Honeypot Allocation for Cyber Deception in Internet of Battlefield Things Systems

被引:2
|
作者
Anwar, Ahmed H. [1 ]
Leslie, Nandi O. [2 ]
Kamhoua, Charles A. [1 ]
机构
[1] US Army, Res Lab, Adelphi, MD 20756 USA
[2] Raytheon Technol, Waltham, MA USA
关键词
D O I
10.1109/MILCOM52596.2021.9652927
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber deception plays an important role in both proactive and reactive defense systems. Internet of Battlefield things connecting smart devices of any military tactical network is of great importance. The goal of cyber deception is to provide false information regarding the network state, and topology to protect the IoBT's network devices. In this paper, we propose a novel deceptive approach based on game theory that takes into account the topological aspects of the network and the criticality of each device. To find the optimal deceptive strategy, we formulate a two-player game to study the interactions between the network defender and the adversary. The Nash equilibrium of the game model is characterized. Moreover, we propose a scalable game-solving algorithm to overcome the curse of dimensionality. This approach is based on solving a smaller in-size subgame per node. Our numerical results show that the proposed deception approach effectively reduced the impact and the reward of the attacker
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Rethinking the Honeypot for Cyber-Physical Systems
    Litchfield, Samuel
    Formby, David
    Rogers, Jonathan
    Meliopoulos, Sakis
    Beyah, Raheem
    IEEE INTERNET COMPUTING, 2016, 20 (05) : 9 - 17
  • [32] Toward an Internet of Battlefield Things: A Resilience PerspectIve
    Abdelzaher, Tarek
    Ayanian, Nora
    Basar, Tamer
    Diggavi, Suhas
    Diesner, Jana
    Ganesan, Deepak
    Govindan, Ramesh
    Jha, Susmit
    Lepoint, Tancrede
    Marlin, Benjamin
    Nahrstedt, Klara
    Nicol, David
    Rajkumar, Raj
    Russell, Stephen
    Seshia, Sanjit
    Sha, Fei
    Shenoy, Prashant
    Srivastava, Mani
    Sukhatme, Gaurav
    Swami, Ananthram
    Tabuada, Paulo
    Towsley, Don
    Vaidya, Nitin
    Veeravalli, Venu
    COMPUTER, 2018, 51 (11) : 24 - 36
  • [33] Safety and Security in Cyber-Physical Systems and Internet-of-Things Systems
    Wolf, Marilyn
    Serpanos, Dimitrios
    PROCEEDINGS OF THE IEEE, 2018, 106 (01) : 9 - 20
  • [34] Expandable Mix-Zones as a Deception Technique for Providing Location Privacy on Internet-of- Battlefield Things (IoBT) Deployments
    Butun, Ismail
    Mahgoub, Imadeldin
    IEEE ACCESS, 2024, 12 : 149647 - 149661
  • [35] Honeypot-Based Cyber Deception Against Malicious Reconnaissance via Hypergame Theory
    Anwar, Ahmed H.
    Zhu, Mu
    Wan, Zeilin
    Cho, Jin-Hee
    Kamhoua, Charles A.
    Singh, Munindar P.
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 3393 - 3398
  • [36] A Roadmap Toward the Resilient Internet of Things for Cyber-Physical Systems
    Ratasich, Denise
    Khalid, Faiq
    Geissler, Florian
    Grosu, Radu
    Shafique, Muhammad
    Bartocci, Ezio
    IEEE ACCESS, 2019, 7 : 13260 - 13283
  • [37] Cyber-Physical Systems and Digital Twins in the Industrial Internet of Things
    Koulamas, Christos
    Kalogeras, Athanasios
    COMPUTER, 2018, 51 (11) : 95 - 98
  • [38] Real-time Internet of things and cyber-physical systems
    Park, Kyung-Joon
    Kang, Kyungtae
    Wang, Qixin
    Lee, Dongeun
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (04):
  • [39] Cyber-Security of Industrial Internet of Things in Electric Power Systems
    Sarjan, Hamed
    Ameli, Amir
    Ghafouri, Mohsen
    IEEE ACCESS, 2022, 10 : 92390 - 92409
  • [40] An Iteratively-Improving Internet-of-Things Honeypot Experiment
    Sedlar, Urban
    Juznic, Leon Stefanic
    Volk, Mojca
    2020 INTERNATIONAL CONFERENCE ON BROADBAND COMMUNICATIONS FOR NEXT GENERATION NETWORKS AND MULTIMEDIA APPLICATIONS (COBCOM), 2020,