Stackelberg Dynamic Game-Based Resource Allocation in Threat Defense for Internet of Things

被引:11
作者
Liu, Bingjie [1 ]
Xu, Haitao [1 ]
Zhou, Xianwei [1 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
关键词
resource allocation; threat defense; Internet of Things; Stackelberg dynamic game; Nash equilibrium; WIRELESS NETWORKS; UPLINK POWER; SECURITY; ATTACKS; MODEL;
D O I
10.3390/s18114074
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
With the rapid development of the Internet of Things, there are a series of security problems faced by the IoT devices. As the IoT devices are generally devices with limited resources, how to effectively allocate the restricted resources facing the security problems is the key issue at present. In this paper, we study the resource allocation problem in threat defense for the resource-constrained IoT system, and propose a Stackelberg dynamic game model to get the optimal allocated resources for both the defender and attackers. The proposed Stackelberg dynamic game model is composed by one defender and many attackers. Given the objective functions of the defender and attackers, we analyze both the open-loop Nash equilibrium and feedback Nash equilibrium for the defender and attackers. Then both the defender and attackers can control their available resources based on the Nash equilibrium solutions of the dynamic game. Numerical simulation results show that correctness and effeteness of the proposed model.
引用
收藏
页数:16
相关论文
共 34 条
  • [1] Acharya A, 2008, ADCOM: 2008 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, P1, DOI 10.1109/ADCOM.2008.4760419
  • [2] Al Daoud A, 2008, IEEE DECIS CONTR P, P1422, DOI 10.1109/CDC.2008.4738975
  • [3] Internet of Things security: A survey
    Alaba, Fadele Ayotunde
    Othman, Mazliza
    Hashem, Ibrahim Abaker Targio
    Alotaibi, Faiz
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 : 10 - 28
  • [4] Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system
    An, Xingshuo
    Su, Jingtao
    Lue, Xing
    Lin, Fuhong
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
  • [5] A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing
    An, Xingshuo
    Lin, Fuhong
    Xu, Shenggang
    Miao, Li
    Gong, Chao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [6] Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC
    An, Xingshuo
    Zhou, Xianwei
    Lu, Xing
    Lin, Fuhong
    Yang, Lei
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [7] [Anonymous], P INT C DEC GAM THEO
  • [8] Basar T, 2002, IEEE INFOCOM SER, P294, DOI 10.1109/INFCOM.2002.1019271
  • [9] Bloem M., 2007, P 2 INT C PERF EV ME, P1
  • [10] Choi Y.S., 2007, STUDY SENSOR NODE CA