2018
DOI: 10.1109/jiot.2017.2786546
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Connectivity Game for Adversarial Internet of Battlefield Things Systems

Abstract: In this paper, the problem of network connectivity is studied for an adversarial Internet of Battlefield Things (IoBT) system in which an attacker aims at disrupting the connectivity of the network by choosing to compromise one of the IoBT nodes at each time epoch. To counter such attacks, an IoBT defender attempts to reestablish the IoBT connectivity by either deploying new IoBT nodes or by changing the roles of existing nodes. This problem is formulated as a dynamic multistage Stackelberg connectivity game t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
32
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 39 publications
(32 citation statements)
references
References 20 publications
0
32
0
Order By: Relevance
“…The work in [3] integrates IoT and network centric warfare for the enhancement of the IoBT integrity. The authors in [4] use a feedback Stackelberg solution to dynamically optimize the connectivity of an adversarial IoBT network. The work in [5] develops a mean-field game approach to analyze the spread of misinformation in an adversarial IoBT.…”
Section: A Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The work in [3] integrates IoT and network centric warfare for the enhancement of the IoBT integrity. The authors in [4] use a feedback Stackelberg solution to dynamically optimize the connectivity of an adversarial IoBT network. The work in [5] develops a mean-field game approach to analyze the spread of misinformation in an adversarial IoBT.…”
Section: A Related Workmentioning
confidence: 99%
“…The work in [5] develops a mean-field game approach to analyze the spread of misinformation in an adversarial IoBT. Despite the promising results, these existing works [2]- [4] mostly rely on static constructs and do not consider the influence of the human players' psychology and potential bounded rationality when making decisions or choosing strategies within an IoBT setting. Indeed, the behavioral aspect of human decision making processes, leading agents to deviate from the fully rational objective behavior in an IoBT, has a direct impact on the security of the IoBT network.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…While there have been a growing body of works that address the problem of minimizing the age of information in various scenarios [5]- [10], [13], [15], [16], few works have studied this problem in an adversarial setting [17]. Since timely status updates are of particular importance to real-time monitoring and control systems, the attackers of these systems may specifically target their capability of timely updating the status [21], [22]. Therefore, it is crucial to understand how would an attacker sabotage a real-time monitoring/control system, how should the system defend against the attack, and to what extent the attacker can degrade the timeliness of status update.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, there is a need to implement cost-efficient actions that can effectively limit the spread of misinformation. Here, it is also worth noting that, recently, a number of works [18]- [21] have studied various IoBT security scenarios, however, these works do not analyze the critical problem of misinformation spread.…”
mentioning
confidence: 99%