Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things

Published: 01 November 2019 Publication History

Abstract

With the increasing connectivity enabled by the Internet of Things (IoT), security becomes a critical concern, and users should invest to secure their IoT applications. Due to the massive devices in the IoT network, users cannot be aware of the security policies taken by all its connected neighbors. Instead, a user makes security decisions based on the cyber risks that he perceives by observing a selected number of nodes. To this end, we propose a model which incorporates the limited attention or bounded rationality nature of players in the IoT. Specifically, each individual builds a sparse cognitive network of nodes to respond to. Based on this simplified cognitive network representation, each user then determines his security management policy by minimizing his own real-world security cost. The bounded rational decision-makings of players and their cognitive network formations are interdependent and thus should be addressed in a holistic manner. We establish a games-in-games framework and propose a Gestalt Nash equilibrium (GNE) solution concept to characterize the decisions of agents and quantify their risk of bounded perception due to the limited attention. In addition, we design a proximal-based iterative algorithm to compute the GNE. With case studies of smart communities, the designed algorithm can successfully identify the critical users whose decisions need to be taken into account by the other users during the security management.

Cited By

View all
  • (2024)Consistency of Stackelberg and Nash Equilibria in Three-Player Leader-Follower GamesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.339719619(5330-5344)Online publication date: 6-May-2024
  • (2024)Towards an integrated risk analysis security framework according to a systematic analysis of existing proposalsFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-023-1582-618:3Online publication date: 1-Jun-2024
  • (2023)A lightweight hierarchical key management approach for internet of thingsJournal of Information Security and Applications10.1016/j.jisa.2023.10348575:COnline publication date: 26-Jul-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security  Volume 14, Issue 11
November 2019
140 pages

Publisher

IEEE Press

Publication History

Published: 01 November 2019

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Consistency of Stackelberg and Nash Equilibria in Three-Player Leader-Follower GamesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.339719619(5330-5344)Online publication date: 6-May-2024
  • (2024)Towards an integrated risk analysis security framework according to a systematic analysis of existing proposalsFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-023-1582-618:3Online publication date: 1-Jun-2024
  • (2023)A lightweight hierarchical key management approach for internet of thingsJournal of Information Security and Applications10.1016/j.jisa.2023.10348575:COnline publication date: 26-Jul-2023
  • (2022)A Data Symmetry Algorithm-Based Security Awareness Model for Emergency Wireless Communication under Multisensor FusionMobile Information Systems10.1155/2022/20676282022Online publication date: 1-Jan-2022
  • (2021)Home Automation and RFID-Based Internet of Things SecuritySecurity and Communication Networks10.1155/2021/17235352021Online publication date: 28-Nov-2021
  • (2019)Incentivizing effort in interdependent security games using resource poolingProceedings of the 14th Workshop on the Economics of Networks, Systems and Computation10.1145/3338506.3340272(1-6)Online publication date: 28-Jun-2019
  • (2019)A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure NetworkIEEE Transactions on Information Forensics and Security10.1109/TIFS.2019.292413015(462-474)Online publication date: 17-Sep-2019

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media