An Effective Stackelberg Game for High-Assurance of Data Trustworthiness in WSNs

被引:0
|
作者
Abdalzaher, Mohamed S. [1 ]
Seddik, Karim [2 ]
Muta, Osamu [3 ]
机构
[1] NRIAG, Seismol Dept, Cairo, Egypt
[2] Amer Univ Cairo, Elect & Commun Engn Dept, AUC Ave, New Cairo 11835, Egypt
[3] Kyushu Univ, Ctr Japan Egypt Cooperat Sci & Technol, Fukuoka, Japan
关键词
Wireless Sensor Networks; Power Grid Networks; Game theory;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks (WSNs) security plays an intrinsic role to guarantee efficient data transmission, stable network topologies, and robust routing algorithms. In this paper, we propose a modified Stackelberg game of a previous work for high assurance of data trustworthiness in a Power Grid Network (PGN). The proposed approach is presented to mitigate a more severe attack scenario compared to that considered in the previous work; this attack scenario frequently manipulates sets of the deployed nodes in the PGN, which cannot be treated using the previously proposed approach. Our proposed scheme reduces the required number of nodes to be protected to achieve the desired data trustworthiness. Simulation results prove efficient detection for corrupted transmitted data based on limited number of nodes as compared to the previously proposed approach.
引用
收藏
页码:1257 / 1262
页数:6
相关论文
共 50 条
  • [31] Implementing a High-Assurance Smart-Card OS
    Karger, Paul A.
    Toll, David C.
    Palmer, Elaine R.
    McIntosh, Suzanne K.
    Weber, Samuel
    Edwards, Jonathan W.
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6052 : 51 - +
  • [32] Estimating software rejuvenation schedules in high-assurance systems
    Dohi, T
    Gogeva-Popstojanova, K
    Trivedi, K
    COMPUTER JOURNAL, 2001, 44 (06): : 473 - 485
  • [33] Copilot: a Do-It-Yourself High-Assurance Compiler
    Pike, Lee
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2012, (102): : 1 - 1
  • [34] New Paradigms and Tools for High-Assurance Systems Modelling
    Flammini, Francesco
    Mazzocca, Nicola
    Vittorini, Valeria
    ERCIM NEWS, 2008, (75): : 28 - 30
  • [35] High-assurance video conference system over the Internet
    Arai, M
    Kurosu, H
    Ohara, M
    Suzuki, R
    Fukumoto, S
    Iwasaki, K
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2003, E86B (10) : 2940 - 2947
  • [36] Design and verification of microprocessor systems for high-assurance applications
    Rockwell Collins, Inc., 400 Collins Road NE., Cedar Rapids, IA 52498, United States
    Des. and Verification of Microprocessor Syst. for High-Assur. Applic., (1-436):
  • [37] Proving refinement transformations for deriving high-assurance software
    Winter, VL
    Boyle, JM
    IEEE HIGH-ASSURANCE SYSTEMS ENGINEERING WORKSHOP, PROCEEDINGS, 1997, : 68 - 77
  • [38] Cryptography for a High-Assurance Web-Based Enterprise
    Chandersekaran, Coimbatore
    Simpson, William R.
    WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2013, VOL I, 2013, I : 23 - 28
  • [39] The Last Mile: High-Assurance and High-Speed Cryptographic Implementations
    Almeida, Jose Bacelar
    Barbosa, Manuel
    Barthe, Gilles
    Gregoire, Benjamin
    Koutsos, Adrien
    Laporte, Vincent
    Oliveira, Tiago
    Strub, Pierre-Yves
    2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 965 - 982
  • [40] Systematic policy analysis for high-assurance services in SELinux
    Ahn, Gail-Joon
    Xu, Wenjuan
    Zhang, Xinwen
    2008 IEEE WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2008, : 3 - +