iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things

05/01/2018
by   Jeffrey Pawlick, et al.
0

The cloud-enabled Internet of controlled things (IoCT) envisions a network of sensors, controllers, and actuators connected through a local cloud in order to intelligently control physical devices. Because cloud services are vulnerable to advanced persistent threats (APTs), each device in the IoCT must strategically decide whether to trust cloud services that may be compromised. In this paper, we present iSTRICT, an interdependent strategic trust mechanism for the cloud-enabled IoCT. iSTRICT is composed of three interdependent layers. In the cloud layer, iSTRICT uses FlipIt games to conceptualize APTs. In the communication layer, it captures the interaction between devices and the cloud using signaling games. In the physical layer, iSTRICT uses optimal control to quantify the utilities in the higher level games. Best response dynamics link the three layers in an overall "game-of-games," for which the outcome is captured by a concept called Gestalt Nash equilibrium (GNE). We prove the existence of a GNE under a set of natural assumptions and develop an adaptive algorithm to iteratively compute the equilibrium. Finally, we apply iSTRICT to trust management for autonomous vehicles that rely on measurements from remote sources. We show that strategic trust in the communication layer achieves a worst-case probability of compromise for any attack and defense costs in the cyber layer.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/19/2022

An Intelligent Trust Cloud Management Method for Secure Clustering in 5G enabled Internet of Medical Things

5G edge computing enabled Internet of Medical Things (IoMT) is an effici...
research
02/08/2019

Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation

Deception is a technique to mislead human or computer systems by manipul...
research
09/06/2018

Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception

Security challenges accompany the efficiency. The pervasive integration ...
research
02/05/2016

Strategic disclosure of opinions on a social network

We study the strategic aspects of social influence in a society of agent...
research
11/22/2019

FlipIn: A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things

Internet of Things (IoT) is highly vulnerable to emerging Advanced Persi...
research
05/22/2019

Interdependent Strategic Security Risk Management with Bounded Rationality in the Internet of Things

With the increasing connectivity enabled by the Internet of Things (IoT)...
research
12/11/2017

I Trust my Zombies: A Trust-enabled Botnet

Defending against botnets has always been a cat and mouse game. Cyber-se...

Please sign up or login with your details

Forgot password? Click here to reset