Konstantinos Maraslis
Application of a game theoretic approach in smart sensor data trustworthiness problems
Maraslis, Konstantinos; Spyridopoulos, Theodoros; Oikonomou, George; Tryfonas, Theo; Haghighi, Mo
Authors
Theo Spyridopoulos Theo.Spyridopoulos@uwe.ac.uk
Occasional Associate Lecturer - CSCT FET
George Oikonomou
Theo Tryfonas
Mo Haghighi
Abstract
© IFIP International Federation for Information Processing 2015. In this work we present an Intrusion Detection (ID) and an Intrusion Prevention (IP) model for Wireless Sensor Networks (WSNs). The attacker’s goal is to compromise the deployment by causing nodes to report faulty sensory information. The defender, who is the WSN’s operator, aims to detect the presence of faulty sensor measurements (ID) and to subsequently recover compromised nodes (IP). In order to address the conflicting interests involved, we adopt a Game Theoretic approach that takes into consideration the strategies of both players and we attempt to identify the presence of Nash Equilibria in the two games. The results are then verified in two simulation contexts: Firstly, we evaluate the model in a middleware-based WSN which uses clustering over a bespoke network stack. Subsequently, we test the model in a simulated IPv6-based sensor deployment. According to the findings, the results of both simulation models confirm the results of the theoretic one.
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 30th IFIP TC 11 International Conference, SEC 2015 |
Start Date | May 26, 2015 |
End Date | May 28, 2015 |
Acceptance Date | Feb 27, 2015 |
Publication Date | Jan 1, 2015 |
Deposit Date | Mar 16, 2016 |
Journal | IFIP Advances in Information and Communication Technology |
Print ISSN | 1868-4238 |
Publisher | Springer Verlag (Germany) |
Peer Reviewed | Peer Reviewed |
Volume | 455 |
Pages | 601-615 |
Book Title | ICT Systems Security and Privacy Protection |
DOI | https://doi.org/10.1007/978-3-319-18467-8_40 |
Keywords | game theory, smart sensors, data trustworthiness, wireless sensor networks |
Public URL | https://uwe-repository.worktribe.com/output/843150 |
Publisher URL | http://dx.doi.org/10.1007/978-3-319-18467-8_40 |
Additional Information | Title of Conference or Conference Proceedings : 30th IFIP TC 11 International Conference, SEC 2015 |
Contract Date | Mar 16, 2016 |
You might also like
A holistic approach for cyber assurance of critical infrastructure with the viable system model
(2014)
Presentation / Conference Contribution
Managing cyber security risks in industrial control systems with game theory and viable system modelling
(2014)
Presentation / Conference Contribution
Soft systems methodology in net-centric cyber defence system development
(2014)
Presentation / Conference Contribution
Efficient and interpretable real-time malware detection using random-forest
(2019)
Presentation / Conference Contribution
Applying the ACPO guidelines to building automation systems
(2015)
Presentation / Conference Contribution
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search