Optimal Secure Interdependent Infrastructure Network Design

In this chapter, we adopt the established model of network-of-networks to design optimal secure interdependent IoT-enabled infrastructures. IoT networks are vulnerable to cyber attacks which result in link removals. We develop a heterogeneous IoT network design framework in which a network designer can add links to provide additional communication paths between two nodes or secure links against attacks by investing resources. We characterize the optimal design strategy and then develop a method to construct networks that satisfy design specifications. Finally, we provide case studies on the Internet of Battlefield Things (IoBT) to illustrate the obtained results.

[1]  F. Harary THE MAXIMUM CONNECTIVITY OF A GRAPH. , 1962, Proceedings of the National Academy of Sciences of the United States of America.

[2]  Quanyan Zhu,et al.  A Stackelberg Game Approach for Two-Level Distributed Energy Management in Smart Grids , 2016, IEEE Transactions on Smart Grid.

[3]  Quanyan Zhu,et al.  Networked cyber-physical systems: Interdependence, resilience and information exchange , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[4]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[5]  Quanyan Zhu,et al.  Resilient and decentralized control of multi-level cooperative mobile networks to maintain connectivity under adversarial environment , 2015, 2016 IEEE 55th Conference on Decision and Control (CDC).

[6]  Quanyan Zhu,et al.  A factored MDP approach to optimal mechanism design for resihent large-scale interdependent critical infrastructures , 2017, 2017 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES).

[7]  Quanyan Zhu,et al.  Security investment under cognitive constraints: A Gestalt Nash equilibrium approach , 2018, 2018 52nd Annual Conference on Information Sciences and Systems (CISS).

[8]  Quanyan Zhu,et al.  A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks , 2017, GameSec.

[9]  Quanyan Zhu,et al.  iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things , 2018, IEEE Transactions on Information Forensics and Security.

[10]  Quanyan Zhu,et al.  Heterogeneous Multi-Layer Adversarial Network Design for the IoT-Enabled Infrastructures , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[11]  Niraj K. Jha,et al.  A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.

[12]  Quanyan Zhu,et al.  Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense , 2013, GameSec.

[13]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[14]  K. D. Jaegher,et al.  Strategic Network Disruption and Defense , 2016 .

[15]  Geir M. Køien,et al.  Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..

[16]  Steeve Zozor,et al.  2D time-frequency interference modelling using stochastic geometry for performance evaluation in Low-Power Wide-Area Networks , 2016, 2017 IEEE International Conference on Communications (ICC).

[17]  Jonathan L. Gross,et al.  Handbook of graph theory , 2007, Discrete mathematics and its applications.

[18]  Quanyan Zhu,et al.  Factored markov game theory for secure interdependent infrastructure networks , 2018 .

[19]  Quanyan Zhu,et al.  A Multi-Layer Feedback System Approach to Resilient Connectivity of Remotely Deployed Mobile Internet of Things , 2018, IEEE Transactions on Cognitive Communications and Networking.

[20]  Quanyan Zhu,et al.  Cognitive Connectivity Resilience in Multi-Layer Remotely Deployed Mobile Internet of Things , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[21]  Quanyan Zhu,et al.  A Game-Theoretic Framework for Resilient and Distributed Generation Control of Renewable Energies in Microgrids , 2016, IEEE Transactions on Smart Grid.

[22]  Loukas Lazos,et al.  Selective jamming/dropping insider attacks in wireless mesh networks , 2011, IEEE Network.

[23]  Saswati Sarkar,et al.  Maximum Damage Battery Depletion Attack in Mobile Sensor Networks , 2011, IEEE Transactions on Automatic Control.

[24]  Asuman E. Ozdaglar,et al.  Network Security and Contagion , 2013, PERV.

[25]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[26]  Quanyan Zhu,et al.  A Linear Quadratic Differential Game Approach to Dynamic Contract Design for Systemic Cyber Risk Management under Asymmetric Information , 2018, 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[27]  Mashrur Chowdhury,et al.  Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a heterogeneous wireless network – Performance evaluation , 2016 .

[28]  Quanyan Zhu,et al.  Interdependent strategic cyber defense and robust switching control design for wind energy systems , 2017, 2017 IEEE Power & Energy Society General Meeting.

[29]  Quanyan Zhu,et al.  Optimal Secure Two-Layer IoT Network Design , 2017, IEEE Transactions on Control of Network Systems.

[30]  Corinne Touati,et al.  Optimal Design and Defense of Networks Under Link Attacks , 2017 .

[31]  Quanyan Zhu,et al.  On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT) , 2018, IEEE Transactions on Wireless Communications.

[32]  Nicholas Hopper,et al.  Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks , 2013, IEEE Transactions on Mobile Computing.

[33]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[34]  Quanyan Zhu,et al.  Resilient control design for wind turbines using Markov jump linear system model with lévy noise , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[35]  Quanyan Zhu,et al.  Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: A Contract Design Approach , 2017, IEEE Transactions on Information Forensics and Security.

[36]  Quanyan Zhu,et al.  Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things , 2016, GameSec.

[37]  Quanyan Zhu,et al.  DISTRIBUTED AND OPTIMAL RESILIENT PLANNING OF LARGE-SCALE INTERDEPENDENT CRITICAL INFRASTRUCTURES , 2018, 2018 Winter Simulation Conference (WSC).

[38]  Quanyan Zhu,et al.  A Dynamic Game Analysis and Design of Infrastructure Network Protection and Recovery: 125 , 2017, PERV.

[39]  S. Goyal,et al.  Attack, Defence, and Contagion in Networks , 2014 .

[40]  Quanyan Zhu,et al.  Secure and Resilient Control Design for Cloud Enabled Networked Control Systems , 2015, CPS-SPC '15.

[41]  Quanyan Zhu,et al.  Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks , 2018, PERV.

[42]  Quanyan Zhu,et al.  A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network , 2019, IEEE Transactions on Information Forensics and Security.

[43]  Jie Li,et al.  Resilience of Routing in Parallel Link Networks , 2016, GameSec.

[44]  Marcin Dziubinski,et al.  Network Design and Defence , 2012, Games Econ. Behav..

[45]  Quanyan Zhu,et al.  Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things , 2019, IEEE Transactions on Information Forensics and Security.

[46]  Quanyan Zhu,et al.  Interdependent network formation games with an application to critical infrastructures , 2016, 2016 American Control Conference (ACC).