doi: 10.17586/2226-1494-2022-22-1-47-59


A Game Theory approach for communication security and safety assurance in cyber-physical systems with Reputation and Trust-based mechanisms

I. I. Viksnin, E. D. Marinenkov, S. S. Chuprov


Read the full article  ';
Article in English

For citation:
Viksnin I.I., Marinenkov E.D., Chuprov S.S. A Game Theory approach for communication security and safety assurance in cyber-physical systems with Reputation and Trust-based mechanisms. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2022, vol. 22, no. 1, pp. 47–59. doi:10.17586/2226-1494-2022-22-1-47-59


Abstract
Cyber-physical systems’ security and safety assurance is a challenging research problem for Smart City concept development. Technical faults or malicious attacks over communication between its elements can jeopardize the whole system and its users. Reputation systems implementation is an effective measure to detect such malicious agents. Each agent in the group has its indicator, which reflects how trustworthy it is to the other agents. However, in the scenario when it is not possible to calculate the Reputation indicator based on objective characteristics, malicious or defective agents can negatively affect the system’s performance. In this paper, we propose an approach based on Game Theory to address the Reputation and Trust initial values calculation challenge. We introduced a mixed strategies game concept and a probability indicator. The possible outcomes of using different strategies by the system agents are represented with a payoff matrix. To evaluate the approach effectiveness, an empirical study using a software simulation environment was conducted. As a Cyber-physical system implementation scenario, we considered an intersection management system with a group of unmanned autonomous vehicles, the aim of which is to perform conflict-free optimal intersection traversal. To simulate the attack scenario, some vehicles were able to transmit incorrect data to other traffic participants. The obtained results showed that the Game Theory approach allowed us to increase the number of detected intruders compared to the conventional Reputation and Trust model.

Keywords: Game Theory, reputation, trust; security, safety, cyber-physical systems

Acknowledgements. This work was supported by the Ministry of Science and Higher Education of the Russian Federation (Project ‘Goszadanie’ No. 075-01024-21-02 from 29.09.2021).

