MD and NM-Computational and Information Sciences-FFP, Computational and Information Sciences Directorate - FFP
Cyber Physical Systems (CPSs) are embedded systems that consist of computing elements and physical processes. Of particular interests are the security of Internet of Things (IoT), sensors networks, wearable devices, mobile phones, robots, autonomous vehicles, and smart cities. These IoT devices are most often designed without considering security. Unprotected IoT devices can be used as “stepping stones” by attackers to launch more sophisticated attacks such as advanced persistent threats (APTs). A later stage of APT is the “lateral movement” stage, where attackers use benign computer features to move step-by-step deeper into the network in a stealthy manner.
Emphasis is placed on research related to new techniques for the prediction, prevention, detection, resilience, survival, and recovery from IoT attack. This effort pursues mathematical excellence in the following relevant areas which impact IoT cybersecurity: APT; cyber deception; IoT defense-in-depth; and end-to-end determination of security assurance. Theoretical constructs or mathematical abstractions provide a rigorous scientific basis for cyber security because they allow for reasoning quantitatively about cyber-attacks. This opportunity involves the use of several mathematical approaches, including game theory, to capture the strategic behavior of malicious adversaries and automatically formulate the optimum policies; graph theory to build and formalize attack-graphs; and adversarial machine learning for adaptation to dynamic change in operating scenario. Limited rationality, incomplete information, imperfect monitoring in distributed networks are among the challenges to be considered.
Kamdem G, Kamhoua C, Lu Y, Shetty S, Njilla L: "A Markov Game Theoritic Approach for Power Grid Security". 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), Atlanta, GA, 2017, pp. 139-144
Cuong TD, Nguyen HT, Choongseon H, Kamhoua CA, Kevin A. Kwiat KA, Blasch E, Ren S, Pissinou N, Iyengar SS: Game theory for cyber security and privacy. ACM Computing Surveys 50(2): Article 30, 37 pages, May 2017
Cyber physical systems; Internet of Things; Sensors networks; Cyber security; Cyber deception; Cyber resilience; Game theory; Graph theory; Machine learning;