A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things

被引:0
|
作者
Rontidis, George [1 ]
Panaousis, Emmanouil [2 ]
Laszka, Aron [3 ]
Dagiuklas, Tasos [1 ]
Malacaria, Pasquale [4 ]
Alpcan, Tansu [5 ]
机构
[1] Hellenic Open Univ, Patras, Greece
[2] Univ Brighton, Brighton, E Sussex, England
[3] Vanderbilt Univ, Inst Software Integrated Syst, Nashville, TN USA
[4] Queen Mary Univ London, London, England
[5] Univ Melbourne, Melbourne, Vic, Australia
基金
英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the Internet-of-Things (IoT), users might share part of their data with different IoT prosumers, which offer applications or services. Within this open environment, the existence of an adversary introduces security risks. These can be related, for instance, to the theft of user data, and they vary depending on the security controls that each IoT prosumer has put in place. To minimize such risks, users might seek an "optimal" set of prosumers. However, assuming the adversary has the same information as the users about the existing security measures, he can then devise which prosumers will be preferable (e.g., with the highest security levels) and attack them more intensively. This paper proposes a decision-support approach that minimizes security risks in the above scenario. We propose a non-cooperative, two-player game entitled Prosumers Selection Game (PSG). The Nash Equilibria of PSG determine subsets of prosumers that optimize users' payoffs. We refer to any game solution as the Nash Prosumers Selection (NPS), which is a vector of probabilities over subsets of prosumers. We show that when using NPS, a user faces the least expected damages. Additionally, we show that according to NPS every prosumer, even the least secure one, is selected with some non-zero probability. We have also performed simulations to compare NPS against two different heuristic selection algorithms. The former is proven to be approximately 38% more effective in terms of security-risk mitigation.
引用
收藏
页码:2639 / 2644
页数:6
相关论文
共 50 条
  • [31] A Comprehensive Study of Security of Internet-of-Things
    Mosenia, Arsalan
    Jha, Niraj K.
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2017, 5 (04) : 586 - 602
  • [32] Desuetudo: A Game-Theoretic Approach
    Faroldi, Federico L. G.
    ARCHIV FUR RECHTS- UND SOZIALPHILOSOPHIE, 2021, 107 (02): : 289 - 299
  • [33] A game-theoretic approach to behavioral food risks: The case of grain producers
    Hirschauer, Norbert
    Musshoff, Oliver
    FOOD POLICY, 2007, 32 (02) : 246 - 265
  • [34] Game-Theoretic Resource Allocation for Fog-Based Industrial Internet of Things Environment
    Jie, Yingmo
    Guo, Cheng
    Choo, Kim-Kwang Raymond
    Liu, Charles Zhechao
    Li, Mingchu
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) : 3041 - 3052
  • [35] Security attacks on smart grid scheduling and their defences: a game-theoretic approach
    M. Pilz
    F. Baghaei Naeini
    K. Grammont
    C. Smagghe
    M. Davis
    J.-C. Nebel
    L. Al-Fagih
    E. Pfluegel
    International Journal of Information Security, 2020, 19 : 427 - 443
  • [36] A Game-theoretic approach to security and power conservation in wireless sensor networks
    Agah, A. (aagah@wcupa.edu), 1600, Femto Technique Co., Ltd. (15):
  • [37] Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach
    Jin, Richeng
    He, Xiaofan
    Dai, Huaiyu
    Dutta, Rudra
    Ning, Peng
    2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2017, : 72 - 83
  • [38] Modelling Dynamic Risks in Internet-of-Things Applications
    Samad, Javeria
    Loke, Seng W.
    Reed, Karl
    PROCEEDINGS OF THE 14TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS 2017), 2017, : 533 - 534
  • [39] A Game-Theoretic Approach for Enhancing Security and Data Trustworthiness in IoT Applications
    Abdalzaher, Mohamed S.
    Muta, Osamu
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (11): : 11250 - 11261
  • [40] Security attacks on smart grid scheduling and their defences: a game-theoretic approach
    Pilz, M.
    Naeini, F. Baghaei
    Grammont, K.
    Smagghe, C.
    Davis, M.
    Nebel, J. -C.
    Al-Fagih, L.
    Pfluegel, E.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (04) : 427 - 443