Title :
A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks
Author :
Lim, Hyo-Sang ; Ghinita, Gabriel ; Bertino, Elisa ; Kantarcioglu, Murat
Abstract :
Sensor networks are being increasingly deployed in many application domains ranging from environment monitoring to supervising critical infrastructure systems (e.g., the power grid). Due to their ability to continuously collect large amounts of data, sensor networks represent a key component in decisionmaking, enabling timely situation assessment and response. However, sensors deployed in hostile environments may be subject to attacks by adversaries who intend to inject false data into the system. In this context, data trustworthiness is an important concern, as false readings may result in wrong decisions with serious consequences (e.g., large-scale power outages). To defend against this threat, it is important to establish trust levels for sensor nodes and adjust node trustworthiness scores to account for malicious interferences. In this paper, we develop a game-theoretic defense strategy to protect sensor nodes from attacks and to guarantee a high level of trustworthiness for sensed data. We use a discrete time model, and we consider that there is a limited attack budget that bounds the capability of the attacker in each round. The defense strategy objective is to ensure that sufficient sensor nodes are protected in each round such that the discrepancy between the value accepted and the truthful sensed value is below a certain threshold. We model the attack-defense interaction as a Stackelberg game, and we derive the Nash equilibrium condition that is sufficient to ensure that the sensed data are truthful within a nominal error bound. We implement a prototype of the proposed strategy and we show through extensive experiments that our solution provides an effective and efficient way of protecting sensor networks from attacks.
Keywords :
game theory; trusted computing; wireless sensor networks; Nash equilibrium condition; Stackelberg game; attack-defense interaction; critical infrastructure systems; data trustworthiness; environment monitoring; game-theoretic approach; game-theoretic defense strategy; hostile environments; malicious interferences; node trustworthiness scores; sensor networks; situation assessment; Computational modeling; Educational institutions; Games; Monitoring; Power grids; Reliability; Security;
Conference_Titel :
Data Engineering (ICDE), 2012 IEEE 28th International Conference on
Conference_Location :
Washington, DC
Print_ISBN :
978-1-4673-0042-1
DOI :
10.1109/ICDE.2012.78