Visible to the public Game theoretic modeling of cyber deception in the Internet of Battlefield Things

TitleGame theoretic modeling of cyber deception in the Internet of Battlefield Things
Publication TypeConference Paper
Year of Publication2018
AuthorsKamhoua, C. A.
Conference Name2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)
Date PublishedOct. 2018
PublisherIEEE
ISBN Number978-1-5386-6596-1
Keywordsbattlefield services, command and control, command and control systems, Computational modeling, cyber deception, cyberattack, game theoretic modeling, game theory, Games, human factors, information technology, Internet, Internet of battlefield things, Internet of Things, iobt, IoBT control, IoBT systems, Monitoring, pubcrawl, Reconnaissance, resilience, Resiliency, Scalability, security counter measure, security of data
Abstract

Internet of Battlefield Things (IoBT) devices such as actuators, sensors, wearable devises, robots, drones, and autonomous vehicles, facilitate the Intelligence, Surveillance and Reconnaissance (ISR) to Command and Control and battlefield services. IoBT devices have the ability to collect operational field data, to compute on the data, and to upload its information to the network. Securing the IoBT presents additional challenges compared with traditional information technology (IT) systems. First, IoBT devices are mass produced rapidly to be low-cost commodity items without security protection in their original design. Second, IoBT devices are highly dynamic, mobile, and heterogeneous without common standards. Third, it is imperative to understand the natural world, the physical process(es) under IoBT control, and how these real-world processes can be compromised before recommending any relevant security counter measure. Moreover, unprotected IoBT devices can be used as "stepping stones" by attackers to launch more sophisticated attacks such as advanced persistent threats (APTs). As a result of these challenges, IoBT systems are the frequent targets of sophisticated cyber attack that aim to disrupt mission effectiveness.

URLhttps://ieeexplore.ieee.org/document/8636060
DOI10.1109/ALLERTON.2018.8636060
Citation Keykamhoua_game_2018