Next Article in Journal
Integrated Management of Energy, Wellbeing and Health in the Next Generation of Smart Homes
Next Article in Special Issue
Tell the Device Password: Smart Device Wi-Fi Connection Based on Audio Waves
Previous Article in Journal
Smelling Nano Aerial Vehicle for Gas Source Localization and Mapping
Previous Article in Special Issue
Stackelberg Dynamic Game-Based Resource Allocation in Threat Defense for Internet of Things

An Adversarial-Risk-Analysis Approach to Counterterrorist Online Surveillance

Mossos d’Esquadra, Catalan Police, 08080 Barcelona, Spain
Department of Computer Science and Mathematics, Universitat Rovira i Virgili, CYBERCAT-Center for Cybersecurity Research of Catalonia, 43007 Tarragona, Spain
Author to whom correspondence should be addressed.
Sensors 2019, 19(3), 480;
Received: 30 December 2018 / Revised: 21 January 2019 / Accepted: 22 January 2019 / Published: 24 January 2019
(This article belongs to the Special Issue Threat Identification and Defence for Internet-of-Things)
The Internet, with the rise of the IoT, is one of the most powerful means of propagating a terrorist threat, and at the same time the perfect environment for deploying ubiquitous online surveillance systems. This paper tackles the problem of online surveillance, which we define as the monitoring by a security agency of a set of websites through tracking and classification of profiles that are potentially suspected of carrying out terrorist attacks. We conduct a theoretical analysis in this scenario that investigates the introduction of automatic classification technology compared to the status quo involving manual investigation of the collected profiles. Our analysis starts examining the suitability of game-theoretic-based models for decision-making in the introduction of this technology. We propose an adversarial-risk-analysis (ARA) model as a novel way of approaching the online surveillance problem that has the advantage of discarding the hypothesis of common knowledge. The proposed model allows us to study the rationality conditions of the automatic suspect detection technology, determining under which circumstances it is better than the traditional human-based approach. Our experimental results show the benefits of the proposed model. Compared to standard game theory, our ARA-based model indicates in general greater prudence in the deployment of the automatic technology and exhibits satisfactory performance without having to relax crucial hypotheses such as common knowledge and therefore subtracting realism from the problem, although at the expense of higher computational complexity. View Full-Text
Keywords: adversarial risk analysis; online surveillance; counterterrorism; threat identification; Internet of things adversarial risk analysis; online surveillance; counterterrorism; threat identification; Internet of things
Show Figures

Figure 1

MDPI and ACS Style

Gil, C.; Parra-Arnau, J. An Adversarial-Risk-Analysis Approach to Counterterrorist Online Surveillance. Sensors 2019, 19, 480.

AMA Style

Gil C, Parra-Arnau J. An Adversarial-Risk-Analysis Approach to Counterterrorist Online Surveillance. Sensors. 2019; 19(3):480.

Chicago/Turabian Style

Gil, César, and Javier Parra-Arnau. 2019. "An Adversarial-Risk-Analysis Approach to Counterterrorist Online Surveillance" Sensors 19, no. 3: 480.

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Back to TopTop