Security of the Internet of Things Based on Game Algorithm

被引:0
|
作者
Yi, Yue-e [1 ]
机构
[1] Changsha Social Work Coll, Changsha, Hunan, Peoples R China
关键词
Internet of Things; perception environment; game; malicious node; detection node;
D O I
10.3991/ijoe.v14i08.9178
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
To explore the security mechanism of the Internet of Things (IoT) perception environment, we perform a security research on the IoT on the basis of game algorithm. The dynamic game method of node cooperation is used in the experiments. Firstly, multiple report nodes are merged into a game party, and the dynamic game for two parties is established with the detection node. In the environment where the malicious nodes are dominant, the detection nodes collaborate, and the state of the unknown nodes is conjectured by the reputation value of the reporting nodes. The high trust reference report is used for the modification and reduction the weight of malicious nodes in the overall report, for node merging, and finally for bias equilibrium. The results show that cooperative game can significantly improve the success rate of incident monitoring and reduce the number of forged reports.
引用
收藏
页码:80 / 93
页数:14
相关论文
共 50 条
  • [1] Game Based Certificate Revocation Algorithm for Internet of Things Security Problems
    Kim, Sungwook
    AD HOC & SENSOR WIRELESS NETWORKS, 2016, 32 (3-4) : 319 - 336
  • [2] Security of internet of things based on cryptographic algorithm
    Mittal, Sonam
    Singh, Soni
    Balakumaran, D.
    Hemalatha, K.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (01) : 28 - 39
  • [3] Game-Based Adaptive Security in the Internet of Things for eHealth
    Hamdi, Mohamed
    Abie, Habtamu
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 920 - 925
  • [4] Security algorithm of Internet of Things based on ZigBee protocol
    Wang, Yongkang
    Chen, Chunxia
    Jiang, Qijie
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6): : 14759 - 14766
  • [5] Security algorithm of Internet of Things based on ZigBee protocol
    Yongkang Wang
    Chunxia Chen
    Qijie Jiang
    Cluster Computing, 2019, 22 : 14759 - 14766
  • [6] A Game Theory Based Collaborative Security Detection Method for Internet of Things Systems
    Wu, Hao
    Wang, Wei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (06) : 1432 - 1445
  • [7] Game theory-based Security Vulnerability Quantification for Social Internet of Things
    Lee, Seokcheol
    Kim, Sungjin
    Choi, Ken B.
    Shon, Taeshik
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 : 752 - 760
  • [8] Research on security of information sharing in Internet of Things based on key algorithm
    Wei, Pengcheng
    Zhou, Zhen
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 88 : 599 - 605
  • [9] A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things
    Chen, Lili
    Wang, Zhen
    Li, Fenghua
    Guo, Yunchuan
    Geng, Kui
    SENSORS, 2020, 20 (03)
  • [10] Data Security Transmission Algorithm of Remote Demonstration System Based on Internet of Things
    Zong, Yong-sheng
    Huang, Guo-yan
    ADVANCED HYBRID INFORMATION PROCESSING, PT II, 2022, 417 : 239 - 253