A Reinforcement Protection Game in the Internet of Things

Andrey Garnaev, Wade Trappe

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The vast scale of the Internet of Things (IoT), combined with its heterogeneous nature involving many different types of devices and machines, could lead the IoT to be vulnerable to a variety of security threats and malicious attacks. Addressing the broad array of threats requires that different security mechanisms are deployed at appropriate locations within the broader IoT communication network. In this paper, we examine this problem by applying a resource allocation approach involving a game-theoretical framework to model: (a) an attack aimed to maximize total damage to the network, and (b) an attack aimed to compromise at least one of the devices. To evaluate the probability of a successful attack we apply a contest success function, and found the associated equilibrium strategies in closed form. Additionally, we note an interesting relationship between equilibrium strategies in security reinforcement games and OFDM transmission games under hostile jamming. A criteria is designed that allows one to determine whether an IoT controller’s resources is sufficient to protect all of the IoT devices it manages.

Original languageEnglish (US)
Title of host publicationInteroperability, Safety and Security in IoT - Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Proceedings
EditorsCarlos E. Palau, Nora Cuppens, Frederic Cuppens, Alban Gabillon, Giancarlo Fortino, Antonio Guerrieri, Hakima Chaouchi
PublisherSpringer Verlag
Pages85-95
Number of pages11
ISBN (Print)9783319937960
DOIs
StatePublished - Jan 1 2018
Externally publishedYes
Event3rd International Conference on Interoperability in IoT, InterIoT 2017 on conjunction with 4th International Conference on Safety and Security in Internet of Things, SaSeIoT 2017 - Valencia, Spain
Duration: Nov 6 2017Nov 7 2017

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume242
ISSN (Print)1867-8211

Other

Other3rd International Conference on Interoperability in IoT, InterIoT 2017 on conjunction with 4th International Conference on Safety and Security in Internet of Things, SaSeIoT 2017
Country/TerritorySpain
CityValencia
Period11/6/1711/7/17

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Keywords

  • Compromised devices
  • IoT
  • Nash equilibrium
  • Security

Fingerprint

Dive into the research topics of 'A Reinforcement Protection Game in the Internet of Things'. Together they form a unique fingerprint.

Cite this