Ensuring secure and efficient data transmission in large-scale remote sensing is a critical challenge. We employ game theory to model the strategic interaction between multiple sensors, which independently optimize their data transmission, and an attacker seeking to maximize disruption. Each agent shapes its strategy through resource allocation constraints and cost functions associated with transmission and attack efforts. We seek to derive a Nash equilibrium that characterizes the optimal strategies of both transmitters and attacker. By solving Karush-Kuhn-Tucker (KKT) conditions, we obtain analytical equilibrium solutions between transmission efficiency and attack resilience. Our analysis highlights key trade-offs: increasing a sensor transmission cost reduces its activity rate but makes it a more attractive target for attacks, leading to a redistribution of adversarial efforts. Conversely, higher attack costs discourage malicious interference, prompting strategic adjustments in both transmission and defense mechanisms. These findings provide insights to enhance network resilience against strategic adversaries.

Strategic Interactions in Multi-Sensor Networks Against False Data Injection

Badia L.
2025

Abstract

Ensuring secure and efficient data transmission in large-scale remote sensing is a critical challenge. We employ game theory to model the strategic interaction between multiple sensors, which independently optimize their data transmission, and an attacker seeking to maximize disruption. Each agent shapes its strategy through resource allocation constraints and cost functions associated with transmission and attack efforts. We seek to derive a Nash equilibrium that characterizes the optimal strategies of both transmitters and attacker. By solving Karush-Kuhn-Tucker (KKT) conditions, we obtain analytical equilibrium solutions between transmission efficiency and attack resilience. Our analysis highlights key trade-offs: increasing a sensor transmission cost reduces its activity rate but makes it a more attractive target for attacks, leading to a redistribution of adversarial efforts. Conversely, higher attack costs discourage malicious interference, prompting strategic adjustments in both transmission and defense mechanisms. These findings provide insights to enhance network resilience against strategic adversaries.
2025
Proceedings of the 2025 IEEE International Conference on Cyber Security and Resilience, CSR 2025
5th IEEE International Conference on Cyber Security and Resilience, CSR 2025
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11577/3562042
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 0
  • OpenAlex 0
social impact