An Effective Stackelberg Game for High-Assurance of Data Trustworthiness in WSNs

被引:0
|
作者
Abdalzaher, Mohamed S. [1 ]
Seddik, Karim [2 ]
Muta, Osamu [3 ]
机构
[1] NRIAG, Seismol Dept, Cairo, Egypt
[2] Amer Univ Cairo, Elect & Commun Engn Dept, AUC Ave, New Cairo 11835, Egypt
[3] Kyushu Univ, Ctr Japan Egypt Cooperat Sci & Technol, Fukuoka, Japan
关键词
Wireless Sensor Networks; Power Grid Networks; Game theory;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks (WSNs) security plays an intrinsic role to guarantee efficient data transmission, stable network topologies, and robust routing algorithms. In this paper, we propose a modified Stackelberg game of a previous work for high assurance of data trustworthiness in a Power Grid Network (PGN). The proposed approach is presented to mitigate a more severe attack scenario compared to that considered in the previous work; this attack scenario frequently manipulates sets of the deployed nodes in the PGN, which cannot be treated using the previously proposed approach. Our proposed scheme reduces the required number of nodes to be protected to achieve the desired data trustworthiness. Simulation results prove efficient detection for corrupted transmitted data based on limited number of nodes as compared to the previously proposed approach.
引用
收藏
页码:1257 / 1262
页数:6
相关论文
共 50 条
  • [41] A Tool-Chain for High-Assurance Cryptographic Software
    Almeida, Jose
    Barbosa, Manuel
    Pacheco, Hugo
    Pereira, Vitor
    ERCIM NEWS, 2016, (106): : 14 - +
  • [42] High-assurance field inversion for curve-based cryptography
    Hvass, Benjamin Salling
    Aranha, Diego F.
    Spitters, Bas
    2023 IEEE 36TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF, 2023, : 552 - 567
  • [43] The Mechanized Marriage of Effects and Monads with Applications to High-assurance Hardware
    Reynolds, Thomas N.
    Procter, Adam
    Harrison, William L.
    Allwein, Gerard
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2019, 18 (01)
  • [44] Using ACL2 in the Design of Efficient, Verifiable Data Structures for High-Assurance Systems
    Hardin, David
    Slind, Konrad
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2018, (280): : 61 - 76
  • [45] Lessons Learned: Building the Caernarvon High-Assurance Operating System
    Karger, Paul A.
    McIntosh, Suzanne K.
    Palmer, Elaine R.
    Toll, David C.
    Weber, Samuel
    IEEE SECURITY & PRIVACY, 2011, 9 (01) : 22 - 30
  • [46] Experiment for high-assurance video conference system over the Internet
    Arai, M
    Kurosu, H
    Ohara, M
    Suzuki, R
    Fukumoto, S
    Iwasaki, K
    7TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, PROCEEDINGS, 2002, : 137 - 142
  • [47] Lessons Learned from Building a High-Assurance Crypto Gateway
    Weissman, Clark
    Levin, Timothy E.
    IEEE SECURITY & PRIVACY, 2011, 9 (01) : 31 - 39
  • [48] Software quality prediction for high-assurance network telecommunications systems
    Xu, ZW
    Khoshgoftaar, TM
    COMPUTER JOURNAL, 2001, 44 (06): : 557 - 568
  • [49] RefinedRust: A Type System for High-Assurance Verification of Rust Programs
    Gaeher, Lennard
    Sammler, Michael
    Jung, Ralf
    Krebbers, Robbert
    Dreyer, Derek
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2024, 8 (PLDI): : 1115 - 1139
  • [50] Increased information flow needs for high-assurance composite evaluations
    Karger, PA
    Kurth, H
    SECOND IEEE INTERNATIONAL INFORMATION ASSURANCE WORKSHOP, PROCEEDINGS, 2004, : 129 - 140