Excellence in Research and Innovation for Humanity

International Science Index

Select areas to restrict search in scientific publication database:
Stackelberg Security Game for Optimizing Security of Federated Internet of Things Platform Instances
This paper presents an approach for optimal cyber security decisions to protect instances of a federated Internet of Things (IoT) platform in the cloud. The presented solution implements the repeated Stackelberg Security Game (SSG) and a model called Stochastic Human behaviour model with AttRactiveness and Probability weighting (SHARP). SHARP employs the Subjective Utility Quantal Response (SUQR) for formulating a subjective utility function, which is based on the evaluations of alternative solutions during decision-making. We augment the repeated SSG (including SHARP and SUQR) with a reinforced learning algorithm called Naïve Q-Learning. Naïve Q-Learning belongs to the category of active and model-free Machine Learning (ML) techniques in which the agent (either the defender or the attacker) attempts to find an optimal security solution. In this way, we combine GT and ML algorithms for discovering optimal cyber security policies. The proposed security optimization components will be validated in a collaborative cloud platform that is based on the Industrial Internet Reference Architecture (IIRA) and its recently published security model.


[1] EY, “Cybersecurity and the Internet of Things. Insights on governance, risk and compliance”, March 2015. Online available: https://go.ey.com/1CjIS8f (Last accessed: January 9, 2017)
[2] W.S. Inbarani, C.K.C. Paul, and W.A.J. Jeevakumar, „A Survey on Security Threats and Vulnerabilities in Cloud Computing“, International Journal of Scientific & Engineering Research, Volume 4, Issue 3, March 2013.
[3] K. Dahbur, and B. Mohammad, "A Survey of Risks, Threats and Vulnerabilities in Cloud Computing.", International Conference on Intelligent Semantic Web-Services and Applications, (ISWSA '11). ACM, New York, NY, USA, 2011, Online available: http://www.jisajournal.com/content/4/1/5 (Last accessed: January 9, 2017)
[4] M. Ahmed, and M.A. Hossain, "Cloud Computing and Security Issues in the Cloud", IJNSA, Vol.6, No.1, January 2014. Online available: http://airccse.org/journal/nsa/6114nsa03.pdf (Last accessed: January 9, 2017)
[5] R. Roman, P.Najera, and J.Lopez, “Securing the Internet of Things", IEEE Computer, vol.44, pp.51-58, 2011. Online available: http://doi.org/10.1109/MC.2011.291 (Last accessed: January 9, 2017)
[6] V.O. Safonov, Trustworthy Cloud Computing, (1st Ed.), Wiley Publishing, 2016.
[7] M.A. Bamiah, and S.N. Brohi, “ Seven Deadly Threats and Vulnerabilities in Cloud Computing,” IJAEST, 2011, pp. 87-90. Online: https://www.academia.edu/4877213/Seven_Deadly_Threats_and_Vulnerabilities_in_Cloud_Computing (Last accessed: January 9, 2017)
[8] F. Brunton and H. Nissenbaum, “Vernacular resistance to data collection and analysis: a political theory of obfuscation,“ First Monday, 16(5), 2011 http://firstmonday.org/article/view/3493/2955 (Last accessed: December 16, 2016)
[9] A. Ghosh, T. Roughgarden, and M. Sundararajan, “Universally utility-maximizing privacy mechanisms,“ In Proceedings of the 41st annual ACM symposium on Theory of computing, ACM, 2009, pp. 351-360.
[10] A. Ghosh, T. Roughgarden, and M. Sundararajan, “Universally utility-maximizing privacy mechanisms,“ SIAM Journal on Computing, 41(6), pp. 1673-1693, 2012.
[11] C. Li, M. Hay, V. Rastogi, G. Miklau, and A. McGregor, “Optimizing linear counting queries under differential privacy,“ In Proceedings of the 29th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of database systems, ACM, 2010, pp 123-134.
[12] S. Ioannidis, A. Montanari, U. Weinsberg, S. Bhagat, N. Fawaz, and N. Taft, “Privacy tradeoffs in predictive analytics,“ arXiv preprint arXiv: 1403.8084, 2014.
[13] R. Shokri, G. Theodorakopoulos, C. Troncoso, J.-P. Hubaux, and J.-Y. Le Boudec, „Protecting location privacy: optimal strategy against localization attacks,“ In Proceedings of the ACM conference on Computer and Communication Security, 2012.
