Non-zero-sum game-based trust model to enhance wireless sensor networks security for IoT applications

被引:43
作者
Abdalzaher, Mohamed S. [1 ]
Samy, Lotfy [1 ,2 ]
Muta, Osamu [3 ]
机构
[1] Natl Res Inst Astron & Geophys, Seismol Dept, Natl Seism Network Lab, Elmarsad St, Cairo 11421, Egypt
[2] Nahda Univ, Elect & Commun Engn Dept, Bani Suwayf, Egypt
[3] Kyushu Univ, Ctr Japan Egypt Cooperat Sci & Technol, Nishi Ku, 744 Motooka, Fukuoka, Fukuoka 8190395, Japan
关键词
security of data; game theory; telecommunication network reliability; wireless sensor networks; Internet of Things; denial-of-service attack; CWSNs; DoS; ON-OFF attacks; nonzero-sum game-based trust model; wireless sensor networks security; IoT applications; day-to-day attack challenges; clustered-WSNs security; data trustworthiness transmission; attack-defence scenarios; data trustworthiness; ATTACKS; INTERNET; STRATEGY; THINGS;
D O I
10.1049/iet-wss.2018.5114
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Nowadays, trust models of wireless sensor networks (WSNs) security have flourished due to the day-to-day attack challenges, which are most popular for internet of things (IoT). This article proposes a trust model based on non-zero-sum game approach for clustered-WSNs (CWSNs) security to maximise the data trustworthiness transmission. The proposed model is developed for two different attack-defence scenarios. In the first scenario, the trust model is used to face a denial-of-service (DoS) attack in which the attacker is able to drop or partially drop the delivered acknowledgments (ACKs) from a cluster member (CM) to the cluster head (CH). In the second scenario, the model target is to protect CWSNs from ON-OFF attack where the attacker is capable to frequently infect the CMs. Simulation results show improved performance of protecting the CWSNs against DoS/ON-OFF attacks and maximising data trustworthiness represented by the CMs compliance of sending the ACKs to the CH. Consequently, this mechanism can attain the appropriate security and performance for WSN-based IoT systems.
引用
收藏
页码:218 / 226
页数:9
相关论文
共 40 条
[1]  
Abdalzaher Mohamed S., 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), P853, DOI 10.1109/CCNC.2016.7444900
[2]  
Abdalzaher MS, 2017, IEEE SYMP COMP COMMU, P1257, DOI 10.1109/ISCC.2017.8024697
[3]  
Abdalzaher MS, 2017, IEEE SYMP COMP COMMU, P552, DOI 10.1109/ISCC.2017.8024586
[4]   Using Stackelberg game to enhance cognitive radio sensor networks security [J].
Abdalzaher, Mohamed S. ;
Seddik, Karim ;
Muta, Osamu .
IET COMMUNICATIONS, 2017, 11 (09) :1503-1511
[5]   Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey [J].
Abdalzaher, Mohamed S. ;
Seddik, Karim ;
Elsabrouty, Maha ;
Muta, Osamu ;
Furukawa, Hiroshi ;
Abdel-Rahman, Adel .
SENSORS, 2016, 16 (07)
[6]   Outlier detection for wireless sensor networks using density-based clustering approach [J].
Abid, Aymen ;
Kachouri, Abdennaceur ;
Mahfoudhi, Adel .
IET Wireless Sensor Systems, 2017, 7 (04) :83-90
[7]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[8]  
Bo Yu, 2006, Proceedings. 20th International Parallel and Distributed Processing Symposium (IEEE Cat. No.06TH8860)
[9]   Lightweight cloned-node detection algorithm for efficiently handling SSDF attacks and facilitating secure spectrum allocation in CWSNs [J].
Chatterjee, Pinaki Sankar ;
Roy, Monideepa .
IET WIRELESS SENSOR SYSTEMS, 2018, 8 (03) :121-128
[10]  
Chuang Y.-T., 2016, PEER TO PEER NETWORK, V10, P1