Menu
Publications
2025
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
Editor-in-Chief

Nikiforov
Vladimir O.
D.Sc., Prof.
Partners
doi: 10.17586/2226-1494-2022-22-1-47-59
A Game Theory approach for communication security and safety assurance in cyber-physical systems with Reputation and Trust-based mechanisms
Read the full article

Article in English
For citation:
Abstract
For citation:
Viksnin I.I., Marinenkov E.D., Chuprov S.S. A Game Theory approach for communication security and safety assurance in cyber-physical systems with Reputation and Trust-based mechanisms. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2022, vol. 22, no. 1, pp. 47–59. doi:10.17586/2226-1494-2022-22-1-47-59
Abstract
Cyber-physical systems’ security and safety assurance is a challenging research problem for Smart City concept development. Technical faults or malicious attacks over communication between its elements can jeopardize the whole system and its users. Reputation systems implementation is an effective measure to detect such malicious agents. Each agent in the group has its indicator, which reflects how trustworthy it is to the other agents. However, in the scenario when it is not possible to calculate the Reputation indicator based on objective characteristics, malicious or defective agents can negatively affect the system’s performance. In this paper, we propose an approach based on Game Theory to address the Reputation and Trust initial values calculation challenge. We introduced a mixed strategies game concept and a probability indicator. The possible outcomes of using different strategies by the system agents are represented with a payoff matrix. To evaluate the approach effectiveness, an empirical study using a software simulation environment was conducted. As a Cyber-physical system implementation scenario, we considered an intersection management system with a group of unmanned autonomous vehicles, the aim of which is to perform conflict-free optimal intersection traversal. To simulate the attack scenario, some vehicles were able to transmit incorrect data to other traffic participants. The obtained results showed that the Game Theory approach allowed us to increase the number of detected intruders compared to the conventional Reputation and Trust model.
Keywords: Game Theory, reputation, trust; security, safety, cyber-physical systems
Acknowledgements. This work was supported by the Ministry of Science and Higher Education of the Russian Federation (Project ‘Goszadanie’ No. 075-01024-21-02 from 29.09.2021).
References
Acknowledgements. This work was supported by the Ministry of Science and Higher Education of the Russian Federation (Project ‘Goszadanie’ No. 075-01024-21-02 from 29.09.2021).
References
- Bastos D., Shackleton M., El-Moussa F. Internet of Things: A survey of technologies and security risks in smart home and city environments. IET Conference Publications, 2018, vol. 2018, no. CP740. https://doi.org/10.1049/cp.2018.0030
- Kang H.S., Lee J.Y., Choi S., Kim H., Park J.H., Son J.Y., Kim B.H., Do Noh S. Smart manufacturing: Past research, present findings, and future directions. International Journal of Precision Engineering and Manufacturing – Green Technology, 2016, vol. 3, no. 1, pp. 111–128. https://doi.org/10.1007/s40684-016-0015-5
- Wolf W. Cyber-physical systems. Computer, 2009, vol. 42, no. 3, pp. 88–89. https://doi.org/10.1109/MC.2009.81
- Tokody D., Albini A., Ady L., Rajnai Z., Pongrácz F. Safety and security through the design of autonomous intelligent vehicle systems and intelligent infrastructure in the smart city. Interdisciplinary Description of Complex Systems, 2018, vol. 16, no. 3, pp. 384–396. https://doi.org/10.7906/indecs.16.3.11
- Kalyaev I., Gaiduk A., Kapustyan S. Models and Algorithms of the Collective Control of Robots Group. Moscow, Fizmatlit Publ., 2009, 278 p. (in Russian)
- Furno L., Nielsen M.C., Blanke M. Centralised versus decentralised control reconfiguration for collaborating underwater robots. IFAC-PapersOnLine, 2015, vol. 48, no. 21, pp. 732–739. https://doi.org/10.1016/j.ifacol.2015.09.614
- Chuprov S., Viksnin I., Kim I., Marinenkov E., Usova M., Lazarev E., Melnikov T., Zakoldaev D. Reputation and trust approach for security and safety assurance in intersection management system. Energies, 2019, vol. 12, no. 23, pp. 4527. https://doi.org/10.3390/en12234527
- Marinenkov E., Chuprov S., Viksnin I., Kim I. Empirical study on trust, reputation, and game theory approach to secure communication in a group of unmanned vehicles. CEUR Workshop Proceedings, 2019, vol. 2590.
- Gibb J.R. Trust: A New View of Personal and Organizational Development. Guild of Tutors Press, 1978. 320 p.
- Mui L., Mohtashemi M., Halberstadt A. A computational model of trust and reputation. Proc. of the 35th Annual Hawaii International Conference on System Sciences, 2002, pp. 2431–2439. https://doi.org/10.1109/HICSS.2002.994181
- Schollmeier R. A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. Proc. of the 1st International Conference on Peer-to-Peer Computing (P2P), 2001, pp. 101–102. https://doi.org/10.1109/P2P.2001.990434
- Sector S. Series Y: Global information infrastructure, internet protocol aspects and next-generation networks. Next generation networks – frameworks and functional architecture models: Recommendation ITU-T Y 2012 / International Telecommunication Union. Switzerland, Geneva, P. 2060.
