mixed strategy nash equilibrium
Recently Published Documents


TOTAL DOCUMENTS

41
(FIVE YEARS 13)

H-INDEX

6
(FIVE YEARS 1)

2021 ◽  
Vol 7 ◽  
pp. e728
Author(s):  
Xuejin Zhu ◽  
Jie Huang

Due to limited resources, wireless sensor network (WSN) nodes generally possess weak defense capabilities and are often the target of malware attacks. Attackers can capture or infect specific sensor nodes and propagate malware to other sensor nodes in WSNs through node communication. This can eventually infect an entire network system and even cause paralysis. Based on epidemiological theory, the present study proposes a malware propagation model suitable for cluster-based WSNs to analyze the propagation dynamic of malware. The model focuses on the data-transmission characteristics between different nodes in a cluster-based network and considers the actual application parameters of WSNs, such as node communication radius, node distributed density, and node death rate. In addition, an attack and defense game between malware and defending systems is also established, and the infection and recovery rates of malware propagation under the mixed strategy Nash equilibrium condition are given. In particular, the basic reproductive number, equilibrium point, and stability of the model are derived. These studies revealed that a basic reproductive number of less than 1 leads to eventual disappearance of malware, which provides significant insight into the design of defense strategies against malware threats. Numerical experiments were conducted to validate the theory proposed, and the influence of WSN parameters on malware propagation was examined.


Author(s):  
Dario Madeo ◽  
Chiara Mocenni

Cooperation is widely recognized to be challenging for the well-balanced development of human societies. The emergence of cooperation in populations has been largely studied in the context of the Prisoner's Dilemma game, where temptation to defect and fear to be betrayed by others often activate defective strategies. In this paper we analyze the decision making mechanisms fostering cooperation in the two-strategy Stag-Hunt and Chicken games, which include the mixed strategy Nash equilibrium, describing partially cooperative behavior. We find the conditions for which cooperation is asymptotically stable in both full and partial cases, and we show that the partially cooperative steady state is also globally stable in the simplex. Furthermore, we show that the last can be more rewarding than the first, thus making the mixed strategy effective, although people cooperate at a lower level with respect to the maximum allowed, as it is reasonably expected in real situations. Our findings highlight the importance of Stag-Hunt and Chicken games in understanding the emergence of cooperation in social networks.


2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Lin Ge ◽  
Tao Jiang

Aiming at the privacy protection of lightweight nodes based on Bloom filters in blockchain, this paper proposes a new privacy protection method. Considering the superimposition effect of query information, node and Bloom filter are regarded as the two parties of the game. A privacy protection mechanism based on the mixed strategy Nash equilibrium is proposed to judge the information query. On this basis, a Bloom filter privacy protection algorithm is proposed when the probability of information query and privacy, not being leaked, is less than the node privacy protection. It is based on variable factor disturbance, adjusting the number of bits’ set to 1 in the Bloom filter to improve the privacy protection performance in different scenarios. The experiment uses Bitcoin transaction data from 2009 to 2019 as the test data to verify the effectiveness, reliability, and superiority of the method.


2021 ◽  
Vol 13 (1(J)) ◽  
pp. 69-81
Author(s):  
Jung S. You

A mixed strategy, a strategy of unpredictable actions, is applicable to business, politics, and sports. Playing mixed strategies, however, poses a challenge, as the game theory involves calculating probabilities and executing random actions. I test i.i.d. hypotheses of the mixed strategy Nash equilibrium with the simplest experiments in which student participants play zero-sum games in multiple iterations and possibly figure out the optimal mixed strategy (equilibrium) through the games. My results confirm that most players behave differently from the Nash equilibrium prediction for the simplest 2x2 zero-sum game (matching-pennies) and 3x3 zero-sum game (e.g., the rock-paper-scissors game). The results indicate the need to further develop theoretical models that explain a non-Nash equilibrium behavior.


2020 ◽  
Author(s):  
Yao Wang ◽  
Long Zhang ◽  
Minghui Min ◽  
Chao Guo ◽  
Vishal Sharma ◽  
...  

In this paper, a laser-powered aerial mobile edge computing (MEC) architecture is proposed, where a high-altitude platform (HAP) integrated with an MEC server transfers laser energy to charge aerial user equipments (AUEs) for offloading their computation tasks to the HAP. Particularly, we identify a new privacy vulnerability caused by the transmission of wireless power transfer (WPT) signaling in the presence of a malicious smart attacker (SA). To address this vulnerability, the interaction between the HAP and the SA in their allocation of tile grids as charging points to the AUEs in laser-enabled WPT is formulated as a Colonel Blotto game (CBG), which models the competition of two players for limited resources over multiple battlefields for a finite time horizon. Moreover, the utility function that each player receives over a battlefield is developed by identifying the tradeoff between privacy protection level and energy consumption of each AUE. We further obtain the mixed-strategy Nash equilibrium for the modified CBG with asymmetric players. Simulation results are presented to show the effectiveness of this game framework.


2020 ◽  
Author(s):  
Yao Wang ◽  
Long Zhang ◽  
Minghui Min ◽  
Chao Guo ◽  
Vishal Sharma ◽  
...  

In this paper, a laser-powered aerial mobile edge computing (MEC) architecture is proposed, where a high-altitude platform (HAP) integrated with an MEC server transfers laser energy to charge aerial user equipments (AUEs) for offloading their computation tasks to the HAP. Particularly, we identify a new privacy vulnerability caused by the transmission of wireless power transfer (WPT) signaling in the presence of a malicious smart attacker (SA). To address this vulnerability, the interaction between the HAP and the SA in their allocation of tile grids as charging points to the AUEs in laser-enabled WPT is formulated as a Colonel Blotto game (CBG), which models the competition of two players for limited resources over multiple battlefields for a finite time horizon. Moreover, the utility function that each player receives over a battlefield is developed by identifying the tradeoff between privacy protection level and energy consumption of each AUE. We further obtain the mixed-strategy Nash equilibrium for the modified CBG with asymmetric players. Simulation results are presented to show the effectiveness of this game framework.


2020 ◽  
Author(s):  
Yao Wang ◽  
Long Zhang ◽  
Minghui Min ◽  
Chao Guo ◽  
Vishal Sharma ◽  
...  

In this paper, a laser-powered aerial mobile edge computing (MEC) architecture is proposed, where a high-altitude platform (HAP) integrated with an MEC server transfers laser energy to charge aerial user equipments (AUEs) for offloading their computation tasks to the HAP. Particularly, we identify a new privacy vulnerability caused by the transmission of wireless power transfer (WPT) signaling in the presence of a malicious smart attacker (SA). To address this vulnerability, the interaction between the HAP and the SA in their allocation of tile grids as charging points to the AUEs in laser-enabled WPT is formulated as a Colonel Blotto game (CBG), which models the competition of two players for limited resources over multiple battlefields for a finite time horizon. Moreover, the utility function that each player receives over a battlefield is developed by identifying the tradeoff between privacy protection level and energy consumption of each AUE. We further obtain the mixed-strategy Nash equilibrium for the modified CBG with asymmetric players. Simulation results are presented to show the effectiveness of this game framework.


Sign in / Sign up

Export Citation Format

Share Document