[14] R. Shokri, „Privacy games: optimal user-centric data obfuscation,“ In Proceedings on Privacy Enhancing Technologies 2015 (2), pp. 1-17.
[15] M.H. Manshaei, Q. Zhu, T. Alpcan, T. Basar, and J.-P. Hubaux, „Game Theory meets network security and privacy,“ ACM Computing Surveys, 45(3), 2012.
[16] R. Machado and S. Tekinay, „A survey of Game Theoretic approaches in Wireless Sensor Network,“ Computer Network 2008, 52, pp. 3047–3061.
[17] S. Shen, G. Yue, Q. Cao, and F. Yu,“A survey of Game Theory in Wireless Sensor Networks security,“ Journal of Networks, 2011, 6, pp. 521–532.
[18] A. Agah, K. Basu, S.K. and Das, “Enforcing security for prevention of DoS attack in Wireless Sensor Networks using economic modelling,“ In Proceedings of 2005 IEEE International Conference on Mobile Adhoc and Sensor Systems, Washington, DC, USA, 2005.
[19] A. Agah, K. Basu, S.K. and Das, „Preventing DoS attack in Sensor Networks: A Game Theoretic approach,“ In Proceedings of 2005 IEEE International Conference on Communications, South Korea, 2005.
[20] Y.E. Sagduyu, and A. Ephremides, „A Game Theoretic analysis of Denial of Service attacks in Wireless Random Access,“ Wireless Networks, 2009, 15, pp. 651–666.
[21] A. Agah, S.K. Das, and K. Basu, „A Game Theory based approach for security in Wireless Sensor Networks,“ In Proceedings of 2004 23rd IEEE International Performance, Computing and Communications Conference, Phoenix, AZ, USA, pp. 15–17, 2004.
[22] A. Agah, and S.K. Das, “Preventing DoS Attacks in Wireless Sensor Networks: A repeated Game Theory approach,” Int. J. Network Security 2007, 5, pp. 145–153.
[23] L. Yang, D. Mu, and X. Cai, “Preventing dropping packets attack in Sensor Networks: a Game Theory approach,“ Wuhan Univ. J. Nat. Sci. 2008, 13, pp. 631–635.
[24] H. Li, L. Lai, and R.C. Qiu, „A Denial-of-Service jamming game for remote state monitoring in Smart Grid,“ In Proceedings of 2011 45th Annual Conference on Information Sciences and Systems, MD, USA.
[25] R. Dong, L. Liu, J. Liu, and X. Xu, „Intrusion Detection System based on payoff matrix for Wireless Sensor Networks,“ In Proceedings of 2009 3rd International Conference on Genetic and Evolutionary Computing (WGEC 2009), Guilin, China, 2009.
[26] M. Kodialam and T. V. Lakshman, “Detecting network intrusions via sampling: a Game Theoretic approach," in Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE INFOCOMM 2003, (Piscataway, NJ, USA), pp. 1880--1889, IEEE Press, 2003.
[27] T. Alpacan and T. Basar,“A Game Theoretic approach to decision and analysis in network intrusion detection," in Proceedings of 43rd IEEE Conference on Decision and Control, (USA), IEEE Press, 2004.
[28] A. Patcha and J.M. Park,“ A Game Theoretic formulation for intrusion detection in mobile ad hoc networks,” International Journal of Network Security, Vol.2, No.2, PP.131–137, 2006.
[29] Y.B. Reddy, “A Game Theory approach to detect malicious nodes in Wireless Sensor Networks,” In Proceedings of 2009 3rd International Conference on Sensor Technologies and Applications, Greece, 18–23, 2009.
[30] Y.B. Reddy, and S. Srivathsan, S., “Game Theory model for selective forward attacks in Wireless Sensor Networks,“ In Proceedings of 2009 17th Mediterranean Conference on Control and Automation (MED), Thessaloniki, Greece, 2009.
[31] M. Mohi, A., Movaghar, and P.A., Zadeh, “Bayesian game approach for preventing DoS attacks in Wireless Sensor Networks.” In Proceedings of 2009 WRI International Conference on Communications and Mobile Computing, Kunming, China, 2009.
[32] P. Michiardi and R. Molva, “Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," in Proceedings of the 6th IFIP Communications and Multimedia Security Conference, 2002.
