Optimal Cost-Based Cyber Insurance Policy Management for Mobile Services

被引:0
作者
Dinh Thai Hoang [1 ]
Niyato, Dusit [1 ]
Wang, Ping [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore, Singapore
来源
2017 IEEE 86TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL) | 2017年
关键词
Cyber insurance; cyber security; risk management; MDP; coalitional game; wireless attack;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper introduces a cyber insurance policy management for the mobile networks in which if a mobile user agrees to purchase an insurance policy from an insurer, the loss of the mobile user, i.e., the insured, will be covered by the insurance policy when the risks happen. To protect mobile users from cyber attacks, the insurer can deploy security protection solutions, e.g., anti-virus software or personal firewall, to the insureds, thereby reducing the risks for mobile users. However, when the solutions are deployed, they will incur a certain cost to the insurer. Therefore, we propose a stochastic optimization based on the reserve state of the insurer and the number of active mobile users to determine whether the protection solutions should be deployed or not to maximize the revenue for the insurer. The performance evaluation reveals that the optimal policy can achieve significantly higher revenue than those of baseline schemes for the insurer. Alternatively, the coalitional game is studied to share the reward among the insurers, and we show that the insurers can gain higher individual rewards through the cooperation.
引用
收藏
页数:5
相关论文
共 10 条
[1]  
Chaisiri S., 2015, P IEEE INT C TRUST S, P20
[2]   Charging and Discharging of Plug-In Electric Vehicles (PEVs) in Vehicle-to-Grid (V2G) Systems: A Cyber Insurance-Based Model [J].
Dinh Thai Hoang ;
Wang, Ping ;
Niyato, Dusit ;
Hossain, Ekram .
IEEE ACCESS, 2017, 5 :732-754
[3]   Call admission control schemes and performance analysis in wireless mobile networks [J].
Fang, YG ;
Zhang, Y .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2002, 51 (02) :371-382
[4]   A Novel Secure Big Data Cyber Incident Analytics Framework for Cloud-Based Cybersecurity Insurance [J].
Gai, Keke ;
Qiu, Meikang ;
Elnagdy, Sam Adam .
2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, :171-176
[5]   Agent-based modeling of the cooperative spectrum management with insurance in cognitive radio networks [J].
Horvath, Denis ;
Gazda, Vladimir ;
Gazda, Juraj .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2013, :477-491
[6]  
Jin HM, 2012, IEEE INFOCOM SER, P2041, DOI 10.1109/INFCOM.2012.6195585
[7]   A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks [J].
Marchang, Ningrinla ;
Datta, Raja ;
Das, Sajal K. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (02) :1684-1695
[8]  
Pal R, 2014, IEEE INFOCOM SER, P235, DOI 10.1109/INFOCOM.2014.6847944
[9]  
Zhang R., 2017, IEEE JOURNAL ON SELE
[10]   A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends [J].
Zou, Yulong ;
Zhu, Jia ;
Wang, Xianbin ;
Hanzo, Lajos .
PROCEEDINGS OF THE IEEE, 2016, 104 (09) :1727-1765