Security of the Internet of Things Based on Game Algorithm

被引:0
|
作者
Yi, Yue-e [1 ]
机构
[1] Changsha Social Work Coll, Changsha, Hunan, Peoples R China
关键词
Internet of Things; perception environment; game; malicious node; detection node;
D O I
10.3991/ijoe.v14i08.9178
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
To explore the security mechanism of the Internet of Things (IoT) perception environment, we perform a security research on the IoT on the basis of game algorithm. The dynamic game method of node cooperation is used in the experiments. Firstly, multiple report nodes are merged into a game party, and the dynamic game for two parties is established with the detection node. In the environment where the malicious nodes are dominant, the detection nodes collaborate, and the state of the unknown nodes is conjectured by the reputation value of the reporting nodes. The high trust reference report is used for the modification and reduction the weight of malicious nodes in the overall report, for node merging, and finally for bias equilibrium. The results show that cooperative game can significantly improve the success rate of incident monitoring and reduce the number of forged reports.
引用
收藏
页码:80 / 93
页数:14
相关论文
共 50 条
  • [31] Distributed network security framework of energy internet based on internet of things
    Zhang, Jie
    SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS, 2021, 44
  • [32] Privacy Information Security Classification for Internet of Things Based on Internet Data
    Lu, Xiaofeng
    Qu, Zhaowei
    Li, Qi
    Hui, Pan
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [33] Cyber security framework for Internet of Things-based Energy Internet
    Sani, Abubakar Sadiq
    Yuan, Dong
    Jin, Jiong
    Gao, Longxiang
    Yu, Shui
    Dong, Zhao Yang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 849 - 859
  • [34] Construction and Application of Internet of Things Network Security Situation Prediction Model Based on BiLSTM Algorithm
    Wu, Yubao
    Journal of Cyber Security and Mobility, 2024, 13 (05): : 843 - 862
  • [35] Fuzzy Comprehensive Evaluation Algorithm for Power Information System Security Level Based on the Internet of Things
    Zeng Ming
    Wang Shicheng
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2016, 12 (05) : 17 - 21
  • [36] Design of automatic identification algorithm for Internet of Things security situation based on deep neural network
    Liu P.-J.
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2023, 53 (07): : 2121 - 2126
  • [37] Security Challenges in the IP-based Internet of Things
    Heer, Tobias
    Garcia-Morchon, Oscar
    Hummen, Rene
    Keoh, Sye Loong
    Kumar, Sandeep S.
    Wehrle, Klaus
    WIRELESS PERSONAL COMMUNICATIONS, 2011, 61 (03) : 527 - 542
  • [38] A Model-based Security Toolkit for the Internet of Things
    Neisse, Ricardo
    Fovino, Igor Nai
    Baldini, Gianmarco
    Stavroulaki, Vera
    Vlacheas, Panagiotis
    Giaffreda, Raffaele
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 78 - 87
  • [39] Security of internet of things based on cryptographic algorithms: a survey
    Mousavi, Seyyed Keyvan
    Ghaffari, Ali
    Besharat, Sina
    Afshari, Hamed
    WIRELESS NETWORKS, 2021, 27 (02) : 1515 - 1555
  • [40] A Security Routing Protocol for Internet of Things Based on RPL
    Ma, Guojun
    Li, Xing
    Pei, Qingqi
    Li, Zi
    2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 209 - 213