The security community has witnessed a significant
increase in the number of different types of security threats.
This situation calls for the design of new techniques that can
be incorporated into security protocols to meet these challenges
successfully. An important tool for developing new security protocols
as well as estimating their effectiveness is game theory. This
game theory framework usually involves two players or agents:
1) a protector and 2) an adversary, and two patterns of agent
behavior are considered: 1) selfish behavior, where each of the
agents wants to maximize his payoff; and 2) leader and follower
behavior, where one agent (the leader) expects that the other
agent (the follower) will respond to the leader’s strategy. Such
an approach assumes that the agents agree on which strategy to
apply in advance. In this paper, this strong assumption is relaxed.
Namely, the following question is considered: what happens if it
is unknown a priori what pattern of behavior the adversary is
going to use