Security Investment under Cognitive Constraints: A Gestalt Nash Equilibrium Approach

被引:0
|
作者
Chen, Juntao [1 ]
Zhu, Quanyan [1 ]
机构
[1] NYU, Tandon Sch Engn, Dept Elect & Comp Engn, Brooklyn, NY 11201 USA
来源
2018 52ND ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS) | 2018年
关键词
Internet of Things; Security Investment; Cognitive Network; Gestalt Nash Equilibrium;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing connectivity enabled by the Internet of Things (IoT), security becomes a critical concern, and the users should invest to secure their IoT applications. Due to the massive devices in the IoT network, users cannot be aware of the security policies taken by all its connected neighbors. Instead, a user makes security decisions based on the cyber risks he perceives by observing a selected number of nodes. To this end, we propose a model which incorporates the limited attention or bounded rationality nature of players in the IoT. Specifically, each individual builds a sparse cognitive network which includes the users to respond to. Based on this simplified cognitive network representation, each user then determines his security investment policy by minimizing his own real-world security cost. The bounded rational decision-makings of players and their cognitive network formations are interdependent, and thus should be addressed in a holistic manner. We propose a Gestalt Nash equilibrium (GNE) solution concept to characterize the decisions of agents. Then, we design a proximal-based iterative algorithm to compute the GNE and show its convergence. With case studies to smart home communities, the designed algorithm can successfully identify the critical users whose decisions need to be taken into account by the other users during the security investment.
引用
收藏
页数:6
相关论文
共 8 条
  • [1] Security investment and information sharing under an alternative security breach probability function
    Gao, Xing
    Zhong, Weijun
    Mei, Shue
    INFORMATION SYSTEMS FRONTIERS, 2015, 17 (02) : 423 - 438
  • [2] A value-at-risk approach to information security investment
    Wang, Jingguo
    Chaudhury, Aby
    Rao, H. Raghav
    INFORMATION SYSTEMS RESEARCH, 2008, 19 (01) : 106 - 120
  • [3] Security investment and information sharing under an alternative security breach probability function
    Xing Gao
    Weijun Zhong
    Shue Mei
    Information Systems Frontiers, 2015, 17 : 423 - 438
  • [4] A Formal Approach to Security Techniques in Cognitive Networks
    Saini, Natasha
    Pandey, Nitin
    Singh, Ajeet Pal
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH, 2016, : 259 - 262
  • [5] A differential game approach to security investment and information sharing in a competitive environment
    Gao, Xing
    Zhong, Weijun
    IIE TRANSACTIONS, 2016, 48 (06) : 511 - 526
  • [6] How to assess measurement capabilities of a security monitoring infrastructure and plan investment through a graph-based approach
    Palma, Alessandro
    Sorrentino, Andrea
    Bonomi, Silvia
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 262
  • [7] A Smart Internet-Wide Port Scan Approach for Improving IoT Security Under Dynamic WLAN Environments
    Verma, Shikhar
    Kawamoto, Yuichi
    Kato, Nei
    IEEE INTERNET OF THINGS JOURNAL, 2021, 9 (14): : 11951 - 11961
  • [8] Physical-Layer Security Enhancement in Energy-Harvesting-Based Cognitive Internet of Things: A GAN-Powered Deep Reinforcement Learning Approach
    Lin, Ruiquan
    Qiu, Hangding
    Wang, Jun
    Zhang, Zaichen
    Wu, Liang
    Shu, Feng
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (03): : 4899 - 4913