Security of the Internet of Things Based on Game Algorithm

被引:0
|
作者
Yi, Yue-e [1 ]
机构
[1] Changsha Social Work Coll, Changsha, Hunan, Peoples R China
关键词
Internet of Things; perception environment; game; malicious node; detection node;
D O I
10.3991/ijoe.v14i08.9178
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
To explore the security mechanism of the Internet of Things (IoT) perception environment, we perform a security research on the IoT on the basis of game algorithm. The dynamic game method of node cooperation is used in the experiments. Firstly, multiple report nodes are merged into a game party, and the dynamic game for two parties is established with the detection node. In the environment where the malicious nodes are dominant, the detection nodes collaborate, and the state of the unknown nodes is conjectured by the reputation value of the reporting nodes. The high trust reference report is used for the modification and reduction the weight of malicious nodes in the overall report, for node merging, and finally for bias equilibrium. The results show that cooperative game can significantly improve the success rate of incident monitoring and reduce the number of forged reports.
引用
收藏
页码:80 / 93
页数:14
相关论文
共 50 条
  • [41] Botnets and Internet of Things Security
    Bertino, Elisa
    Islam, Nayeem
    COMPUTER, 2017, 50 (02) : 76 - 79
  • [42] Internet of things: Survey on security
    Mena, Diego Mendez
    Papapanagiotou, Ioannis
    Yang, Baijian
    INFORMATION SECURITY JOURNAL, 2018, 27 (03): : 162 - 182
  • [43] Privacy and Security in Internet-based Computing: Cloud Computing, Internet of Things, Cloud of Things: a review
    Sahmim, Syrine
    Gharsellaoui, Hamza
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS, 2017, 112 : 1516 - 1522
  • [44] A Binary Trust Game for the Internet of Things
    Marche, Claudio
    Nitti, Michele
    IOT, 2021, 2 (01): : 50 - 70
  • [45] Game Theory in Internet of Things: A Survey
    Chi, Chuanxiu
    Wang, Yingjie
    Tong, Xiangrong
    Siddula, Madhuri
    Cai, Zhipeng
    IEEE INTERNET OF THINGS JOURNAL, 2021, 9 (14) : 12125 - 12146
  • [46] The application of fuzzy-based Internet of Things in household security
    Lu, Boyong
    SPORTS MATERIALS, MODELLING AND SIMULATION, 2011, 187 : 735 - 740
  • [47] A Blockchain-based Security Approach Architecture for the Internet of Things
    Zhang, Han
    Lang, Weimin
    Liu, Chengming
    Zhang, Bingpeng
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 310 - 313
  • [48] An improved trust-based security framework for internet of things
    Renjith P.N.
    Ramesh K.
    Sasikumar S.
    International Journal of Information Technology, 2021, 13 (2) : 677 - 685
  • [49] Blockchain-Based Security Aspects in Internet of Things Network
    Pohrmen, Fabiola Hazel
    Das, Rohit Kumar
    Khongbuh, Wanbanker
    Saha, Goutam
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II, 2019, 956 : 346 - 357
  • [50] Multicast Security Model for Internet of Things Based on Context Awareness
    Harb, Hussein
    William, Ashraf
    El-Mohsen, Omayma A.
    Mansour, Hala A.
    2017 13TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2017, : 303 - 309