Trust Evaluation for Light Weight Security in Sensor Enabled Internet of Things: Game Theory Oriented Approach

被引:43
作者
Rani, Rinki [1 ]
Kumar, Sushil [1 ]
Dohare, Upasana [1 ]
机构
[1] Jawaharlal Nehru Univ, Sch Comp & Syst Sci, New Delhi 110067, India
关键词
Clustering; energy; game theory; Internet of Things (IoT); security; sensor networks; trust; SYSTEM; NETWORKS; SCHEME;
D O I
10.1109/JIOT.2019.2917763
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In sensor-enabled Internet of Things (IoT), nodes are deployed in an open and remote environment, therefore, are vulnerable to a variety of attacks. Recently, trust-based schemes have played a pivotal role in addressing nodes' misbehavior attacks in IoT. However, the existing trust-based schemes apply network wide dissemination of the control packets that consume excessive energy in the quest of trust evaluation, which ultimately weakens the network lifetime. In this context, this paper presents an energy efficient trust evaluation (EETE) scheme that makes use of hierarchical trust evaluation model to alleviate the malicious effects of illegitimate sensor nodes and restricts network wide dissemination of trust requests to reduce the energy consumption in clustered-sensor enabled IoT. The proposed EETE scheme incorporates three dilemma game models to reduce additional needless transmissions while balancing the trust throughout the network. Specially: 1) a cluster formation game that promotes the nodes to be cluster head (CH) or cluster member to avoid the extraneous cluster; 2) an optimal cluster formation dilemma game to affirm the minimum number of trust recommendations for maintaining the balance of the trust in a cluster; and 3) an activity-based trust dilemma game to compute the Nash equilibrium that represents the best strategy for a CH to launch its anomaly detection technique which helps in mitigation of malicious activity. Simulation results show that the proposed EETE scheme outperforms the current trust evaluation schemes in terms of detection rate, energy efficiency and trust evaluation time for clustered-sensor enabled IoT.
引用
收藏
页码:8421 / 8432
页数:12
相关论文
共 19 条
  • [11] A Game-Theoretic Approach for Increasing Resource Utilization in Edge Computing Enabled Internet of Things
    Kumar, Sumit
    Gupta, Ruchir
    Lakshmanan, K.
    Maurya, Vipin
    IEEE ACCESS, 2022, 10 : 57974 - 57989
  • [12] Light-Weight Security and Data Provenance for Multi-Hop Internet of Things
    Kamal, Mohsin
    Tariq, Muhammad
    IEEE ACCESS, 2018, 6 : 34439 - 34448
  • [13] Intelligence, security, and vehicular sensor networks in internet of things (IoT)-enabled smart-cities: An overview
    Al-Turjman, Fadi
    Lemayian, Joel Poncha
    COMPUTERS & ELECTRICAL ENGINEERING, 2020, 87
  • [14] Mobile Edge Computing Enabled 5G Health Monitoring for Internet of Medical Things: A Decentralized Game Theoretic Approach
    Ning, Zhaolong
    Dong, Peiran
    Wang, Xiaojie
    Hu, Xiping
    Guo, Lei
    Hu, Bin
    Guo, Yi
    Qiu, Tie
    Kwok, Ricky Y. K.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2021, 39 (02) : 463 - 478
  • [15] Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: A Contract Design Approach
    Chen, Juntao
    Zhu, Quanyan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) : 2736 - 2750
  • [16] Towards a Light Weight Routing Security in IoT Using Non-cooperative Game Models and Dempster-Shaffer Theory
    Kiran, Vidhu
    Rani, Shaveta
    Singh, Paramjeet
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 110 (04) : 1729 - 1749
  • [17] A Light Weight Trust Based Secure and Energy Efficient Clustering in Wireless Sensor Network: Honey Bee Mating Intelligence Approach
    Sahoo, Rashmi Ranjan
    Singh, Moutushi
    Sahoo, Biswa Mohan
    Majumder, Koushik
    Ray, Sudhabindu
    Sarkar, Subir Kumar
    FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013, 2013, 10 : 515 - 523
  • [18] Enhanced Network Intrusion Detection System for Internet of Things Security Using Multimodal Big Data Representation with Transfer Learning and Game Theory
    Ullah, Farhan
    Turab, Ali
    Ullah, Shamsher
    Cacciagrano, Diletta
    Zhao, Yue
    SENSORS, 2024, 24 (13)
  • [19] A new constructing approach for a weighted topology of wireless sensor networks based on local-world theory for the Internet of Things (IOT)
    Zhang, De-gan
    Zhu, Ya-nan
    Zhao, Chen-peng
    Dai, Wen-bo
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 64 (05) : 1044 - 1055