publication . Preprint . Article . 2017

Cyber Insurance for Heterogeneous Wireless Networks

Xiao Lu; Dusit Niyato; Hai Jiang; Ping Wang; H. Vincent Poor;
Open Access English
  • Published: 21 Sep 2017
Abstract
Heterogeneous wireless networks (HWNs) composed of densely deployed base stations of different types with various radio access technologies have become a prevailing trend to accommodate ever-increasing traffic demand in enormous volume. Nowadays, users rely heavily on HWNs for ubiquitous network access that contains valuable and critical information such as financial transactions, e-health, and public safety. Cyber risks, representing one of the most significant threats to network security and reliability, are increasing in severity. To address this problem, this article introduces the concept of cyber insurance to transfer the cyber risk (i.e., service outage, ...
Persistent Identifiers
Subjects
free text keywords: Computer Science - Networking and Internet Architecture, Computer Networks and Communications, Electrical and Electronic Engineering, Computer Science Applications, Wireless network, Network security, business.industry, business, Financial transaction, Base station, Radio access, Computer security, computer.software_genre, computer, Wireless, Vulnerability, Cyber-Insurance, Computer science

[1] H. Zhang et al., “Fronthauling for 5G LTE-U Ultra Dense Cloud Small Cell Networks,” IEEE Wireless Communications, vol. 23, no. 6, pp. 48-53, December 2016.

[2] Marsh & McLennan, MMC Cyber Handbook 2016. Accessed on September 14th, 2017. [Online]. Available: https://www.mmc.com/content/dam/mmc-web/Global-Risk-Center/Files/MMC-Cyber-Handbook 2016-web-final.pdf. Accessed on September 14th, 2017.

[3] Financial Fraud ActionUK, Fraud the facts 2017. [Online]. Available: https://www.financialfraudaction.org.uk/fraudfacts17/assets/fraud the facts.pdf. Accessed on September 14th, 2017.

[4] Steve Morgan, Top 5 cybersecurity facts, figures and statistics for 2017. [Online]. Available: http://www.csoonline.com/article/3153707/security/top-5-cybersecurity-facts-figures-and-statistics-for-2017.html. Accessed on September 14th, 2017.

[5] I. F. Akyildiz et al., “5G roadmap: 10 key enabling technologies,” Computer Networks, vol. 106, pp. 17-48, September 2016.

[6] E. Hossain et al., “Evolution toward 5G multi-tier cellular wireless networks: An interference management perspective,” IEEE Wireless Communications, vol. 21, no. 3, pp. 118-127, June 2014.

[7] L. A. Gordon, P. M. Loeb, and T. Sohail, “A framework for using insurance for cyber risk management,” Communications of the ACM, vol. 46, no. 3, pp. 81-85, March 2003.

[8] R. Zhang, Q. Zhu and Y. Hayel, “A bi-level game approach to attack-aware cyber insurance of computer networks,” IEEE Journal on Selected Areas in Communications, vol. 35, no. 3, pp. 779-794, March 2017.

[9] H. Jo et al., “Heterogeneous cellular networks with flexible cell association: A comprehensive downlink SINR analysis.” IEEE Transactions on Wireless Communications, vol. 11, no. 10, pp. 3484-3495, August 2012.

[10] H. Zhang et al., “Cooperative interference mitigation and handover management for heterogeneous cloud small cell networks,” IEEE Wireless Communications, vol. 22, no. 3, pp. 92-99, June 2015.

[11] E. Bastug, M. Bennis, and M. Debbah, “Living on the edge: The role of proactive caching in 5G wireless networks,” IEEE Communications Magazine, vol. 52, no. 8, pp. 82-89, August 2014.

[12] AIG, CyberEdge, [Online]. Available: http://www.aig.com/business/insurance/cyber-insurance. Accessed on September 14th, 2017.

[13] L. Decreusefond et al., “Determinantal point processes,” Advances in Applied Probability, vol. 52, no. 4, pp. 311-342, August 2015.

[14] D. C. M. Dickson, Insurance Risk and Ruin, Cambridge University Press, November 2010.

[15] P. Picard and C. Lefe`vre, “The probability of ruin in finite time with discrete claim size distribution,” Scandinavian Actuarial Journal, vol. 1997, no. 1, pp. 58-69, 1997.

Any information missing or wrong?Report an Issue