Ajou University repository

Game theory-based Security Vulnerability Quantification for Social Internet of Things
Citations

SCOPUS

31

Citation Export

Publication Year
2018-05-01
Publisher
Elsevier B.V.
Citation
Future Generation Computer Systems, Vol.82, pp.752-760
Keyword
Cyber securityGame theorySocial IoTVulnerability Quantification
Mesh Keyword
Cyber securityInformation and Communication TechnologiesInternet of Things (IOT)Network environmentsQuantification methodsSecurity vulnerabilitiesSocial IoTVulnerability Quantification
All Science Classification Codes (ASJC)
SoftwareHardware and ArchitectureComputer Networks and Communications
Abstract
In modern society, information and communication technology (ICT) has been applied to various areas such as home, industry, and finance. Therefore, social networks using Internet of Things (IoT) technologies have been constructed. As ICT continues to be used in various modern applications, security vulnerabilities from legacy ICT have been inherited by social IoT network systems. To guarantee the safety of these applications, these networks must be protected from various cyberattacks. A variety of security technologies and products have been developed for this purpose. However, the most important task in dealing with cyberattacks is to inspect the current security status of a social IoT network system. Many types of vulnerability quantification methods exist for inspecting the security vulnerabilities of network systems. However, with legacy methods, quantification results lack objectivity. In this study, to compensate for this limitation, we propose a game-theory-based vulnerability quantification method using attack tree, which consists of three steps: game strategy modeling, cost-impact analyzation, and payoff calculation. We present a case study for a social-IoT-based network environment. Using the proposed method, we believe social IoT network system security experts will be able to cope with security incidents more effectively. The proposed method can be used as a reference for constructing a safer social IoT network system.
ISSN
0167-739X
Language
eng
URI
https://dspace.ajou.ac.kr/dev/handle/2018.oak/30012
DOI
https://doi.org/10.1016/j.future.2017.09.032
Type
Article
Funding
This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF), funded by the Ministry of Science, ICT & Future Planning ( 2015R1A1A1A05001238 ).Kyuwon (Ken) Choi is currently an associate professor in the department of Electrical and Computer Engineering in Illinois Institute of Technology. He received the Ph.D. degree in electrical and computer engineering from Georgia Institute of Technology, Atlanta, USA in 2002. During the Ph.D. he proposed and conducted several projects supported by NASA (National Aeronautics and Space Administration), DARPA (Defense Advanced Research Projects Agency), NSF (US National Science Foundation), and SRC (Scientific Research Corporation) regarding power-aware computing/communication (PACC). Since 2004, he had been with the Takayasu Sakurai Lab. in the University of Tokyo, Japan as a post-doc research associate, working on leakage-power-reduction circuit techniques. He is now a director of VLSI Design and Automation Lab (DA-Lab) at IIT, a senior member of IEEE, an editor-in-chief of Journal of Pervasive Technologies, guest editor of Springer and Wiley Journals, a TPC member for several IEEE circuit design conferences, and an ex-president in KSEA (Korean-American Scientists and Engineers Association)-Chicago/Midwest chapter and a technical group director for KSEA-HQ now.
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

SHON, TAE SHIK Image
SHON, TAE SHIK손태식
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.