
The main aspiration behind the contributions of this research work is the achievement of simultaneuos delay-efficiency, autonomy, and security through innovative protocol design to address complex real-life problems. To achieve this, we take a holistic approach. We apply theoretical mathematical modeling implementing implications of social-economic behavioral characteristics to propose a cross-layer network security protocol. We further complement this approach by a layer-specific focus with implementations at two lower OSI layers.
For the cross-layer design, we suggest the use of game and mechanism design theories. We design a network-wide consumer-centric and delay-efficient security protocol, DSIC-S. It induces a Dominant Strategy Incentive Compatible equilibrium among all rational and selfish nodes. We prove it is network-wide socially desirable and Pareto optimal. We address resource management and delay-efficiency through synergy of several design aspects. We propose a scenario-based security model with different levels. Furthermore, we design a valuation system to integrate the caused delay in selection of security algorithms at each node without consumer's knowledge of the actual delays. We achieve this by incorporating the consumer's valuation system, in the calculation of the credit transfers through the Vickrey-Clarke-Groves (VCG) payments with Clarke's pivotal rule. As the utmost significant contribution of this work, we solve the revelation theorem's problem of misrepresentation of agents' private information in mechanism design theory through the proposed design. We design an incentive model and incorporate the valuations in the incentives. The simulations validate the theoretical results. They prove the significance of this model and among others show the correlation of the credit transfers to actual delays and security valuations.
In the layer-specific approach for the network-layer, we implement the DSIC-S protocol to extend current IPsec and IKEv2 protocols. IPsec-O and IKEv2-O inherit the strong properties of DSIC-S through the proposed extensions.
Furthermore, we propose yet another layer-specific protocol, the SME_Q, for the datalink layer based on ATM. We develop an extensive simulation software, SMEQSIM, to simulate ATM security negotiations. We simulate the proposed protocol in a comprehensive real-life ATM network and prove the significance of this research work. === Ph. D. |
author2 |
Electrical and Computer Engineering |
author_facet |
Electrical and Computer Engineering Schlake, Farimehr |
author |
Schlake, Farimehr |
author_sort |
Schlake, Farimehr |
title |
Optimal Consumer-Centric Delay-Efficient Security Management in Multi-Agent Networks: A Game and Mechanism Design Theoretic Approach |
title_short |
Optimal Consumer-Centric Delay-Efficient Security Management in Multi-Agent Networks: A Game and Mechanism Design Theoretic Approach |
title_full |
Optimal Consumer-Centric Delay-Efficient Security Management in Multi-Agent Networks: A Game and Mechanism Design Theoretic Approach |
title_fullStr |
Optimal Consumer-Centric Delay-Efficient Security Management in Multi-Agent Networks: A Game and Mechanism Design Theoretic Approach |
title_full_unstemmed |
Optimal Consumer-Centric Delay-Efficient Security Management in Multi-Agent Networks: A Game and Mechanism Design Theoretic Approach |
title_sort |
optimal consumer-centric delay-efficient security management in multi-agent networks: a game and mechanism design theoretic approach |
publisher |
Virginia Tech |
publishDate |
2017 |
url |
http://hdl.handle.net/10919/77362 http://scholar.lib.vt.edu/theses/available/etd-04122012-094602/ |
work_keys_str_mv |
AT schlakefarimehr optimalconsumercentricdelayefficientsecuritymanagementinmultiagentnetworksagameandmechanismdesigntheoreticapproach |
_version_ |
1719343922409373696 |