Resilience Against Bad Mouthing Attacks in Mobile Crowdsensing Systems via Cyber Deception

被引:3
|
作者
Roy, Prithwiraj [1 ]
Bhattacharjee, Shameek [2 ]
Alsheakh, Hussein [2 ]
Das, Sajal K. [1 ]
机构
[1] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO 65409 USA
[2] Western Michigan Univ, Dept Comp Sci, Kalamazoo, MI 49008 USA
来源
2021 IEEE 22ND INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM 2021) | 2021年
关键词
Mobile Crowdsensing Security; Moving Target Defense; Trust; Cyber Deception; Security of AI;
D O I
10.1109/WoWMoM51794.2021.00030
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Mobile Crowdsensing System (MCS) applications deploy rating feedback mechanisms to help quantify the trustworthiness of published events which over time improve decision accuracy and establish user reputation. In this paper, we first show that factors such as sparseness, inherent error probabilities of rating feedback labelers, and prior knowledge of the event trust scoring models, can be used by strategic adversaries to hijack the feedback labeling mechanism itself with bad mouthing attacks. Then, we propose a randomized rating sub-sampling technique inspired from moving target defense and cyber deception to mitigate the degradation in the resulting event trust scores of truthful events. We offer a game theoretic strategy under various knowledge levels of an adversary and the MCS in regards to picking an optimal sub-sample size for bad mouthing attacks and event trust calculations respectively, by using a vehicular crowdsensing as a proof-of-concept.
引用
收藏
页码:169 / 178
页数:10
相关论文
共 50 条
  • [31] A Bayesian Algorithm to Enhance the Resilience of WAMS Applications Against Cyber Attacks
    Khalid, Haris M.
    Peng, Jimmy C. -H.
    IEEE TRANSACTIONS ON SMART GRID, 2016, 7 (04) : 2026 - 2037
  • [32] Quantifying Cyber-Resilience Against Resource-Exhaustion Attacks
    Fink, Glenn A.
    Griswold, Richard L.
    Beech, Zachary W.
    2014 7TH INTERNATIONAL SYMPOSIUM ON RESILIENT CONTROL SYSTEMS (ISRCS), 2014,
  • [33] Cyber Network Resilience Against Self-Propagating Malware Attacks
    Chernikova, Alesia
    Gozzi, Nicolo
    Boboila, Simona
    Angadi, Priyanka
    Loughner, John
    Wilden, Matthew
    Perra, Nicola
    Eliassi-Rad, Tina
    Oprea, Alina
    COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 531 - 550
  • [34] Stabilization of Linear Cyber-Physical Systems Against Attacks via Switching Defense
    Liu, Shenyu
    Martinez, Sonia
    Cortes, Jorge
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (12) : 7326 - 7341
  • [35] CIMA: Compiler-Enforced Resilience Against Memory Safety Attacks in Cyber-Physical Systems
    Chekole, Eyasu Getahun
    Chattopadhyay, Sudipta
    Ochoa, Martin
    Guo, Huaqun
    Cheramangalath, Unnikrishnan
    COMPUTERS & SECURITY, 2020, 94
  • [36] Synthesis of sensor deception attacks at the supervisory layer of Cyber-Physical Systems
    Meira-Goes, Romulo
    Kang, Eunsuk
    Kwong, Raymond H.
    Lafortune, Stephane
    AUTOMATICA, 2020, 121
  • [37] Optimal Intermittent Deception Attacks With Energy Constraints for Cyber-Physical Systems
    Liu, Xuan
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54 (10): : 5889 - 5900
  • [38] Adaptive control of cyber-physical systems under deception and injection attacks
    Yang, Yue
    Huang, Jiangshuai
    Su, Xiaojie
    Deng, Benmin
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2021, 358 (12): : 6174 - 6194
  • [39] Real-time detection of deception attacks in cyber-physical systems
    Feiyang Cai
    Xenofon Koutsoukos
    International Journal of Information Security, 2023, 22 : 1099 - 1114
  • [40] Detection, reconstruction and mitigation of deception attacks in nonlinear cyber-physical systems
    Shahriari-kahkeshi, Maryam
    Alem, Sayed Amirhosein
    Shi, Peng
    INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING, 2024, 38 (09) : 2972 - 2995