A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things

被引:0
|
作者
Rontidis, George [1 ]
Panaousis, Emmanouil [2 ]
Laszka, Aron [3 ]
Dagiuklas, Tasos [1 ]
Malacaria, Pasquale [4 ]
Alpcan, Tansu [5 ]
机构
[1] Hellenic Open Univ, Patras, Greece
[2] Univ Brighton, Brighton, E Sussex, England
[3] Vanderbilt Univ, Inst Software Integrated Syst, Nashville, TN USA
[4] Queen Mary Univ London, London, England
[5] Univ Melbourne, Melbourne, Vic, Australia
基金
英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the Internet-of-Things (IoT), users might share part of their data with different IoT prosumers, which offer applications or services. Within this open environment, the existence of an adversary introduces security risks. These can be related, for instance, to the theft of user data, and they vary depending on the security controls that each IoT prosumer has put in place. To minimize such risks, users might seek an "optimal" set of prosumers. However, assuming the adversary has the same information as the users about the existing security measures, he can then devise which prosumers will be preferable (e.g., with the highest security levels) and attack them more intensively. This paper proposes a decision-support approach that minimizes security risks in the above scenario. We propose a non-cooperative, two-player game entitled Prosumers Selection Game (PSG). The Nash Equilibria of PSG determine subsets of prosumers that optimize users' payoffs. We refer to any game solution as the Nash Prosumers Selection (NPS), which is a vector of probabilities over subsets of prosumers. We show that when using NPS, a user faces the least expected damages. Additionally, we show that according to NPS every prosumer, even the least secure one, is selected with some non-zero probability. We have also performed simulations to compare NPS against two different heuristic selection algorithms. The former is proven to be approximately 38% more effective in terms of security-risk mitigation.
引用
收藏
页码:2639 / 2644
页数:6
相关论文
共 50 条
  • [31] Game-Theoretic Resource Allocation for Fog-Based Industrial Internet of Things Environment
    Jie, Yingmo
    Guo, Cheng
    Choo, Kim-Kwang Raymond
    Liu, Charles Zhechao
    Li, Mingchu
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) : 3041 - 3052
  • [32] Security attacks on smart grid scheduling and their defences: a game-theoretic approach
    M. Pilz
    F. Baghaei Naeini
    K. Grammont
    C. Smagghe
    M. Davis
    J.-C. Nebel
    L. Al-Fagih
    E. Pfluegel
    [J]. International Journal of Information Security, 2020, 19 : 427 - 443
  • [33] Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach
    Jin, Richeng
    He, Xiaofan
    Dai, Huaiyu
    Dutta, Rudra
    Ning, Peng
    [J]. 2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2017, : 72 - 83
  • [34] A Game-Theoretic Approach for Enhancing Security and Data Trustworthiness in IoT Applications
    Abdalzaher, Mohamed S.
    Muta, Osamu
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (11): : 11250 - 11261
  • [35] Modelling Dynamic Risks in Internet-of-Things Applications
    Samad, Javeria
    Loke, Seng W.
    Reed, Karl
    [J]. PROCEEDINGS OF THE 14TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS 2017), 2017, : 533 - 534
  • [36] Security attacks on smart grid scheduling and their defences: a game-theoretic approach
    Pilz, M.
    Naeini, F. Baghaei
    Grammont, K.
    Smagghe, C.
    Davis, M.
    Nebel, J. -C.
    Al-Fagih, L.
    Pfluegel, E.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (04) : 427 - 443
  • [37] Game-Theoretic Security Analysis of Quantum Networks
    Rass, Stefan
    Schartner, Peter
    [J]. ICQNM 2009: THIRD INTERNATIONAL CONFERENCE ON QUANTUM, NANO AND MICRO TECHNOLOGIES: PROCEEDINGS, 2009, : 20 - 25
  • [38] Decision-theoretic and game-theoretic approaches to IT security investment
    Cavusoglu, Huseyin
    Raghunathan, Srinivasan
    Yue, Wei T.
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2008, 25 (02) : 281 - 304
  • [39] Automated Game-Theoretic Verification of Security Systems
    Mu, Chunyan
    [J]. QUANTITATIVE EVALUATION OF SYSTEMS (QEST 2019), 2019, 11785 : 239 - 256
  • [40] CHECKMATE: Automated Game-Theoretic Security Reasoning
    Brugger, Lea Salome
    Kovacs, Laura
    Komel, Anja Petkovic
    Rain, Sophie
    Rawson, Michael
    [J]. PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1407 - 1421