Game-based adaptive security in the Internet of Things for eHealth

The Internet of Things (IoT) is enabling the deployment of distributed applications based on ubiquitous computing and convergent networks. Due to its heterogeneous structure, it introduces new security challenges and requirements. Particularly, the security mechanisms implemented in the IoT should adapt to the dynamic context. This paper proposes a game-based model for adaptive security in the IoT, with an emphasis on eHealth applications. We use the trade-off between security-effectiveness and energy-efficiency to evaluate adaptive security strategies. We also present the results of simulation experiments to assess the performance of the proposed model. We show that our model allows extending the lifetime of the smart things by 47% compared to existing models.

[1]  Donggang Liu,et al.  Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.

[2]  Jose B. Cruz,et al.  Game Theoretic Approach to Threat Prediction and Situation Awareness , 2006, 2006 9th International Conference on Information Fusion.

[3]  Tansu Alpcan,et al.  Network Security , 2010 .

[4]  Ramesh R. Rao,et al.  Improving battery performance by using traffic shaping techniques , 2001, IEEE J. Sel. Areas Commun..

[5]  Michel Daoud Yacoub,et al.  Nakagami-m phase-envelope joint distribution , 2005 .

[6]  Daniele Venturi,et al.  On the Connection between Leakage Tolerance and Adaptive Security , 2013, Public Key Cryptography.

[7]  Mani B. Srivastava,et al.  Performance aware tasking for environmentally powered sensor networks , 2004, SIGMETRICS '04/Performance '04.

[8]  Mohamed Hamdi,et al.  A testbed for adaptive security for IoT in eHealth , 2013, ASPI '13.

[9]  P. Ning,et al.  Multi-Level μ TESLA : Broadcast Authentication for Distributed Sensor Networks , 2004 .

[10]  Christos G. Cassandras,et al.  Message Batching in Wireless Sensor Networks—A Perturbation Analysis Approach , 2010, Discret. Event Dyn. Syst..

[11]  Guang Gong,et al.  Randomly directed exploration: An efficient node clone detection protocol in wireless sensor networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[12]  Helena Rif Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices , 2011 .

[13]  Brian L. Mark,et al.  Analysis of virus spread in wireless sensor networks: An epidemic model , 2009, 2009 7th International Workshop on Design of Reliable Communication Networks.

[14]  Brent Waters,et al.  Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) , 2009, EUROCRYPT.

[15]  Tamara Bonaci,et al.  Node Capture Games: A Game Theoretic Approach to Modeling and Mitigating Node Capture Attacks , 2011, GameSec.

[16]  Hongsheng Xi,et al.  A Markov Game Theory-Based Risk Assessment Model for Network Information System , 2008, 2008 International Conference on Computer Science and Software Engineering.

[17]  Dan Shen,et al.  Adaptive Markov Game Theoretic Data Fusion Approach for Cyber Network Defense , 2007, MILCOM 2007 - IEEE Military Communications Conference.