TY - JOUR

T1 - Recovery and resource allocation strategies to maximize mobile network survivability by using game theories and optimization techniques

AU - Chen, Pei Yu

AU - Lin, Frank Yeong Sung

PY - 2013/10/18

Y1 - 2013/10/18

N2 - With more and more mobile device users, an increasingly important and critical issue is how to efficiently evaluate mobile network survivability. In this paper, a novel metric called Average Degree of Disconnectivity (Average DOD) is proposed, in which the concept of probability is calculated by the contest success function. The DOD metric is used to evaluate the damage degree of the network, where the larger the value of the Average DOD, the more the damage degree of the network. A multiround network attack-defense scenario as a mathematical model is used to support network operators to predict all the strategies both cyber attacker and network defender would likely take. In addition, the Average DOD would be used to evaluate the damage degree of the network. In each round, the attacker could use the attack resources to launch attacks on the nodes of the target network. Meanwhile, the network defender could reallocate its existing resources to recover compromised nodes and allocate defense resources to protect the survival nodes of the network. In the approach to solving this problem, the "gradient method" and "game theory" are adopted to find the optimal resource allocation strategies for both the cyber attacker and mobile network defender.

AB - With more and more mobile device users, an increasingly important and critical issue is how to efficiently evaluate mobile network survivability. In this paper, a novel metric called Average Degree of Disconnectivity (Average DOD) is proposed, in which the concept of probability is calculated by the contest success function. The DOD metric is used to evaluate the damage degree of the network, where the larger the value of the Average DOD, the more the damage degree of the network. A multiround network attack-defense scenario as a mathematical model is used to support network operators to predict all the strategies both cyber attacker and network defender would likely take. In addition, the Average DOD would be used to evaluate the damage degree of the network. In each round, the attacker could use the attack resources to launch attacks on the nodes of the target network. Meanwhile, the network defender could reallocate its existing resources to recover compromised nodes and allocate defense resources to protect the survival nodes of the network. In the approach to solving this problem, the "gradient method" and "game theory" are adopted to find the optimal resource allocation strategies for both the cyber attacker and mobile network defender.

UR - http://www.scopus.com/inward/record.url?scp=84885448018&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84885448018&partnerID=8YFLogxK

U2 - 10.1155/2013/207141

DO - 10.1155/2013/207141

M3 - Article

AN - SCOPUS:84885448018

VL - 2013

JO - Journal of Applied Mathematics

JF - Journal of Applied Mathematics

SN - 1110-757X

M1 - 207141

ER -