The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Stackelberg security games are represented by a Stackelberg model for multiple defenders and attackers. The dynamics of the game involves defenders trying to allocate their limited resources to defend important targets, and attackers observing the behavior of the defenders, look for the most advantageous target to harm. The computation of the equilibrium point is a fundamental issue for Stackelberg...
With the huge develop of low consumption wireless devices both for industry and human wellness and comfort, such as Wireless Body Area Network for health active care and Wireless Sensors Networks for industry environments, new challenges are proposed for the both industry and scientific community. Security is one of this matters. Given the specific characteristics of the low consumptions modern devices,...
Arms race is a typical conflict among rational and non-myopic decision-makers (DMs). Nevertheless, the assumption of basis graph model for conflict resolution (GMCR) is not suitable for this issue that each DM possesses identical priority disregarding the difference of their capabilities. In order to handle with this drawback, this paper proposes a novel methodology, entitled capability-based GMCR...
The interplay between an intrusion detection mechanism and a false data injection mechanism is investigated in this work in the context of an infinite horizon Linear Quadratic Gaussian Control System (LQG). A game theoretic framework is proposed between the attacker, who wishes to impair the operation of the control system while remaining stealthy, and the detector, who wishes to detect the presence...
We introduce a novel mathematical model that treats network security as a game between cyber attackers and network administrators. The model takes the form of a zero-sum repeated game where each sub-game corresponds to a possible state of the attacker. Our formulation views state as the set of compromised edges in a graph opposed to the more traditional node-based view. This provides a more expressive...
Thanks to the advent of interactive technologies, education institutions are looking for innovative teaching methods to increase the engagement and reach of students. Besides the uprise of MOOCs, gamification has been shown to produce positive results when it comes to increasing people's engagement and interest in conducting tasks. Unfortunately, the application and benefits of these technologies...
With the tremendous popularity of smartphones and other portable devices, crowdsensing applications have become a center of attention in recent years. Different mechanisms have been designed to incentivize mobile users to participate in crowdsensing. However, there are still many open issues needed to be investigated for these incentive mechanisms. In this paper, we systematically study the collusion...
How to enhance security and stability of the cyber physical systems (CPSs) becomes a critical issue. In this paper, we propose a solution from the perspective of users' information diffusion process in CPCs. Relying on the virus propagation model, we conceive an idle-carrier-idle (ICI) model to characterize the information diffusion. Moreover, `effective diffusion rate' is defined in order to benchmark...
There is no doubt that security issues are on the rise and defense mechanisms are becoming one of the leading subjects for academic and industry experts. In this paper, we focus on the security domain and envision a new way of looking at the security life cycle. We utilize our vision to propose an asset-based approach to countermeasure zero day attacks. To evaluate our proposal, we built a prototype...
Crowdsensing, as a novel method of data collecting, environment sensing and information providing, has been widely used in place of the traditional wired sensor networks and wireless sensor network to tackle real-world challenges by leveraging mobile devices. Unfortunately, the practicality of crowdsensing can be tampered with antisocial behavior, such as free-riding, false-reporting and whitewashing...
Wireless Sensor Networks (WSNs) security plays an intrinsic role to guarantee efficient data transmission, stable network topologies, and robust routing algorithms. In this paper, we propose a modified Stackelberg game of a previous work for high assurance of data trustworthiness in a Power Grid Network (PGN). The proposed approach is presented to mitigate a more severe attack scenario compared to...
Large-scale infrastructures are critical to economic and social development, and hence their continued performance and security are of high national importance. Such an infrastructure often is a system of systems, and its functionality critically depends on the inherent robustness of its constituent systems and its defense strategy for countering attacks. Additionally, interdependencies between the...
Due to the fast boom of security threats in wireless sensor networks (WSNs) sensitive applications, we propose a game-theoretic protection approach for sensor nodes in a clustered WSN based on a repeated game. The proposed game model is developed for detecting malicious sensor nodes that drop the high priority packets (HPPs) aiming at maximizing the high priority data trustworthiness (HPT). Simulation...
In many Internet of ing (IoT) application domains security is a critical requirement, because malicious parties can undermine the eectiveness of IoT-based systems by compromising single components and/or communication channels. us, a security infrastructure is needed to ensure the proper functioning of such systems even under aack. However, it is also critical that security be at a reasonable resource...
in mobile social networks, legitimate transmitting nodes can be contrasted by malicious attackers acting on the purpose of disrupting communication. Our aim is to use game theory to identify malicious nodes. With respect to previous similar formulations, we consider a wider array of action options for the players, notably we include a choice about whether to engage or not in packet exchanging, and...
Security evaluation of diverse SDN frameworks is of significant importance to design resilient systems and deal with attacks. Focused on SDN scenarios, a game-theoretic model is proposed to analyze their security performance in existing SDN architectures. The model can describe specific traits in different structures, represent several types of information of players (attacker and defender) and quantitatively...
We study a two-player zero-sum game in which one of the players is restricted to mixed strategies with limited randomness. More precisely, we consider the maximum payoff that the maximizer (Alice) can secure with limited randomness h. This problem finds an operational interpretation in the context of repeated games with non-ideal sources of randomness. The computational aspects of this problem has...
Insider attacks in which misbehaving Virtual Machines (VMs) take part of the cloud system and learn about its internal vulnerabilities constitute a major threat against cloud resources and infrastructure. This demands setting up continuous and comprehensive security arrangements to restrict the effects of such attacks. However, limited security resources prohibit full detection coverage on all VMs...
Content-adaptive image steganography means that steganographer chooses embedding positions based on image textures. Steganalyst can also focus on detecting these positions according to image textures. Game theory is preferred to analyze the above situation. However, in previous game models, steganalyst will mistakenly identify that no bit is embedded, when the secret bit is the same as the least significant...
New retail applications induce integration of many components as NFC (Near Field Communication), M2M (Machine-to-Machine), IoT (Internet of Things), Web applications, etc. in large business sectors, such as payment services, products manufacturing, supply chain management, etc. Sensors, integrated in everyday products may facilitate threats as users tracking and profiling. An increasing concern about...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.