Moving Target Defense for Internet of Things Based on the Zero-Determinant Theory

At present, the proliferation of the online connected devices conceives the Internet of Things (IoT), in which many wireless sensors, smart devices are implemented. However, the nature of openness rooted in IoT makes itself vulnerable to be attacked. One of the pioneer countermeasures is the moving target defense (MTD), which encourages an active and dynamic defense in IoT. In this article, a macroscopic research in MTD is carried out. The existing macroscopic studies take advantage of a traditional game theory. Consequently, protected IoT devices need extra operations to dominate the game. In this article, we take a dramatically different approach where a player can dominate the game without extra operation. Our approach benefits from the power of the zero-determinant (ZD) strategy, in which the player who adopts ZD can unilaterally set the expected payoff of the adversary or itself. Aware of such a powerful strategy, both players may want to employ it for dominating the confrontation. In this case, two fundamental questions need to be answered: who should take the ZD strategy? and to what extent can the ZD player dominate the game? To solve these problems, we model the interactions between the IoT devices and the malicious attackers as a Markov game. Besides, we obtain the conditions to adopt ZD, based on which we deduce the effectiveness of the ZD player. To the best of our knowledge, we are the first to employ the ZD strategy theory to enhance a better counterattack performance in IoT.

[1]  Sushil Jajodia,et al.  Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.

[2]  Peng Xie,et al.  A Self-shielding Dynamic Network Architecture , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[3]  Ehab Al-Shaer,et al.  Adversary-aware IP address randomization for proactive agility against sophisticated attackers , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[4]  Kevin Fu,et al.  Design challenges for secure implantable medical devices , 2012, DAC Design Automation Conference 2012.

[5]  Jianhua Sun,et al.  DESIR: Decoy-enhanced seamless IP randomization , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[6]  Cheng Lei,et al.  Optimal Strategy Selection for Moving Target Defense Based on Markov Game , 2017, IEEE Access.

[7]  Scott A. DeLoach,et al.  Towards a Theory of Moving Target Defense , 2014, MTD '14.

[8]  Yingshu Li,et al.  Data Linkage in Smart Internet of Things Systems: A Consideration from a Privacy Perspective , 2018, IEEE Communications Magazine.

[9]  Zhipeng Cai,et al.  Trading Private Range Counting over Big IoT Data , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).

[10]  Ananthram Swami,et al.  A signaling game model for moving target defense , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[11]  Yi Liang,et al.  Deep Learning Based Inference of Private Information Using Embedded Sensors in Smart Devices , 2018, IEEE Network.

[12]  Mohamed Eltoweissy,et al.  ChameleonSoft: A moving target defense system , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).

[13]  Sailik Sengupta,et al.  Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract) , 2016, AAMAS.

[14]  Earlence Fernandes,et al.  Security Analysis of Emerging Smart Home Applications , 2016, 2016 IEEE Symposium on Security and Privacy (SP).