Interdependent Strategic Security Risk Management with Bounded Rationality in the Internet of Things

05/22/2019
by   Juntao Chen, et al.
0

With the increasing connectivity enabled by the Internet of Things (IoT), security becomes a critical concern, and the users should invest to secure their IoT applications. Due to the massive devices in the IoT network, users cannot be aware of the security policies taken by all its connected neighbors. Instead, a user makes security decisions based on the cyber risks he perceives by observing a selected number of nodes. To this end, we propose a model which incorporates the limited attention or bounded rationality nature of players in the IoT. Specifically, each individual builds a sparse cognitive network of nodes to respond to. Based on this simplified cognitive network representation, each user then determines his security management policy by minimizing his own real-world security cost. The bounded rational decision-makings of players and their cognitive network formations are interdependent and thus should be addressed in a holistic manner. We establish a games-in-games framework and propose a Gestalt Nash equilibrium (GNE) solution concept to characterize the decisions of agents, and quantify their risk of bounded perception due to the limited attention. In addition, we design a proximal-based iterative algorithm to compute the GNE. With case studies of smart communities, the designed algorithm can successfully identify the critical users whose decisions need to be taken into account by the other users during the security management.

READ FULL TEXT
research
11/22/2019

FlipIn: A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things

Internet of Things (IoT) is highly vulnerable to emerging Advanced Persi...
research
07/26/2021

A Dynamic Game Approach to Designing Secure Interdependent IoT-Enabled Infrastructure Network

The emerging Internet of Things (IoT) applications that leverage ubiquit...
research
05/31/2021

GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security

Internet-of-Things (IoT) and cyber-physical systems (CPSs) may consist o...
research
01/27/2022

Accountability and Insurance in IoT Supply Chain

Supply chain security has become a growing concern in security risk anal...
research
10/09/2018

A software-defined architecture for control of IoT Cyberphysical Systems

Based on software-defined principles, we propose a holistic architecture...
research
05/01/2018

iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things

The cloud-enabled Internet of controlled things (IoCT) envisions a netwo...

Please sign up or login with your details

Forgot password? Click here to reset