Security of the Internet of Things Based on Game Algorithm

被引:0
作者
Yi, Yue-e [1 ]
机构
[1] Changsha Social Work Coll, Changsha, Hunan, Peoples R China
关键词
Internet of Things; perception environment; game; malicious node; detection node;
D O I
10.3991/ijoe.v14i08.9178
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
To explore the security mechanism of the Internet of Things (IoT) perception environment, we perform a security research on the IoT on the basis of game algorithm. The dynamic game method of node cooperation is used in the experiments. Firstly, multiple report nodes are merged into a game party, and the dynamic game for two parties is established with the detection node. In the environment where the malicious nodes are dominant, the detection nodes collaborate, and the state of the unknown nodes is conjectured by the reputation value of the reporting nodes. The high trust reference report is used for the modification and reduction the weight of malicious nodes in the overall report, for node merging, and finally for bias equilibrium. The results show that cooperative game can significantly improve the success rate of incident monitoring and reduce the number of forged reports.
引用
收藏
页码:80 / 93
页数:14
相关论文
共 8 条
[1]  
Chettri R., 2015, INT J COMPUTER APPL, V130, P1009, DOI [10.5120/IJCA2015907120, DOI 10.5120/IJCA2015907120]
[2]  
Lee J.H., 2015, BIOMED RES INT, V2015, P10, DOI DOI 10.1155/2015/137020
[3]  
[李超良 Li Chaoliang], 2014, [中南大学学报. 自然科学版, Journal of Central South University of Science and Technology], V45, P3824
[4]   A data classification algorithm of internet of things based on neural network [J].
Li, Zhenjun .
International Journal of Online Engineering, 2017, 13 (09) :28-37
[5]   D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks [J].
Shamshirband, Shahaboddin ;
Amini, Amineh ;
Anuar, Nor Badrul ;
Kiah, Miss Laiha Mat ;
Teh, Ying Wah ;
Furnell, Steven .
MEASUREMENT, 2014, 55 :212-226
[6]   Research on Energy-Aware Topology Strategy Based on Wireless Sensor in Internet of Things [J].
Tang, XueFei ;
Niu, XinZheng ;
Ali, Shahzad .
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2014, 7 (06) :1137-1147
[7]  
Xie M, 2017, J ELECT COMPUT ENG, V2017, P1, DOI DOI 10.HTTPS://D0I.0RG/10.1155/2017/2970673
[8]   Fuzzy Comprehensive Evaluation Algorithm for Power Information System Security Level Based on the Internet of Things [J].
Zeng Ming ;
Wang Shicheng .
INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2016, 12 (05) :17-21