13 research outputs found
Secure and Reconfigurable Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)
The Internet of things (IoT) is revolutionizing the management and control of
automated systems leading to a paradigm shift in areas such as smart homes,
smart cities, health care, transportation, etc. The IoT technology is also
envisioned to play an important role in improving the effectiveness of military
operations in battlefields. The interconnection of combat equipment and other
battlefield resources for coordinated automated decisions is referred to as the
Internet of battlefield things (IoBT). IoBT networks are significantly
different from traditional IoT networks due to the battlefield specific
challenges such as the absence of communication infrastructure, and the
susceptibility of devices to cyber and physical attacks. The combat efficiency
and coordinated decision-making in war scenarios depends highly on real-time
data collection, which in turn relies on the connectivity of the network and
the information dissemination in the presence of adversaries. This work aims to
build the theoretical foundations of designing secure and reconfigurable IoBT
networks. Leveraging the theories of stochastic geometry and mathematical
epidemiology, we develop an integrated framework to study the communication of
mission-critical data among different types of network devices and consequently
design the network in a cost effective manner.Comment: 8 pages, 9 figure
Heterogeneous Multi-Layer Adversarial Network Design for the IoT-Enabled Infrastructures
International audienceThe emerging Internet of Things (IoT) applications that leverage ubiquitous connectivity and big data are facilitating the realization of smart everything initiatives. IoT-enabled infras-tructures can be naturally divided into two layers including the existing infrastructure layer and the underlaid device network. The connectivity between different components in the infrastructure networks plays an important role in delivering real-time information and ensuring a high-level situational awareness. However, IoT-enabled infrastructures face cyber threats due to the wireless nature of communications. Therefore, maintaining the network connectivity in the presence of adversaries is a critical task for the infrastructure network operators. In this paper, we establish a three-player three-stage game-theoretic framework including two network operators and one attacker to capture the secure design of multi-layer infrastructure networks by allocating limited resources. We use subgame perfect Nash equilibrium (SPE) to characterize the strategies of players with sequential moves. In addition, we assess the efficiency of the equilibrium network by comparing with its team optimal solution counterparts in which two network operators can coordinate to design a secure network. We further design a scalable algorithm to construct the equilibrium secure IoT-enabled infrastructure networks. Finally, we use case studies on Internet of Battlefield Things (IoBT) to corroborate the obtained results
Cognitive Connectivity Resilience in Multi-layer Remotely Deployed Mobile Internet of Things
Enabling the Internet of things in remote areas without traditional
communication infrastructure requires a multi-layer network architecture. The
devices in the overlay network are required to provide coverage to the underlay
devices as well as to remain connected to other overlay devices. The
coordination, planning, and design of such two-layer heterogeneous networks is
an important problem to address. Moreover, the mobility of the nodes and their
vulnerability to adversaries pose new challenges to the connectivity. For
instance, the connectivity of devices can be affected by changes in the
network, e.g., the mobility of the underlay devices or the unavailability of
overlay devices due to failure or adversarial attacks. To this end, this work
proposes a feedback based adaptive, self-configurable, and resilient framework
for the overlay network that cognitively adapts to the changes in the network
to provide reliable connectivity between spatially dispersed smart devices. Our
results show that if sufficient overlay devices are available, the framework
leads to a connected configuration that ensures a high coverage of the mobile
underlay network. Moreover, the framework can actively reconfigure itself in
the event of varying levels of device failure.Comment: To appear in IEEE Global Communications Conference (Globecom 2017
Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning
Internet of Things (IoT) in military setting generally consists of a diverse range of Internet-connected devices and nodes (e.g. medical devices to wearable combat uniforms), which are a valuable target for cyber criminals, particularly state-sponsored or nation state actors. A common attack vector is the use of malware. In this paper, we present a deep learning based method to detect Internet Of Battlefield Things (IoBT) malware via the device's Operational Code (OpCode) sequence. We transmute OpCodes into a vector space and apply a deep Eigenspace learning approach to classify malicious and bening application. We also demonstrate the robustness of our proposed approach in malware detection and its sustainability against junk code insertion attacks. Lastly, we make available our malware sample on Github, which hopefully will benefit future research efforts (e.g. for evaluation of proposed malware detection approaches)