- Singh A., Kumar M., Rishi R., Madan D. A relative study of MANET and VANET: Its applications, broadcasting approaches and challenging issues. Communications in Computer and Information Science, 2011, vol. 132 CCIS, part 2, pp. 627–632. https://doi.org/10.1007/978-3-642-17878-8_63
- Chmaj G., Walkowiak K. A P2P computing system for overlay networks. Future Generation Computer Systems, 2013, vol. 29, no. 1, pp. 242–249. https://doi.org/10.1016/j.future.2010.11.009
- Nojoumian M., Stinson D.R. Social secret sharing in cloud computing using a new trust function. Proc. of the 10th Annual International Conference on Privacy, Security and Trust (PST), 2012, pp. 161–167. https://doi.org/10.1109/PST.2012.6297936
- Straub J., McMillan J., Yaniero B., Schumacher M., Almosalami A., Boatey K., Hartman J. CyberSecurity considerations for an interconnected self-driving car system of systems. Proc. of the 12th System of Systems Engineering Conference (SoSE), 2017, pp. 7994973. https://doi.org/10.1109/SYSOSE.2017.7994973
- Kim I., Viksnin I. Secure information interaction within a group of unmanned aerial vehicles based on economic approach. Advances in Intelligent Systems and Computing, 2019, vol. 997, pp. 59–72. https://doi.org/10.1007/978-3-030-22871-2_5
- Pham T.N.D., Yeo C.K. Adaptive trust and privacy management framework for vehicular networks. Vehicular Communications, 2018, vol. 13, pp. 1–12. https://doi.org/10.1016/j.vehcom.2018.04.006
- Chuprov S., Viksnin I., Kim I., Nedosekin G. Optimization of autonomous vehicles movement in urban intersection management system. Proc. of the 24th Conference of Open Innovations Association (FRUCT), 2019, pp. 60–66. https://doi.org/10.23919/FRUCT.2019.8711967
- Basar T., Zaccour G. Handbook of Dynamic Game Theory. Springer, 2018.
- Fielder A., Panaousis E., Malacaria P., Hankin C., Smeraldi F. Game theory meets information security management. IFIP Advances in Information and Communication Technology, 2014, vol. 428, pp. 15–29. https://doi.org/10.1007/978-3-642-55415-5_2
- Roy S., Ellis C., Shiva S., Dasgupta D., Shandilya V., Wu Q. A survey of game theory as applied to network security. Proc. of the 43rd Hawaii International Conference on System Sciences (HICSS-43), 2010, pp. 5428673. https://doi.org/10.1109/HICSS.2010.35
- Sun W., Kong X., He D., You X. Information security problem research based on game theory. Proc. of the International Symposium on Electronic Commerce and Security (ISECS), 2008, pp. 554–557. https://doi.org/10.1109/ISECS.2008.147
- Guo J., Chen R. A classification of trust computation models for service-oriented internet of things systems. Proc. of the IEEE International Conference on Services Computing, 2015, pp. 324–331. https://doi.org/10.1109/SCC.2015.52
- Bankovic Z., Vallejo J.C., Fraga D., Moya J.M. Detecting false testimonies in reputation systems using self-organizing maps. Logic Journal of the IGPL, 2013, vol. 21, no. 4, pp. 549–559. https://doi.org/10.1093/jigpal/jzs028
- Li W., Song H., Zeng F. Policy-based secure and trustworthy sensing for internet of things in smart cities. IEEE Internet of Things Journal, 2018, vol. 5, no. 2, pp. 716–723. https://doi.org/10.1109/JIOT.2017.2720635
- Rawat D.B., Yan G., Bista B.B., Weigle M.C. Trust on the security of wireless vehicular Ad-hoc Networking. Ad-Hoc and Sensor Wireless Networks, 2015, vol. 24, no. 3-4, pp. 283–305.
- Petrosian L.A., Zenkevich N.A., Shevkoplias E.V. Game Theory. St. Petersburg, BHV-Peterburg, 2012, 432 p. (in Russian)
- Kuzin L. Foundations of Cybernetics. In 2 vol. Moscow, Energia Publ., 1979. (in Russian)
- Perrone L.F., Nelson S.C. A study of on-off attack models for wireless ad hoc networks. Proc. of the 1st Workshop on Operator-Assisted (Wireless Mesh) Community Networks (OpComm), 2006, pp. 4138221. https://doi.org/10.1109/WOACN.2006.337180
- Baker C.A.B., Ramchurn S., Teacy W.T.L., Jennings N.R. Planning search and rescue missions for UAV teams. Frontiers in Artificial Intelligence and Applications, 2016, vol. 285, pp. 1777–1778. https://doi.org/10.3233/978-1-61499-672-9-1777