Security of the Internet of Things Based on Game Algorithm

被引:0
|
作者
Yi, Yue-e [1 ]
机构
[1] Changsha Social Work Coll, Changsha, Hunan, Peoples R China
关键词
Internet of Things; perception environment; game; malicious node; detection node;
D O I
10.3991/ijoe.v14i08.9178
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
To explore the security mechanism of the Internet of Things (IoT) perception environment, we perform a security research on the IoT on the basis of game algorithm. The dynamic game method of node cooperation is used in the experiments. Firstly, multiple report nodes are merged into a game party, and the dynamic game for two parties is established with the detection node. In the environment where the malicious nodes are dominant, the detection nodes collaborate, and the state of the unknown nodes is conjectured by the reputation value of the reporting nodes. The high trust reference report is used for the modification and reduction the weight of malicious nodes in the overall report, for node merging, and finally for bias equilibrium. The results show that cooperative game can significantly improve the success rate of incident monitoring and reduce the number of forged reports.
引用
收藏
页码:80 / 93
页数:14
相关论文
共 50 条
  • [1] A Game Theory Based Collaborative Security Detection Method for Internet of Things Systems
    Wu, Hao
    Wang, Wei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (06) : 1432 - 1445
  • [2] Game-Based Adaptive Security in the Internet of Things for eHealth
    Hamdi, Mohamed
    Abie, Habtamu
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 920 - 925
  • [3] Research on security of information sharing in Internet of Things based on key algorithm
    Wei, Pengcheng
    Zhou, Zhen
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 88 : 599 - 605
  • [4] Game of life-based critical security key mechanism infrastructure in internet of things
    Anandhavalli, A.
    Bhuvaneswari, A.
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2025, 21 (01)
  • [5] A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things
    Chen, Lili
    Wang, Zhen
    Li, Fenghua
    Guo, Yunchuan
    Geng, Kui
    SENSORS, 2020, 20 (03)
  • [6] A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things
    Hintaw, Ahmed J.
    Manickam, Selvakumar
    Karuppayah, Shankar
    Aladaileh, Mohammad Adnan
    Aboalmaaly, Mohammed Faiz
    Laghari, Shams Ul Arfeen
    IEEE ACCESS, 2023, 11 : 43019 - 43040
  • [7] Security defense strategy algorithm for Internet of Things based on deep reinforcement learning
    Feng, Xuecai
    Han, Jikai
    Zhang, Rui
    Xu, Shuo
    Xia, Hui
    HIGH-CONFIDENCE COMPUTING, 2024, 4 (01):
  • [8] A Security Differential Game Model for Sensor Networks in Context of the Internet of Things
    Yan Ding
    Xian-wei Zhou
    Zhi-mi Cheng
    Fu-hong Lin
    Wireless Personal Communications, 2013, 72 : 375 - 388
  • [9] A Security Differential Game Model for Sensor Networks in Context of the Internet of Things
    Ding, Yan
    Zhou, Xian-wei
    Cheng, Zhi-mi
    Lin, Fu-hong
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 72 (01) : 375 - 388
  • [10] Encryption and Hash based Security in Internet of Things
    Sundaram, B. Vinayaga
    Ramnath, M.
    Prasanth, M.
    Sundaram, Varsha J.
    2015 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2015,