Analysis of Attack-Defense Strategies in Autonomous Distributed IoT Systems

We develop an analytical model to capture the interplay of attack-defense strategies of an autonomous distributed Internet of Things system (ADIoTS). Every node participates in intrusion detection of a target node of the same type, thus necessitating that every good node plays a set of defense strategies and every bad node plays a set of attack strategies for achieving their own goals. The end product is a methodology for identifying the best defense strategies to maximize the system lifetime.

[1]  Sheng-Tzong Cheng,et al.  Performance evaluation of an admission control algorithm: dynamic threshold with negotiation , 2003, Perform. Evaluation.

[2]  Ananthram Swami,et al.  A Provenance-Based Trust Model for Delay Tolerant Networks , 2012, IFIPTM.

[3]  Guofei Jiang,et al.  Modeling and analytics for cyber-physical systems in the age of big data , 2014, PERV.

[4]  Jin-Hee Cho,et al.  PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks , 2018, IEEE Transactions on Dependable and Secure Computing.

[5]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[6]  Ing-Ray Chen,et al.  Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks , 2009, Comput. Commun..

[7]  Ing-Ray Chen,et al.  Agent-Based Forwarding Strategies for Reducing Location Management Cost in Mobile Networks , 2001, Mob. Networks Appl..

[8]  Sheng-Tzong Cheng,et al.  On failure recoverability of client-server applications in mobile wireless environments , 2005, IEEE Transactions on Reliability.

[9]  Ing-Ray Chen,et al.  Analyzing dynamic voting using Petri nets , 1996, Proceedings 15th Symposium on Reliable Distributed Systems.

[10]  Ing-Ray Chen,et al.  Adaptive network management for countering selective capture in wireless sensor networks , 2013, Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013).

[11]  Ilsun You,et al.  Misbehavior Detection of Embedded IoT Devices in Medical Cyber Physical Systems , 2018, 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE).

[12]  Farokh B. Bastani,et al.  Effect of artificial-intelligence planning-procedures on system reliability , 1991 .

[13]  Sokol Kosta,et al.  Large-Scale Synthetic Social Mobile Networks with SWIM , 2014, IEEE Transactions on Mobile Computing.

[14]  Ing-Ray Chen,et al.  Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems , 2015, IEEE Transactions on Dependable and Secure Computing.

[15]  Ilsun You,et al.  On IoT Misbehavior Detection in Cyber Physical Systems , 2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC).

[16]  Farokh B. Bastani,et al.  Reliability of systems with fuzzy-failure criterion , 1994, Proceedings of Annual Reliability and Maintainability Symposium (RAMS).

[17]  Walaa Hamouda,et al.  A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems , 2018, IEEE Communications Surveys & Tutorials.

[18]  Ing-Ray Chen,et al.  Admission Control Algorithms for Revenue Optimization with QoS Guarantees in Mobile Wireless Networks , 2006, Wirel. Pers. Commun..

[19]  Ing-Ray Chen,et al.  Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems , 2013, IEEE Transactions on Reliability.

[20]  Hamid Al-Hamadi,et al.  Trust-Based Decision Making for Health IoT Systems , 2017, IEEE Internet of Things Journal.

[21]  Ing-Ray Chen,et al.  Performance Evaluation of Forwarding Strategies for Location Management in Mobile Networks , 1998, Comput. J..

[22]  Sheng-Tzong Cheng,et al.  Dynamic quota-based admission control with sub-rating in multimedia servers , 2000, Multimedia Systems.

[23]  Ing-Ray Chen,et al.  Analysis of Replicated Data with Repair Dependency , 1996, Comput. J..

[24]  Ing-Ray Chen,et al.  Modeling and Analysis of Attacks and Counter Defense Mechanisms for Cyber Physical Systems , 2016, IEEE Transactions on Reliability.

[25]  Ing-Ray Chen,et al.  Performance Analysis of Location-Aware Mobile Service Proxies for Reducing Network Cost in Personal Communication Systems , 2005, Mob. Networks Appl..