Game-Theoretic Security Analysis in Heterogeneous IoT Networks: A Competition Perspective

被引:1
作者
Zhu, Yuyao [1 ]
Wu, Huici [1 ,2 ]
Tao, Xiaofeng [1 ,2 ]
Wang, Shen [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Natl Engn Res Ctr Mobile Network Technol, Beijing 100876, Peoples R China
[2] Dept Broadband Commun, Pengcheng Lab, Shenzhen 518066, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 21期
基金
中国国家自然科学基金;
关键词
Security; Internet of Things; Resource management; Entropy; Games; Network security; Computational modeling; Internet of Things (IoT); multiconnected heterogeneous networks; resource allocation; security game; RESOURCE-ALLOCATION; INTERNET; SCHEME;
D O I
10.1109/JIOT.2024.3435879
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many interconnected terminals in the Internet of Things (IoT) networks raise significant security risks. From a competitive perspective, the many heterogeneous nodes, including various wireless terminals, access points, and base stations are the competing targets between the defenders and potential attackers. This article proposes a security competition model based on the game theory to address the security competition problem. The model has two players, a defender and an attacker, who allocate resources to each IoT node according to their strategies. A novel metric, security entropy, derived from the security probability, quantifies each node's security status. Based on the node heterogeneity, the overall security performance of the considered IoT network is evaluated with a topology-determined weighted security entropy. The defender and the attacker, respectively, aim to decrease and increase the weighted security entropy while balancing the cost, which constitutes their utility functions. The existence of the unique Nash equilibrium is proved. A best response selection algorithm for the optimal solutions is designed. The experimental results demonstrate that the proposed model effectively represents the goal orientation and interaction between the attackers and defenders in various scenarios. Additionally, increasing the cost for the attackers significantly reduces their resource allocation, especially to the attackers leading to a decrease in the system's security entropy.
引用
收藏
页码:35048 / 35059
页数:12
相关论文
共 33 条
[1]   Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs [J].
Abdallah, Mustafa ;
Naghizadeh, Parinaz ;
Hota, Ashish R. ;
Cason, Timothy ;
Bagchi, Saurabh ;
Sundaram, Shreyas .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2020, 7 (04) :1585-1596
[2]   A Dynamic Game Approach to Designing Secure Interdependent IoT-Enabled Infrastructure Network [J].
Chen, Juntao ;
Touati, Corinne ;
Zhu, Quanyan .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (03) :2601-2612
[3]   Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things [J].
Chen, Juntao ;
Zhu, Quanyan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (11) :2958-2971
[4]  
Chen X., 2020, P IEEE INT C COMM IC, P1
[5]   A Privacy Preservation Based Scheme for Task Assignment in Internet of Things [J].
Dai, Minghui ;
Li, Jiliang ;
Su, Zhou ;
Chen, Weiwei ;
Xu, Qichao ;
Fu, Shu .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (04) :2323-2335
[6]  
Fu Chen, 2019, 2019 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (QR2MSE), P662, DOI 10.1109/QR2MSE46217.2019.9021137
[7]  
Gong SQ, 2016, CHINA COMMUN, V13, P82, DOI 10.1109/CC.2016.7445504
[8]   Combating Jamming Attacks in Multi-channel IoT Networks Using Game Theory [J].
Gouissem, A. ;
Abualsaud, K. ;
Yaacoub, E. ;
Khattab, T. ;
Guizani, M. .
2020 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT 2020), 2020, :469-474
[9]   INFORMATION THEORY AND STATISTICAL MECHANICS [J].
JAYNES, ET .
PHYSICAL REVIEW, 1957, 106 (04) :620-630
[10]   Recent Developments in Game-Theory Approaches for the Detection and Defense against Advanced Persistent Threats (APTs): A Systematic Review [J].
Khalid, Mohd Nor Akmal ;
Al-Kadhimi, Amjed Ahmed ;
Singh, Manmeet Mahinderjit .
MATHEMATICS, 2023, 11 (06)