Title :
Optimal voting strategy against rational attackers
Author :
Wang, Li ; Li, Zheng ; Ren, Shangping ; Kwiat, Kevin
Author_Institution :
Dept. of Comput. Sci., Illinois Inst. of Technol., Chicago, IL, USA
Abstract :
Voting algorithms are often used to improve a system´s reliability through fault tolerance. However, when both the reliability of individual voters and the existence of rational attackers are taken into consideration, the number of voters that participate in an actual voting process determines the fault-and-attack tolerance performance of voting algorithms. In this paper, we are to find an optimal voting strategy (i.e., the optimal number of participating voters) against rational attackers whose goal is to defect the system by strategically compromising individual voters across the system. We model the problem of deciding the number of participating voters against rational attackers as a two-person zero-sum game problem and provide solutions based on the results from this well-known game problem. A set of experiments are performed to illustrate the voting strategy´s performance in the presences of rational attackers.
Keywords :
fault tolerant computing; game theory; safety-critical software; security of data; fault-and-attack tolerance; optimal voting strategy; rational attackers; safety-critical systems; systems reliability; two-person zero-sum game problem; Clustering algorithms; Equations; Game theory; Games; Linear programming; Redundancy; Attacker-defender Problem; Game Thoery; Reliability; Voting Strategy;
Conference_Titel :
Risk and Security of Internet and Systems (CRiSIS), 2011 6th International Conference on
Conference_Location :
Timisoara
Print_ISBN :
978-1-4577-1890-8
Electronic_ISBN :
978-1-4577-1889-2
DOI :
10.1109/CRiSIS.2011.6061841