Security of the Internet of Things Based on Game Algorithm

被引:0
|
作者
Yi, Yue-e [1 ]
机构
[1] Changsha Social Work Coll, Changsha, Hunan, Peoples R China
关键词
Internet of Things; perception environment; game; malicious node; detection node;
D O I
10.3991/ijoe.v14i08.9178
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
To explore the security mechanism of the Internet of Things (IoT) perception environment, we perform a security research on the IoT on the basis of game algorithm. The dynamic game method of node cooperation is used in the experiments. Firstly, multiple report nodes are merged into a game party, and the dynamic game for two parties is established with the detection node. In the environment where the malicious nodes are dominant, the detection nodes collaborate, and the state of the unknown nodes is conjectured by the reputation value of the reporting nodes. The high trust reference report is used for the modification and reduction the weight of malicious nodes in the overall report, for node merging, and finally for bias equilibrium. The results show that cooperative game can significantly improve the success rate of incident monitoring and reduce the number of forged reports.
引用
收藏
页码:80 / 93
页数:14
相关论文
共 50 条
  • [31] Data security enhancement in internet of things using optimised hashing algorithm
    Kumar, U. Arun
    Kumar, R. Prem
    Kumar, S. A. Siva
    Shankar, B. Maruthi
    Mahendran, G.
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2024, 45 (01) : 26 - 35
  • [32] A Survey on the Internet of Things Security
    Zhao, Kai
    Ge, Lina
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 663 - 667
  • [33] Cyberentity Security in the Internet of Things
    Ning, Huansheng
    Liu, Hong
    Yang, Laurence T.
    COMPUTER, 2013, 46 (04) : 46 - 53
  • [34] A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS
    Behrens, Reinhard
    Ahmed, Ali
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (12): : 6092 - 6115
  • [35] The security issues of the Internet of Things
    Tankard, Colin
    Computer Fraud and Security, 2015, 2015 (09) : 11 - 14
  • [36] An Overview of Security in Internet of Things
    Jose, Deepa V.
    Vijyalakshmi, A.
    8TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING & COMMUNICATIONS (ICACC-2018), 2018, 143 : 744 - 748
  • [37] Security in Internet of Things: A Review
    Khan, Naqash Azeem
    Awang, Azlan
    Karim, Samsul Ariffin Abdul
    IEEE ACCESS, 2022, 10 : 104649 - 104670
  • [38] Security Review On The Internet of Things
    Whitter-Jones, Jack
    2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2018, : 163 - 168
  • [39] Security and privacy for the Internet of Things
    Rullo, Antonino
    Ianni, Michele
    Serra, Edoardo
    FRONTIERS IN COMPUTER SCIENCE, 2023, 5
  • [40] Survey of Internet of Things Security
    Zhang Y.
    Zhou W.
    Peng A.
    1600, Science Press (54): : 2130 - 2143