Game theoretic modeling of cyber deception in the Internet of Battlefield Things
Title | Game theoretic modeling of cyber deception in the Internet of Battlefield Things |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Kamhoua, C. A. |
Conference Name | 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton) |
Date Published | Oct. 2018 |
Publisher | IEEE |
ISBN Number | 978-1-5386-6596-1 |
Keywords | battlefield services, command and control, command and control systems, Computational modeling, cyber deception, cyberattack, game theoretic modeling, game theory, Games, human factors, information technology, Internet, Internet of battlefield things, Internet of Things, iobt, IoBT control, IoBT systems, Monitoring, pubcrawl, Reconnaissance, resilience, Resiliency, Scalability, security counter measure, security of data |
Abstract | Internet of Battlefield Things (IoBT) devices such as actuators, sensors, wearable devises, robots, drones, and autonomous vehicles, facilitate the Intelligence, Surveillance and Reconnaissance (ISR) to Command and Control and battlefield services. IoBT devices have the ability to collect operational field data, to compute on the data, and to upload its information to the network. Securing the IoBT presents additional challenges compared with traditional information technology (IT) systems. First, IoBT devices are mass produced rapidly to be low-cost commodity items without security protection in their original design. Second, IoBT devices are highly dynamic, mobile, and heterogeneous without common standards. Third, it is imperative to understand the natural world, the physical process(es) under IoBT control, and how these real-world processes can be compromised before recommending any relevant security counter measure. Moreover, unprotected IoBT devices can be used as "stepping stones" by attackers to launch more sophisticated attacks such as advanced persistent threats (APTs). As a result of these challenges, IoBT systems are the frequent targets of sophisticated cyber attack that aim to disrupt mission effectiveness. |
URL | https://ieeexplore.ieee.org/document/8636060 |
DOI | 10.1109/ALLERTON.2018.8636060 |
Citation Key | kamhoua_game_2018 |
- Internet of battlefield things
- security of data
- security counter measure
- Scalability
- Resiliency
- resilience
- Reconnaissance
- pubcrawl
- Monitoring
- IoBT systems
- IoBT control
- iobt
- Internet of Things
- battlefield services
- internet
- information technology
- Human Factors
- Games
- game theory
- game theoretic modeling
- cyberattack
- cyber deception
- Computational modeling
- command and control systems
- command and control