Heterogeneous multi-layer adversarial network design for the IoT-enabled infrastructures

Juntao Chen, Corinne Touati, Quanyan Zhu

Research output: Contribution to journalConference articlepeer-review

Abstract

Internet of Things (IoT)-enabled infrastructures have naturally a multi-layer system architecture with an overlaid or underlaid device network and its coexisting infrastructure network. The connectivity between different components in these two heterogeneous networks plays an important role in ensuring a high-level situational awareness. However, IoTenabled infrastructures face cyber threats due to the wireless nature of communications. Therefore, maintaining the network connectivity in the presence of adversaries is a critical task for the infrastructure network operators. In this paper, we establish a three-player three-stage game-theoretic framework including two network operators and one attacker to capture the secure design of multi-layer infrastructure networks by allocating limited resources. We use subgame perfect Nash equilibrium (SPE) to characterize the strategies of players with sequential moves. In addition, we assess the efficiency of the equilibrium network by comparing with its team optimal solution counterparts in which two network operators can coordinate. We further design a scalable algorithm to guide the construction of the equilibrium IoT-enabled infrastructure networks. Finally, we use case studies on the emerging paradigm of Internet of Battlefield Things (IoBT) to corroborate the obtained results.

Original languageEnglish (US)
Pages (from-to)1-6
Number of pages6
JournalProceedings - IEEE Global Communications Conference, GLOBECOM
Volume2018-January
DOIs
StatePublished - 2017
Event2017 IEEE Global Communications Conference, GLOBECOM 2017 - Singapore, Singapore
Duration: Dec 4 2017Dec 8 2017

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Hardware and Architecture
  • Signal Processing

Fingerprint

Dive into the research topics of 'Heterogeneous multi-layer adversarial network design for the IoT-enabled infrastructures'. Together they form a unique fingerprint.

Cite this