O'Reilly logo

Handbook on Securing Cyber-Physical Critical Infrastructure by Nan Zhang, Krishna Kant, Sajal K Das

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2

Game Theory for Infrastructure Security: The Power of Intent-Based Adversary Models1

Xin Jin, Min Dan, Nan Zhang, Wei Yu, Xinwen Fu and Sajal K. Das

2.1 Introduction

A major concern on studying sharing information in a distributed system containing autonomous entities is how to model adversarial threat. Traditionally, behavior-based model (e.g., semi-honest model) has been widely adopted as the adversary model. In particular, semi-honest adversaries are those that run the protocol exactly as specified (no deviations), but may try to learn as much as possible about the input of the other entities from their views of the protocol. Most traditional solutions have a common assumption that all entities are well disciplined to follow the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required