Optimal Secure Two-Layer IoT Network Design

被引:20
作者
Chen, Juntao [1 ]
Touati, Corinne [2 ]
Zhu, Quanyan [1 ]
机构
[1] NYU, Tendon Sch Engn, Dept Elect & Comp Engn, Brooklyn, NY 11201 USA
[2] Inst Natl Rech Informat & Automat, F-38330 Montbonnot St Martin, France
来源
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS | 2020年 / 7卷 / 01期
关键词
Connectivity; Internet of Battlefield Things (IoBT); optimal design; security; two-layer networks; COMMUNICATION; INTERNET; ATTACKS;
D O I
10.1109/TCNS.2019.2906893
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the remarkable growth of the Internet and communication technologies over the past few decades, Internet of Things (IoTs) is enabling the ubiquitous connectivity of heterogeneous physical devices with software, sensors, and actuators. IoT networks are naturally two layers with the cloud and cellular networks coexisting with the underlaid device-to-device communications. The connectivity of IoTs plays an important role in information dissemination for mission-critical and civilian applications. However, IoT communication networks are vulnerable to cyber attacks including the denial-of-service and jamming attacks, resulting in link removals in the IoT network. In this paper, we develop a heterogeneous IoT network design framework in which a network designer can add links to provide additional communication paths between two nodes or secure links against attacks by investing resources. By anticipating the strategic cyber attacks, we characterize the optimal design of the secure IoT network by first providing a lower bound on the number of links a secure network requires for a given budget of protected links, and then developing a method to construct networks that satisfy the heterogeneous network design specifications. Therefore, each layer of the designed heterogeneous IoT network is resistant to a predefined level of malicious attacks with minimum resources. Finally, we provide case studies on the Internet of Battlefield Things to corroborate and illustrate our obtained results.
引用
收藏
页码:398 / 409
页数:12
相关论文
共 23 条
[1]   Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks [J].
Abomhara, Mohamed ;
Køien, Geir M. .
Journal of Cyber Security and Mobility, 2015, 4 (01) :65-88
[2]  
[Anonymous], 2003, Handbook of Graph Theory
[3]  
[Anonymous], [No title captured]
[4]   Optimal design and defense of networks under link attacks [J].
Bravard, Christophe ;
Charroin, Liza ;
Touati, Corinne .
JOURNAL OF MATHEMATICAL ECONOMICS, 2017, 68 :62-79
[5]  
Chen J., 2017, ACM SIGMETRICS Performance Evaluation Review, V45, P125, DOI [https://doi.org/10.1145/3152042.3152079, DOI 10.1145/3152042.3152079]
[6]   Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: A Contract Design Approach [J].
Chen, Juntao ;
Zhu, Quanyan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) :2736-2750
[7]   Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a heterogeneous wireless network - Performance evaluation [J].
Dey, Kakan Chandra ;
Rayamajhi, Anjan ;
Chowdhury, Mashrur ;
Bhavsar, Parth ;
Martin, James .
TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES, 2016, 68 :168-184
[8]   Network design and defence [J].
Dziubinski, Marcin ;
Goyal, Sanjeev .
GAMES AND ECONOMIC BEHAVIOR, 2013, 79 :30-43
[10]   Maximum Damage Battery Depletion Attack in Mobile Sensor Networks [J].
Khouzani, M. H. R. ;
Sarkar, Saswati .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2011, 56 (10) :2358-2368