Stochastic Differential Game-Based Malware Propagation in Edge Computing-Based IoT

被引:4
作者
Miao, Li [1 ]
Li, Shuai [1 ]
机构
[1] Ningxia Univ, Sch Informat Engn, Yinchuan 750021, Ningxia, Peoples R China
关键词
SECURITY; INTERNET;
D O I
10.1155/2021/8896715
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) has played an important role in our daily life since its emergence. The applications of IoT cover from the traditional devices to intelligent equipment. With the great potential of IoT, there comes various kinds of security problems. In this paper, we study the malware propagation under the dynamic interaction between the attackers and defenders in edge computing-based IoT and propose an infinite-horizon stochastic differential game model to discuss the optimal strategies for the attackers and defenders. Considering the effect of stochastic fluctuations in the edge network on the malware propagation, we construct the Ito stochastic differential equations to describe the propagation of the malware in edge computing-based IoT. Subsequently, we analyze the feedback Nash equilibrium solutions for our proposed game model, which can be considered as the optimal strategies for the defenders and attackers. Finally, numerical simulations show the effectiveness of our proposed game model.
引用
收藏
页数:11
相关论文
共 28 条
[1]   Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey [J].
Abdalzaher, Mohamed S. ;
Seddik, Karim ;
Elsabrouty, Maha ;
Muta, Osamu ;
Furukawa, Hiroshi ;
Abdel-Rahman, Adel .
SENSORS, 2016, 16 (07)
[2]   Edge computing technologies for Internet of Things: a primer [J].
Ai, Yuan ;
Peng, Mugen ;
Zhang, Kecheng .
DIGITAL COMMUNICATIONS AND NETWORKS, 2018, 4 (02) :77-86
[3]  
ANDERSON R M, 1991
[4]  
[Anonymous], 2006, Cooperative stochastic differential games
[5]  
[Anonymous], 2010, Network Security: A Decision and Game-Theoretic Approach
[6]  
[Anonymous], 2018, IEEE COMMUN MAG
[7]  
Dehghantanha A, 2018, IEEE T SUSTAINABLE C, V99
[8]   Analysis of Multiple Clients' Behaviors in Edge Computing Environment [J].
Guan, Peiyuan ;
Deng, Xiaoheng ;
Liu, Yajun ;
Zhang, Honggang .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (09) :9052-9055
[9]   Security in the Internet of Things Supported by Mobile Edge Computing [J].
He, Daojing ;
Chan, Sammy ;
Guizani, Mohsen .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (08) :56-61
[10]  
Indre I, 2016, INT C INTELL COMP CO, P175, DOI 10.1109/ICCP.2016.7737142