[33] M. Xie, S. Han, B. Tian, and S. Parvin, “Anomaly detection in Wireless Sensor Networks: a survey,“ Journal of Network Computing Applications, 2011, 34, pp. 1302–1325.
[34] Y. Qiu, Z. Chen, and L. Xu, “Active defence model of Wireless Sensor Networks based on evolutionary Game Theory,” In Proceedings of 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing, Chengdu, China, 2010.
[35] J. Chen, and R. Du, “Fault tolerance and security in forwarding packets using Game Theory,“ In Proceedings of the 2009 International Conference on Multimedia Information Networking and Security (MINES 2009), Hubei, China, 2009.
[36] A. Agah, K. Basu, and S. K. Das, “Security enforcement in Wireless Sensor Networks: a framework based on non-cooperative games,” Pervasive and Mobile Computing, vol. 2, Apr. 2006, pp. 137-158.
[37] X. Li and M. R. Lyu, “A novel coalitional game model for security issues in wireless networks,” In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 2008), 2008, pp. 1- 6.
[38] Y. Wang, J. Bo, and G. Li, “Research on cloud manufacturing resource allocation in distributed computing environment”, Int. Journal of Grid Distribution Computing, Vol. 8, No. 3, 2015.
[39] W. Wang, M. Chatterjee, and K. Kwiat, “Coexistence with malicious nodes: a Game Theoretic approach,” In Proc. International Conference on Game Theory for Networks (GameNets ’09), 2009, pp. 277-286.
[40] Cloud Security Alliance (CSA)’s Security Guidance for Critical Areas of Focus in Cloud Computing (2009), CSA.
[41] C. Karlof and D. Wagner,“Secure routing in Wireless Sensor Networks: attacks and countermeasures,“ Ad Hoc Networks, Volume 1, Issue 2, pp. 293-315.
[42] S. Peisert, et al., “Designed-In security for Cyber-Physical Systems,“ IEEE Computer and Reliability Societies. September/October 2014.
[43] Internet Society, “The Internet of Things: an overview,” Understanding the Issues and Challenges of a More Connected World, 2015.
[44] Song, D., Wagner, D., and Perrig, A., “Practical techniques for searches on encrypted data,“ In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, California, USA, pp. 44-55, 2000.
[45] Gentry, C., “Fully homomorphic encryption using ideal lattices,” In Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC’09), pp. 169-178, Maryland, USA, 2009.
[46] Chor, B., Kushilevitz, E., Goldreich, O., and Sudan, M., “Private Information Retrieval,“ Journal of ACM (JACM), Vol 45, No 9, pp. 965-981, 1998.
[47] P. Lee, A. Clark, B. Alomair, L. Bushnell, and R. Poovendran, "Passivity-based distributed strategies for stochastic Stackelberg Security Games," IEEE Conference on Game and Decision Theory for Security (GameSec), 2015.
[48] P. Paruchuri, J. P. Pearce, J. Marecki, M. Tambe, F. Ordonez, and S. Kraus, “Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg Games,” In Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems – Vol. 2, AAMAS, pp. 895–902, 2008.
[49] D. Kar, F. Fang, F. D. Fave, N. Sintov, and M. Tambe, „A Game of Thrones: when human behaviour models compete in repeated Stackelberg Security Games,“ In International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2015.
[50] T. H. Nguyen, R. Yang, A. Azaria, S. Kraus, and M. Tambe, “Analyzing the effectiveness of adversary modelling in security games,“ In AAAI, 2013.
[51] Savage, L. J., The Foundations of Statistics. Dover Publications. 1972.
[52] Fischhoff, B., Goitein, B. and Shapira, Z., “Subjective utility function: a model of decision-making,” American Society of Information Science 32(5): 391–399. 1981.
[53] W. Haskell, D. Kar, F. Fang, M. Tambe, S. Cheung, and E. Denicola. “Robust protection of fisheries with compass,” In Innovative Applications of Artificial Intelligence (IAAI), 2014.
[54] K. Chung, C. A. Kamhoua, K. A. Kwiat, Z. T. Kalbarczyk and R. K. Iyer, "Game Theory with learning for cyber security monitoring," 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE), Orlando, FL, 2016, pp. 1-8.
[55] A. Nair, et al., “Massively parallel methods for Deep Reinforcement learning,” Deep Learning Workshop, International Conference on Machine Learning, Lille, France, 2015. Online available: https://arxiv.org/abs/1507.04296 (Last accessed: December 16, 2016)
Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007