References
  1. Bastos D., Shackleton M., El-Moussa F. Internet of Things: A survey of technologies and security risks in smart home and city environments. IET Conference Publications, 2018, vol. 2018, no. CP740. https://doi.org/10.1049/cp.2018.0030
  2. Kang H.S., Lee J.Y., Choi S., Kim H., Park J.H., Son J.Y., Kim B.H., Do Noh S. Smart manufacturing: Past research, present findings, and future directions. International Journal of Precision Engineering and Manufacturing – Green Technology, 2016, vol. 3, no. 1, pp. 111–128. https://doi.org/10.1007/s40684-016-0015-5
  3. Wolf W. Cyber-physical systems. Computer, 2009, vol. 42, no. 3, pp. 88–89. https://doi.org/10.1109/MC.2009.81
  4. Tokody D., Albini A., Ady L., Rajnai Z., Pongrácz F. Safety and security through the design of autonomous intelligent vehicle systems and intelligent infrastructure in the smart city. Interdisciplinary Description of Complex Systems, 2018, vol. 16, no. 3, pp. 384–396. https://doi.org/10.7906/indecs.16.3.11
  5. Kalyaev I., Gaiduk A., Kapustyan S. Models and Algorithms of the Collective Control of Robots Group. Moscow, Fizmatlit Publ., 2009, 278 p. (in Russian)
  6. Furno L., Nielsen M.C., Blanke M. Centralised versus decentralised control reconfiguration for collaborating underwater robots. IFAC-PapersOnLine, 2015, vol. 48, no. 21, pp. 732–739. https://doi.org/10.1016/j.ifacol.2015.09.614
  7. Chuprov S., Viksnin I., Kim I., Marinenkov E., Usova M., Lazarev E., Melnikov T., Zakoldaev D. Reputation and trust approach for security and safety assurance in intersection management system. Energies, 2019, vol. 12, no. 23, pp. 4527. https://doi.org/10.3390/en12234527
  8. Marinenkov E., Chuprov S., Viksnin I., Kim I. Empirical study on trust, reputation, and game theory approach to secure communication in a group of unmanned vehicles. CEUR Workshop Proceedings, 2019, vol. 2590.
  9. Gibb J.R. Trust: A New View of Personal and Organizational Development. Guild of Tutors Press, 1978. 320 p.
  10. Mui L., Mohtashemi M., Halberstadt A. A computational model of trust and reputation. Proc. of the 35th Annual Hawaii International Conference on System Sciences, 2002, pp. 2431–2439. https://doi.org/10.1109/HICSS.2002.994181
  11. Schollmeier R. A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. Proc. of the 1st International Conference on Peer-to-Peer Computing (P2P), 2001, pp. 101–102. https://doi.org/10.1109/P2P.2001.990434
  12. Sector S. Series Y: Global information infrastructure, internet protocol aspects and next-generation networks. Next generation networks – frameworks and functional architecture models: Recommendation ITU-T Y 2012 / International Telecommunication Union. Switzerland, Geneva, P. 2060.
  13. Singh A., Kumar M., Rishi R., Madan D. A relative study of MANET and VANET: Its applications, broadcasting approaches and challenging issues. Communications in Computer and Information Science, 2011, vol. 132 CCIS, part 2, pp. 627–632. https://doi.org/10.1007/978-3-642-17878-8_63
  14. Chmaj G., Walkowiak K. A P2P computing system for overlay networks. Future Generation Computer Systems, 2013, vol. 29, no. 1, pp. 242–249. https://doi.org/10.1016/j.future.2010.11.009
  15. Nojoumian M., Stinson D.R. Social secret sharing in cloud computing using a new trust function. Proc. of the 10th Annual International Conference on Privacy, Security and Trust (PST), 2012, pp. 161–167. https://doi.org/10.1109/PST.2012.6297936
  16. Straub J., McMillan J., Yaniero B., Schumacher M., Almosalami A., Boatey K., Hartman J. CyberSecurity considerations for an interconnected self-driving car system of systems. Proc. of the 12th System of Systems Engineering Conference (SoSE), 2017, pp. 7994973. https://doi.org/10.1109/SYSOSE.2017.7994973
  17. Kim I., Viksnin I. Secure information interaction within a group of unmanned aerial vehicles based on economic approach. Advances in Intelligent Systems and Computing, 2019, vol. 997, pp. 59–72. https://doi.org/10.1007/978-3-030-22871-2_5
  18. Pham T.N.D., Yeo C.K. Adaptive trust and privacy management framework for vehicular networks. Vehicular Communications, 2018, vol. 13, pp. 1–12. https://doi.org/10.1016/j.vehcom.2018.04.006
  19. Chuprov S., Viksnin I., Kim I., Nedosekin G. Optimization of autonomous vehicles movement in urban intersection management system. Proc. of the 24th Conference of Open Innovations Association (FRUCT), 2019, pp. 60–66. https://doi.org/10.23919/FRUCT.2019.8711967
  20. Basar T., Zaccour G. Handbook of Dynamic Game Theory. Springer, 2018.
  21. Fielder A., Panaousis E., Malacaria P., Hankin C., Smeraldi F. Game theory meets information security management. IFIP Advances in Information and Communication Technology, 2014, vol. 428, pp. 15–29. https://doi.org/10.1007/978-3-642-55415-5_2
  22. Roy S., Ellis C., Shiva S., Dasgupta D., Shandilya V., Wu Q. A survey of game theory as applied to network security. Proc. of the 43rd Hawaii International Conference on System Sciences (HICSS-43), 2010, pp. 5428673. https://doi.org/10.1109/HICSS.2010.35
  23. Sun W., Kong X., He D., You X. Information security problem research based on game theory. Proc. of the International Symposium on Electronic Commerce and Security (ISECS), 2008, pp. 554–557. https://doi.org/10.1109/ISECS.2008.147
  24. Guo J., Chen R. A classification of trust computation models for service-oriented internet of things systems. Proc. of the IEEE International Conference on Services Computing, 2015, pp. 324–331. https://doi.org/10.1109/SCC.2015.52
  25. Bankovic Z., Vallejo J.C., Fraga D., Moya J.M. Detecting false testimonies in reputation systems using self-organizing maps. Logic Journal of the IGPL, 2013, vol. 21, no. 4, pp. 549–559. https://doi.org/10.1093/jigpal/jzs028
  26. Li W., Song H., Zeng F. Policy-based secure and trustworthy sensing for internet of things in smart cities. IEEE Internet of Things Journal, 2018, vol. 5, no. 2, pp. 716–723. https://doi.org/10.1109/JIOT.2017.2720635
  27. Rawat D.B., Yan G., Bista B.B., Weigle M.C. Trust on the security of wireless vehicular Ad-hoc Networking. Ad-Hoc and Sensor Wireless Networks, 2015, vol. 24, no. 3-4, pp. 283–305.
  28. Petrosian L.A., Zenkevich N.A., Shevkoplias E.V. Game Theory. St. Petersburg, BHV-Peterburg, 2012, 432 p. (in Russian)
  29. Kuzin L. Foundations of Cybernetics. In 2 vol. Moscow, Energia Publ., 1979. (in Russian)
  30. Perrone L.F., Nelson S.C. A study of on-off attack models for wireless ad hoc networks. Proc. of the 1st Workshop on Operator-Assisted (Wireless Mesh) Community Networks (OpComm), 2006, pp. 4138221. https://doi.org/10.1109/WOACN.2006.337180
  31. Baker C.A.B., Ramchurn S., Teacy W.T.L., Jennings N.R. Planning search and rescue missions for UAV teams. Frontiers in Artificial Intelligence and Applications, 2016, vol. 285, pp. 1777–1778. https://doi.org/10.3233/978-1-61499-672-9-1777


Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Copyright 2001-2024 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.

Яндекс.Метрика