|

Algorithms of the Protection System between Assets of a Mobile Device on the Basis of Zero-Sum Game and Equal Security Principle

Authors: Bykov A.Yu., Krygin I.A., Mullin A.R. Published: 16.04.2018
Published in issue: #2(119)/2018  
DOI: 10.18698/0236-3933-2018-2-48-68

 
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing  
Keywords: information security, zero-sum game, linear programming, equal security

To determine the importance of the protected assets or resources of a mobile device, we suggest using the zero-sum game model. The game involves the parties to attack and defense. To optimize their indicator, each player must solve the linear programming problem with a fixed decision of the other player. In order to predict the decision of the attack, it is suggested for the defense using the equal security principle for asset classes. The assets are divided into classes with equal security. To equalize the security within one class, the defense should solve the specially formulated linear programming problem. The approach based on equalizing the assets security provides a predictable result for the defense and can be used when there is no complete information about the resources of the attack. An example of the solution of the problem is given

References

[1] Bykov A.Yu., Shmatova E.S. The algorithms of resource distribution for information security between objects of an information system based on the game model and principle of equal security of objects. Nauka i obrazovanie: nauchnoe izdanie [Science and Education: Scientific Publication], 2015, no. 9 (in Russ.). DOI: 10.7463/0915.0812283 Available at: http://technomag.bmstu.ru/doc/812283.html

[2] Koppel A., Jakubiec F.Y., Ribeiro A. A saddle point algorithm for networked online convex optimization. IEEE Transactions on Signal Processing, 2015, vol. 63, no. 19, pp. 5149–5164. DOI: 10.1109/TSP.2015.2449255 Available at: http://ieeexplore.ieee.org/document/7131577

[3] Paramasivan B., Prakash M., Kaliappan M. Development of a secure routing protocol using game theory model in mobile ad hoc networks. Journal of Communications and Networks, 2015, vol. 17, no. 1, pp. 75–83. DOI: 10.1109/JCN.2015.000012 Available at: http://ieeexplore.ieee.org/document/7059537

[4] Wang Q., Zhu J. Optimal information security investment analyses with the consideration of the benefits of investment and using evolutionary game theory. 2016 2nd Int. Conf. on Information Management (ICIM), 2016, pp. 105–109. DOI: 10.1109/INFOMAN.2016.7477542 Available at: http://ieeexplore.ieee.org/document/7477542

[5] Gupta A., Langbort C., Başar T. Dynamic games with asymmetric information and resource constrained players with applications to security of cyberphysical systems. IEEE Transactions on Control of Network Systems, 2017, vol. 4, no. 1, pp. 71–81. DOI: 10.1109/TCNS.2016.2584183 Available at: http://ieeexplore.ieee.org/document/7498672

[6] Schottle P., Bohme R. Game theory and adaptive steganography. IEEE Transactions on Information Forensics and Security, 2016, vol. 11, no. 4, pp. 760–773. DOI: 10.1109/TIFS.2015.2509941 Available at: http://ieeexplore.ieee.org/document/7360156

[7] Lei C., Ma D., Zhang H. Optimal strategy selection for moving target defense based on Markov game. IEEE Access, 2017, vol. 5, pp. 156–169. DOI: 10.1109/ACCESS.2016.2633983 Available at: http://ieeexplore.ieee.org/document/7805250

[8] Xiao L., Chen T., Han G., Zhuang W., Sun L. Channel-based authentication game in MIMO systems. 2016 IEEE Global Communications Conf. (GLOBECOM), 2016, pp. 1–6. DOI: 10.1109/GLOCOM.2016.7841657 Available at: http://ieeexplore.ieee.org/document/7841657

[9] Chessa M., Grossklags J., Loiseau P. A game-theoretic study on non-monetary incentives in da-ta analytics projects with privacy implications. 2015 IEEE 28th Computer Security Foundations Symposium, 2015, pp. 90–104. DOI: 10.1109/CSF.2015.14 Available at: http://ieeexplore.ieee.org/document/7243727

[10] Shah S.V., Chaitanya A.K., Sharma V. Resource allocation in fading multiple access wiretap channel via game theoretic learning. 2016 Information Theory and Applications Workshop (ITA), 2016, pp. 1–7. DOI: 10.1109/ITA.2016.7888137 Available at: http://ieeexplore.ieee.org/document/7888137

[11] Li L., Shamma J. Efficient computation of discounted asymmetric information zero-sum stochastic games. 54th IEEE Conf. on Decision and Control (CDC), 2015, pp. 4531–4536. DOI: 10.1109/CDC.2015.7402927 Available at: http://ieeexplore.ieee.org/document/7402927

[12] Bykov A.Yu., Panfilov F.A., Khovrina A.V. The algorithm to select security classes for objects in distributed information systems and place data in the objects through reducing the optimization problem to the theory of games with non-conflicting interests. Nauka i obrazovanie: nauchnoe izdanie [Science and Education: Scientific Publication], 2016, no. 1 (in Russ.). DOI: 10.7463/0116.0830972 Available at: http://technomag.bmstu.ru/doc/830972.html

[13] Bykov A.Yu., Panfilov F.A., Zenkovich S.A. Model and methods of multi-criteria selection of the security classes for objects in distributed information system and databases placement on objects. Voprosy kiberbezopasnosti [Cybersecurity issues], 2016, no. 2 (15), pp. 9–20 (in Russ.).

[14] Klyucharev P.G. FPGA implementation of general cellular automata based cryptographic hash functions: performance and effectiveness. Nauka i obrazovanie: nauchnoe izdanie [Science and Education: Scientific Publication], 2014, no. 1 (in Russ.). DOI: 10.7463/0114.0675812 Available at: http://technomag.bmstu.ru/doc/675812.html

[15] Balk E. A., Klyucharev P.G. Small diameter graph-based investigation of avalanche effect characteristics of generalized cellular automata. Nauka i obrazovanie: nauchnoe izdanie [Science and Education: Scientific Publication], 2016, no. 4 (in Russ.). DOI: 10.7463/0416.0837506 Available at: http://technomag.bmstu.ru/doc/837506.html

[16] Klyucharev P.G. Performance of сellular automata-based stream ciphers in GPU implementation. Nauka i obrazovanie: nauchnoe izdanie [Science and Education: Scientific Publication], 2016, no. 6 (in Russ.). DOI: 10.7463/0616.0842091 Available at: http://old.technomag.edu.ru/doc/842091.html

[17] Klyucharev P.G. Methods of designing cryptographic hash-functions based on iteration of the uniform cellular automata. Voprosy kiberbezopasnosti [Cybersecurity issues], 2017, no. 1 (19), pp. 45–50 (in Russ.).

[18] Strekalovskiy A.S., Orlov A.V. Bimatrichnye igry i bilineynoe programmirovanie [Bimatrix games and bilinear programming]. Moscow, Fizmatlit Publ., 2007. 224 p.