Next Article in Journal
Metric Learning with Dynamically Generated Pairwise Constraints for Ear Recognition
Previous Article in Journal
The (T, L)-Path Model and Algorithms for Information Dissemination in Dynamic Networks
Article Menu

Export Article

Open AccessArticle
Information 2018, 9(9), 214; https://doi.org/10.3390/info9090214

Individual Security and Network Design with Malicious Nodes

1
Institute of Informatics, University of Warsaw, Banacha 2, 02-097 Warsaw, Poland
2
CMAP, École Polytechnique, CNRS and INRIA, Route de Saclay, 91128 Palaiseau CEDEX, France
*
Author to whom correspondence should be addressed.
Received: 15 August 2018 / Revised: 21 August 2018 / Accepted: 23 August 2018 / Published: 25 August 2018
(This article belongs to the Section Artificial Intelligence)
Full-Text   |   PDF [361 KB, uploaded 25 August 2018]   |  

Abstract

Networks are beneficial to those being connected but can also be used as carriers of contagious hostile attacks. These attacks are often facilitated by exploiting corrupt network users. To protect against the attacks, users can resort to costly defense. The decentralized nature of such protection is known to be inefficient, but the inefficiencies can be mitigated by a careful network design. Is network design still effective when not all users can be trusted? We propose a model of network design and defense with byzantine nodes to address this question. We study the optimal defended networks in the case of centralized defense and, for the case of decentralized defense, we show that the inefficiencies due to decentralization can be mitigated arbitrarily well when the number of nodes in the network is sufficiently large, despite the presence of the byzantine nodes. View Full-Text
Keywords: network design; individual security; byzantine players; inefficiencies; networks network design; individual security; byzantine players; inefficiencies; networks
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Janus, T.; Skomra, M.; Dziubiński, M. Individual Security and Network Design with Malicious Nodes. Information 2018, 9, 214.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Information EISSN 2078-2489 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top