Skip to main content

Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11897))

Abstract

The Internet of Battlefield Things (IoBT) is an emerging application to improve operational effectiveness for military applications. The security of IoBT is one of the more challenging aspects, where adversaries can exploit vulnerabilities in IoBT software and deployment conditions to gain insight into their state. In this work, we look into the security of IoBT from the lens of cyber deception. First, we formulate the IoBT domain as a graph learning problem from an adversarial point of view and introduce various tools through which an adversary can learn the graph starting with partial prior knowledge. Second, we use this model to show that an adversary can learn high-level information from low-level graph structures, including the number of soldiers and their proximity. For that, we use a powerful n-gram based algorithm to obtain features from random walks on the underlying graph representation of IoBT. Third, we provide microscopic and macroscopic approaches that manipulate the underlying IoBT graph structure to introduce uncertainty in the adversary’s learning. Finally, we show our approach’s effectiveness through analyses and evaluations.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Community detection for networkx. http://python-louvain.readthedocs.io

  2. node2vec repository. https://github.com/aditya-grover/node2vec

  3. Belkin, M., Niyogi, P.: Laplacian eigenmaps and spectral techniques for embedding and clustering. In: Proceedings of the NIPS (2002)

    Google Scholar 

  4. Cameron, L.: Internet of things meets the military and battlefield: connecting gear and biometric wearables for an IoMT and IoBT. https://www.computer.org/publications/tech-news/research/internet-of-military-battlefield-things-iomt-iobt

  5. Cheswick, B.: An evening with berferd in which a cracker is lured, endured, and studied. In: Proceedings of the USENIX Conference (1992)

    Google Scholar 

  6. Erdos, P., Rényi, A.: On the evolution of random graphs. Publ. Math. Inst. Hung. Acad. Sci. 5(1), 17–60 (1960)

    MathSciNet  MATH  Google Scholar 

  7. Gallagher, B., Eliassi-Rad, T.: Leveraging label-independent features for classification in sparsely labeled networks: an empirical study. In: Proceedings of the SNAKDD (2010)

    Google Scholar 

  8. Grover, A., Leskovec, J.: node2vec: scalable feature learning for networks. In: Proceedings of the ACM KDD (2016)

    Google Scholar 

  9. Henderson, K., et al.: It’s who you know: graph mining using recursive structural features. In: Proceedings of the ACM KDD (2011)

    Google Scholar 

  10. Kott, A., Swami, A., West, B.J.: The internet of battle things. IEEE Comput. 49(12), 70–75 (2016)

    Article  Google Scholar 

  11. Leskovec, J., Krevl, A.: SNAP datasets: stanford large network dataset collection (2014). https://snap.stanford.edu/data/p2p-Gnutella04.html

  12. Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)

  13. Mohaisen, A., Hollenbeck, S.: Improving social network-based sybil defenses by rewiring and augmenting social graphs. In: Kim, Y., Lee, H., Perrig, A. (eds.) WISA 2013. LNCS, vol. 8267, pp. 65–80. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-05149-9_5

    Chapter  Google Scholar 

  14. Pang, J., Zhang, Y.: DeepCity: a feature learning framework for mining location check-ins. arXiv preprint arXiv:1610.03676 (2016)

  15. Perozzi, B., Al-Rfou, R., Skiena, S.: DeepWalk: online learning of social representations. In: Proceedings of the ACM KDD (2014)

    Google Scholar 

  16. Provos, N.: Honeyd-a virtual honeypot daemon. In: Proceedings of the DFN-CERT Workshop (2003)

    Google Scholar 

  17. Roweis, S.T., Saul, L.K.: Nonlinear dimensionality reduction by locally linear embedding. Science 290(5500), 2323–2326 (2000)

    Article  Google Scholar 

  18. Spitzner, L.: The honeynet project: trapping the hackers. IEEE Secur. Priv. 99(2), 15–23 (2003)

    Article  Google Scholar 

  19. Tang, J., Qu, M., Wang, M., Zhang, M., Yan, J., Mei, Q.: LINE: large-scale information network embedding. In: Proceedings of the WWW (2015)

    Google Scholar 

Download references

Acknowledgement

This work is supported in part by NSF grant CNS-1809000 and NRF grant 2016K1A1A2912757.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aziz Mohaisen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 This is a U.S. government work and its text is not subject to copyright protection in the United States; however, its text may be subject to foreign copyright protection

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Park, J., Mohaisen, A., Kamhoua, C.A., Weisman, M.J., Leslie, N.O., Njilla, L. (2020). Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments. In: You, I. (eds) Information Security Applications. WISA 2019. Lecture Notes in Computer Science(), vol 11897. Springer, Cham. https://doi.org/10.1007/978-3-030-39303-8_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-39303-8_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-39302-1

  • Online ISBN: 978-3-030-39303-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics