Stackelberg Dynamic Game-Based Resource Allocation in Threat Defense for Internet of Things

被引:11
作者
Liu, Bingjie [1 ]
Xu, Haitao [1 ]
Zhou, Xianwei [1 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
关键词
resource allocation; threat defense; Internet of Things; Stackelberg dynamic game; Nash equilibrium; WIRELESS NETWORKS; UPLINK POWER; SECURITY; ATTACKS; MODEL;
D O I
10.3390/s18114074
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
With the rapid development of the Internet of Things, there are a series of security problems faced by the IoT devices. As the IoT devices are generally devices with limited resources, how to effectively allocate the restricted resources facing the security problems is the key issue at present. In this paper, we study the resource allocation problem in threat defense for the resource-constrained IoT system, and propose a Stackelberg dynamic game model to get the optimal allocated resources for both the defender and attackers. The proposed Stackelberg dynamic game model is composed by one defender and many attackers. Given the objective functions of the defender and attackers, we analyze both the open-loop Nash equilibrium and feedback Nash equilibrium for the defender and attackers. Then both the defender and attackers can control their available resources based on the Nash equilibrium solutions of the dynamic game. Numerical simulation results show that correctness and effeteness of the proposed model.
引用
收藏
页数:16
相关论文
共 34 条
  • [21] Game Theory Meets Network Security and Privacy
    Manshaei, Mohammad Hossein
    Zhu, Quanyan
    Alpcan, Tansu
    Basar, Tamer
    Hubaux, Jean-Pierre
    [J]. ACM COMPUTING SURVEYS, 2013, 45 (03)
  • [22] A CONCEPTUAL MODEL TO SUPPORT SECURITY ANALYSIS IN THE INTERNET OF THINGS
    Mavropoulos, Orestis
    Mouratidis, Haralambos
    Fish, Andrew
    Panaousis, Emmanouil
    Kalloniatis, Christos
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2017, 14 (02) : 557 - 578
  • [23] Internet of things: Vision, applications and research challenges
    Miorandi, Daniele
    Sicari, Sabrina
    De Pellegrini, Francesco
    Chlamtac, Imrich
    [J]. AD HOC NETWORKS, 2012, 10 (07) : 1497 - 1516
  • [24] Oleshchuk Vladimir, 2009, Proceedings 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), P336, DOI 10.1109/WIRELESSVITAE.2009.5172470
  • [25] Petrosyan L. A., 2006, SPRING S OPERAT RES
  • [26] Pontryagin, 1962, MATH THEORY OPTIMAL, DOI [10.1002/zamm.19630431023, DOI 10.1002/ZAMM.19630431023]
  • [27] Tague P, 2008, IEEE INFOCOM SER, P664
  • [28] Modeling adaptive node capture attacks in multi-hop wireless networks
    Tague, Patrick
    Poovendran, Radha
    [J]. AD HOC NETWORKS, 2007, 5 (06) : 801 - 814
  • [29] Joint utility-based uplink power and rate allocation in wireless networks: A non-cooperative game theoretic framework
    Tsiropoulou, Eirini Eleni
    Vamvakas, Panagiotis
    Papavassiliou, Symeon
    [J]. PHYSICAL COMMUNICATION, 2013, 9 : 299 - 307
  • [30] Yang J., 2011, J. China Universities Posts Telecommun, V18, P109, DOI 10.1016/s1005-8885(10)60159-8