Towards Ensuring Trustworthiness in Cyber-Physical Systems: A Game-Theoretic Approach
Title | Towards Ensuring Trustworthiness in Cyber-Physical Systems: A Game-Theoretic Approach |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Jithish, J., Sankaran, S., Achuthan, K. |
Conference Name | 2020 International Conference on COMmunication Systems NETworkS (COMSNETS) |
Keywords | composability, CPS sensor nodes, Cyber-physical systems, game theoretic security, game theory, game-theoretic approach, Games, human factors, ICT, information and communication technologies, information and communication technology, Mathematical model, Nash equilibrium, Peer-to-peer computing, Predictive Metrics, pubcrawl, Scalability, secure operation, security, security threats, Sensors, Trust, Trusted Computing, trustworthiness |
Abstract | The emergence of Cyber-Physical Systems (CPSs) is a potential paradigm shift for the usage of Information and Communication Technologies (ICT). From predominantly a facilitator of information and communication services, the role of ICT in the present age has expanded to the management of objects and resources in the physical world. Thus, it is imperative to devise mechanisms to ensure the trustworthiness of data to secure vulnerable devices against security threats. This work presents an analytical framework based on non-cooperative game theory to evaluate the trustworthiness of individual sensor nodes that constitute the CPS. The proposed game-theoretic model captures the factors impacting the trustworthiness of CPS sensor nodes. Further, the model is used to estimate the Nash equilibrium solution of the game, to derive a trust threshold criterion. The trust threshold represents the minimum trust score required to be maintained by individual sensor nodes during CPS operation. Sensor nodes with trust scores below the threshold are potentially malicious and may be removed or isolated to ensure the secure operation of CPS. |
DOI | 10.1109/COMSNETS48256.2020.9027362 |
Citation Key | jithish_towards_2020 |
- information and communication technology
- trustworthiness
- Trusted Computing
- trust
- sensors
- security threats
- security
- secure operation
- pubcrawl
- Peer-to-peer computing
- Nash Equilibrium
- Mathematical model
- game theoretic security
- information and communication technologies
- ICT
- Games
- game-theoretic approach
- game theory
- cyber-physical systems
- CPS sensor nodes
- composability
- Predictive Metrics
- Scalability
- Human Factors