Security of the Internet of Things Based on Game Algorithm

被引:0
|
作者
Yi, Yue-e [1 ]
机构
[1] Changsha Social Work Coll, Changsha, Hunan, Peoples R China
关键词
Internet of Things; perception environment; game; malicious node; detection node;
D O I
10.3991/ijoe.v14i08.9178
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
To explore the security mechanism of the Internet of Things (IoT) perception environment, we perform a security research on the IoT on the basis of game algorithm. The dynamic game method of node cooperation is used in the experiments. Firstly, multiple report nodes are merged into a game party, and the dynamic game for two parties is established with the detection node. In the environment where the malicious nodes are dominant, the detection nodes collaborate, and the state of the unknown nodes is conjectured by the reputation value of the reporting nodes. The high trust reference report is used for the modification and reduction the weight of malicious nodes in the overall report, for node merging, and finally for bias equilibrium. The results show that cooperative game can significantly improve the success rate of incident monitoring and reduce the number of forged reports.
引用
收藏
页码:80 / 93
页数:14
相关论文
共 50 条
  • [21] A DTLS-based Security Architecture for the Internet of Things
    dos Santos, Glederson Lessa
    GuimarAes, Vinicius Tavares
    Rodrigues, Guilherme da Cunha
    Granville, Lisandro Zambenedetti
    Rockenbach Tarouco, Liane Margarida
    2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2015, : 809 - 815
  • [22] Security Challenges in the IP-based Internet of Things
    Tobias Heer
    Oscar Garcia-Morchon
    René Hummen
    Sye Loong Keoh
    Sandeep S. Kumar
    Klaus Wehrle
    Wireless Personal Communications, 2011, 61 : 527 - 542
  • [23] Security Technology of Smart Home Based on Internet of Things
    Xu, Zhi-fang
    Zhu, Xun
    Gui, Lin
    INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL AND AUTOMATION ENGINEERING (ECAE 2013), 2013, : 536 - 540
  • [24] Distributed network security framework of energy internet based on internet of things
    Zhang, Jie
    SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS, 2021, 44
  • [25] Blockchain based Security System for the Devices in Internet of Things
    Sureshkumar, T.
    Vijayakumar, M.
    2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 142 - 145
  • [26] A Mixed Encryption Algorithm Used in Internet of Things Security Transmission System
    Xin, Mingyuan
    2015 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, 2015, : 62 - 65
  • [27] Chaos encryption algorithm to deal with security threat to internet of things RFID
    Xiaoyong, Tian
    Journal of Networks, 2013, 8 (05) : 1168 - 1174
  • [28] Security Challenges in the IP-based Internet of Things
    Heer, Tobias
    Garcia-Morchon, Oscar
    Hummen, Rene
    Keoh, Sye Loong
    Kumar, Sandeep S.
    Wehrle, Klaus
    WIRELESS PERSONAL COMMUNICATIONS, 2011, 61 (03) : 527 - 542
  • [29] Security of internet of things based on cryptographic algorithms: a survey
    Mousavi, Seyyed Keyvan
    Ghaffari, Ali
    Besharat, Sina
    Afshari, Hamed
    WIRELESS NETWORKS, 2021, 27 (02) : 1515 - 1555
  • [30] A Model-based Security Toolkit for the Internet of Things
    Neisse, Ricardo
    Fovino, Igor Nai
    Baldini, Gianmarco
    Stavroulaki, Vera
    Vlacheas, Panagiotis
    Giaffreda, Raffaele
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 78 - 87