IDEAS home Printed from https://ideas.repec.org/a/eee/reensy/v111y2013icp37-44.html
   My bibliography  Save this article

Defending majority voting systems against a strategic attacker

Author

Listed:
  • Levitin, Gregory
  • Hausken, Kjell
  • Ben Haim, Hanoch

Abstract

Voting systems used in technical and tactical decision making in pattern recognition and target detection, data handling, signal processing, distributed and secure computing etc. are considered. A maxmin two period game is analyzed where the defender first protects and chooses units for participation in voting. The attacker thereafter attacks a subset of units. It is shown that when the defender protects all the voting units, the optimal number of units chosen for voting is either one or the maximal possible odd number. When the defender protects only the units chosen for voting, the optimal number of chosen units increases with the defender resource superiority (i.e., more resources than the attacker) and with probability of providing correct output by any unit. The system success probability always increases in the total number of voting units, the defender–attacker resource ratio, and the probability that each voting unit produces a correct output. The system success probability increases in the attacker–defender contest intensity if the defender achieves per-unit resource superiority, and otherwise decreases in the contest intensity. The presented model and enumerative algorithm allow obtaining optimal voting system defense strategy for any combination of parameters: total number of units, attack and defense resources, unit success probability and contest intensity.

Suggested Citation

  • Levitin, Gregory & Hausken, Kjell & Ben Haim, Hanoch, 2013. "Defending majority voting systems against a strategic attacker," Reliability Engineering and System Safety, Elsevier, vol. 111(C), pages 37-44.
  • Handle: RePEc:eee:reensy:v:111:y:2013:i:c:p:37-44
    DOI: 10.1016/j.ress.2012.10.004
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0951832012002049
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ress.2012.10.004?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Torres-Echeverría, A.C. & Martorell, S. & Thompson, H.A., 2011. "Modeling safety instrumented systems with MooN voting architectures addressing system reconfiguration for testing," Reliability Engineering and System Safety, Elsevier, vol. 96(5), pages 545-563.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Wang, Tai-Ran & Pedroni, Nicola & Zio, Enrico, 2016. "Identification of protective actions to reduce the vulnerability of safety-critical systems to malevolent acts: A sensitivity-based decision-making approach," Reliability Engineering and System Safety, Elsevier, vol. 147(C), pages 9-18.
    2. Wu, Di & Liu, Xiang-dong & Yan, Xiang-bin & Peng, Rui & Li, Gang, 2019. "Equilibrium analysis of bitcoin block withholding attack: A generalized model," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 318-328.
    3. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    4. Li, Yijia & Hu, Xiaoxiao & Zhao, Peng, 2021. "On the reliability of a voting system under cyber attacks," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    5. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Liu, Yiliu & Rausand, Marvin, 2016. "Proof-testing strategies induced by dangerous detected failures of safety-instrumented systems," Reliability Engineering and System Safety, Elsevier, vol. 145(C), pages 366-372.
    2. Qi, Meng & Kan, Yufeng & Li, Xun & Wang, Xiaoying & Zhao, Dongfeng & Moon, Il, 2020. "Spurious activation and operational integrity evaluation of redundant safety instrumented systems," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    3. Min Zhang & Zhijian Zhang & Ali Mosleh & Sijuan Chen, 2017. "Common cause failure model updating for risk monitoring in nuclear power plants based on alpha factor model," Journal of Risk and Reliability, , vol. 231(3), pages 209-220, June.
    4. Ding, Long & Wang, Hong & Jiang, Jin & Xu, Aidong, 2017. "SIL verification for SRS with diverse redundancy based on system degradation using reliability block diagram," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 170-187.
    5. Meng, Huixing & Kloul, Leïla & Rauzy, Antoine, 2018. "Modeling patterns for reliability assessment of safety instrumented systems," Reliability Engineering and System Safety, Elsevier, vol. 180(C), pages 111-123.
    6. Zhang, Aibo & Hao, Songhua & Li, Peng & Xie, Min & Liu, Yiliu, 2022. "Performance modeling for condition-based activation of the redundant safety system subject to harmful tests," Reliability Engineering and System Safety, Elsevier, vol. 226(C).
    7. Torres-Echeverría, A.C. & Martorell, S. & Thompson, H.A., 2012. "Multi-objective optimization of design and testing of safety instrumented systems with MooN voting architectures using a genetic algorithm," Reliability Engineering and System Safety, Elsevier, vol. 106(C), pages 45-60.
    8. Mechri, Walid & Simon, Christophe & BenOthman, Kamel, 2015. "Switching Markov chains for a holistic modeling of SIS unavailability," Reliability Engineering and System Safety, Elsevier, vol. 133(C), pages 212-222.
    9. Martorell, P. & Martón, I. & Sánchez, A.I. & Martorell, S., 2017. "Unavailability model for demand-caused failures of safety components addressing degradation by demand-induced stress, maintenance effectiveness and test efficiency," Reliability Engineering and System Safety, Elsevier, vol. 168(C), pages 18-27.
    10. Longhi, Antonio Eduardo Bier & Pessoa, Artur Alves & Garcia, Pauli Adriano de Almada, 2015. "Multiobjective optimization of strategies for operation and testing of low-demand safety instrumented systems using a genetic algorithm and fault trees," Reliability Engineering and System Safety, Elsevier, vol. 142(C), pages 525-538.
    11. Wu, Shengnan & Zhang, Laibin & Zheng, Wenpei & Liu, Yiliu & Lundteigen, Mary Ann, 2019. "Reliability modeling of subsea SISs partial testing subject to delayed restoration," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    12. Gabriel, Angelito & Ozansoy, Cagil & Shi, Juan, 2018. "Developments in SIL determination and calculation," Reliability Engineering and System Safety, Elsevier, vol. 177(C), pages 148-161.
    13. Yu Han & Jianxing Yu & Chuan Wang & Xiaobo Xie & Chao Yu & Yupeng Liu, 2023. "A fault diagnosis method for the HIPPS of FPSO unit based on dynamic Bayesian network," Journal of Risk and Reliability, , vol. 237(4), pages 752-764, August.
    14. Aboalkhair, Ahmad M. & Coolen, Frank P.A. & MacPhee, Iain M., 2014. "Nonparametric predictive inference for reliability of a k-out-of-m:G system with multiple component types," Reliability Engineering and System Safety, Elsevier, vol. 131(C), pages 298-304.
    15. Innal, Fares & Dutuit, Yves & Chebila, Mourad, 2015. "Safety and operational integrity evaluation and design optimization of safety instrumented systems," Reliability Engineering and System Safety, Elsevier, vol. 134(C), pages 32-50.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:111:y:2013:i:c:p:37-44. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.