Chapter 2
Game Theory for Infrastructure Security: The Power of Intent-Based Adversary Models1
Xin Jin, Min Dan, Nan Zhang, Wei Yu, Xinwen Fu and Sajal K. Das
2.1 Introduction
A major concern on studying sharing information in a distributed system containing autonomous entities is how to model adversarial threat. Traditionally, behavior-based model (e.g., semi-honest model) has been widely adopted as the adversary model. In particular, semi-honest adversaries are those that run the protocol exactly as specified (no deviations), but may try to learn as much as possible about the input of the other entities from their views of the protocol. Most traditional solutions have a common assumption that all entities are well disciplined to follow the ...
Get Handbook on Securing Cyber-Physical Critical Infrastructure now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.