A Game Theory approach for communication security and safety assurance in cyber-physical systems with Reputation and Trust-based mechanisms

نویسندگان

چکیده

Cyber-physical systems’ security and safety assurance is a challenging research problem for Smart City concept development. Technical faults or malicious attacks over communication between its elements can jeopardize the whole system users. Reputation systems implementation an effective measure to detect such agents. Each agent in group has indicator, which reflects how trustworthy it other However, scenario when not possible calculate indicator based on objective characteristics, defective agents negatively affect system’s performance. In this paper, we propose approach Game Theory address Trust initial values calculation challenge. We introduced mixed strategies game probability indicator. The outcomes of using different by are represented with payoff matrix. To evaluate effectiveness, empirical study software simulation environment was conducted. As scenario, considered intersection management unmanned autonomous vehicles, aim perform conflict-free optimal traversal. simulate attack some vehicles were able transmit incorrect data traffic participants. obtained results showed that allowed us increase number detected intruders compared conventional model.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyber Security for Cyber Physcial Systems: a Trust-based Approach

CyberPhysical Systems (CPS) consist of a combination of different embedded subsystems, which work independently of each other and also interact with the external environment. Such embedded systems operate in the presence of inherent uncertainty, context dependencies and adversarial certainty arising from both the cyber and physical worlds. Security is one of the key concepts to shield the CPS e...

متن کامل

Cyber Safety: A Systems Thinking and Systems Theory Approach to Managing Cyber Security Risks

If we are to manage security risks more effectively in today’s complex and dynamic cyber environment, then a new way of thinking is needed to complement traditional approaches. According to Symantec’s 2014 Internet Security Threat Report, in 2012 more than ten million identities that included real names, dates of birth, and social security were exposed by a single breach. In 2013 there were eig...

متن کامل

Security, Privacy and Trust in Cyber Physical Systems

The first issue of the third volume of the EAI transactions on Security and Safety provides an insight to methods and techniques that improve security, safety and privacy of benchmark systems. Actually, two main classes of research results are considered. The first one is on attack prevention and secure planning while the second one is focused on forensics analysis. In particular, in the area o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nau?no-tehni?eskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki

سال: 2022

ISSN: ['2226-1494', '2500-0373']

DOI: https://doi.org/10.17586/2226-1494-2022-22-1-47-59