scholarly journals A Prospect Theoretic Approach for Trust Management in IoT Networks under Manipulation Attacks

Author(s):  
Mehrdad Salimitari ◽  
Shameek Bhattacharjee ◽  
Mainak Chatterjee ◽  
Yaser Fallah

<div>As Internet of Things (IoT) and Cyber-Physical systems become more ubiquitous in our daily lives, it necessitates the capability to measure the trustworthiness of the aggregate data from such systems to make fair decisions. However, the interpretation of trustworthiness is contextual and varies according to the risk tolerance attitude of the concerned application. In addition, there exist varying levels of uncertainty associated with an evidence upon which a trust model is built. Hence, the data integrity scoring mechanisms require some provisions to adapt to different risk attitudes and uncertainties.</div><div><br></div><div>In this paper, we propose a prospect theoretic framework for data integrity scoring that quantifies the trustworthiness of the collected data from IoT devices in the presence of adversaries who try to manipulate the data. In our proposed method, we consider an imperfect anomaly monitoring mechanism that tracks the transmitted data from each device and classifies the outcome (trustworthiness</div><div>of data) as not compromised, compromised, or undecided. These outcomes are conceptualized as a multinomial hypothesis of a Bayesian inference model with three parameters. These parameters are then used for calculating a utility value via prospect theory to evaluate</div><div>the reliability of the aggregate data at an IoT hub. In addition, to take into account different risk attitudes, we propose two types of fusion rule at IoT hub– optimistic and conservative.</div><div><br></div><div>Furthermore, we put forward asymmetric weighted moving average (AWMA) scheme to measure the trustworthiness of aggregate data in presence of On-Off attacks. The proposed framework is validated using extensive simulation experiments for both uniform and On-Off attacks. We show how trust scores vary under a variety of system factors like attack magnitude and inaccurate detection. In addition, we measure the trustworthiness of the aggregate data using the well-known expected utility theory and compare the results</div><div>with that obtained by prospect theory. The simulation results reveal that prospect theory quantifies trustworthiness of the aggregate data better than expected utility theory.</div>

Author(s):  
Mehrdad Salimitari ◽  
Shameek Bhattacharjee ◽  
Mainak Chatterjee ◽  
Yaser Fallah

<div>As Internet of Things (IoT) and Cyber-Physical systems become more ubiquitous in our daily lives, it necessitates the capability to measure the trustworthiness of the aggregate data from such systems to make fair decisions. However, the interpretation of trustworthiness is contextual and varies according to the risk tolerance attitude of the concerned application. In addition, there exist varying levels of uncertainty associated with an evidence upon which a trust model is built. Hence, the data integrity scoring mechanisms require some provisions to adapt to different risk attitudes and uncertainties.</div><div><br></div><div>In this paper, we propose a prospect theoretic framework for data integrity scoring that quantifies the trustworthiness of the collected data from IoT devices in the presence of adversaries who try to manipulate the data. In our proposed method, we consider an imperfect anomaly monitoring mechanism that tracks the transmitted data from each device and classifies the outcome (trustworthiness</div><div>of data) as not compromised, compromised, or undecided. These outcomes are conceptualized as a multinomial hypothesis of a Bayesian inference model with three parameters. These parameters are then used for calculating a utility value via prospect theory to evaluate</div><div>the reliability of the aggregate data at an IoT hub. In addition, to take into account different risk attitudes, we propose two types of fusion rule at IoT hub– optimistic and conservative.</div><div><br></div><div>Furthermore, we put forward asymmetric weighted moving average (AWMA) scheme to measure the trustworthiness of aggregate data in presence of On-Off attacks. The proposed framework is validated using extensive simulation experiments for both uniform and On-Off attacks. We show how trust scores vary under a variety of system factors like attack magnitude and inaccurate detection. In addition, we measure the trustworthiness of the aggregate data using the well-known expected utility theory and compare the results</div><div>with that obtained by prospect theory. The simulation results reveal that prospect theory quantifies trustworthiness of the aggregate data better than expected utility theory.</div>


Risks ◽  
2021 ◽  
Vol 9 (4) ◽  
pp. 72
Author(s):  
Oleg Uzhga-Rebrov ◽  
Peter Grabusts

Choosing solutions under risk and uncertainty requires the consideration of several factors. One of the main factors in choosing a solution is modeling the decision maker’s attitude to risk. The expected utility theory was the first approach that allowed to correctly model various nuances of the attitude to risk. Further research in this area has led to the emergence of even more effective approaches to solving this problem. Currently, the most developed theory of choice with respect to decisions under risk conditions is the cumulative prospect theory. This paper presents the development history of various extensions of the original expected utility theory, and the analysis of the main properties of the cumulative prospect theory. The main result of this work is a fuzzy version of the prospect theory, which allows handling fuzzy values of the decisions (prospects). The paper presents the theoretical foundations of the proposed version, an illustrative practical example, and conclusions based on the results obtained.


2019 ◽  
Vol 11 (3) ◽  
pp. 34-67 ◽  
Author(s):  
Hui-Kuan Chung ◽  
Paul Glimcher ◽  
Agnieszka Tymula

Prospect theory, used descriptively for decisions under both risk and certainty, presumes concave utility over gains and convex utility over losses; a pattern widely seen in lottery tasks. Although such discontinuous gain-loss reference-dependence is also used to model riskless choices, only limited empirical evidence supports this use. In incentive-compatible experiments, we find that gain-loss reflection effects are not observed under riskless choice as predicted by prospect theory, even while in the same subjects gain-loss reflection effects are observed under risk. Our empirical results challenge the application of choice models across both risky and riskless domains. (JEL C91, D12, D81)


1988 ◽  
Vol 82 (3) ◽  
pp. 719-736 ◽  
Author(s):  
George A. Quattrone ◽  
Amos Tversky

We contrast the rational theory of choice in the form of expected utility theory with descriptive psychological analysis in the form of prospect theory, using problems involving the choice between political candidates and public referendum issues. The results showed that the assumptions underlying the classical theory of risky choice are systematically violated in the manner predicted by prospect theory. In particular, our respondents exhibited risk aversion in the domain of gains, risk seeking in the domain of losses, and a greater sensitivity to losses than to gains. This is consistent with the advantage of the incumbent under normal conditions and the potential advantage of the challenger in bad times. The results further show how a shift in the reference point could lead to reversals of preferences in the evaluation of political and economic options, contrary to the assumption of invariance. Finally, we contrast the normative and descriptive analyses of uncertainty in choice and address the rationality of voting.


Sign in / Sign up

Export Citation Format

Share Document