Game-Theoretic Security Analysis in Heterogeneous IoT Networks: A Competition Perspective

被引:0
|
作者
Zhu, Yuyao [1 ]
Wu, Huici [1 ,2 ]
Tao, Xiaofeng [1 ,2 ]
Wang, Shen [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Natl Engn Res Ctr Mobile Network Technol, Beijing 100876, Peoples R China
[2] Dept Broadband Commun, Pengcheng Lab, Shenzhen 518066, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 21期
基金
中国国家自然科学基金;
关键词
Security; Internet of Things; Resource management; Entropy; Games; Network security; Computational modeling; Internet of Things (IoT); multiconnected heterogeneous networks; resource allocation; security game; RESOURCE-ALLOCATION; INTERNET; SCHEME;
D O I
10.1109/JIOT.2024.3435879
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many interconnected terminals in the Internet of Things (IoT) networks raise significant security risks. From a competitive perspective, the many heterogeneous nodes, including various wireless terminals, access points, and base stations are the competing targets between the defenders and potential attackers. This article proposes a security competition model based on the game theory to address the security competition problem. The model has two players, a defender and an attacker, who allocate resources to each IoT node according to their strategies. A novel metric, security entropy, derived from the security probability, quantifies each node's security status. Based on the node heterogeneity, the overall security performance of the considered IoT network is evaluated with a topology-determined weighted security entropy. The defender and the attacker, respectively, aim to decrease and increase the weighted security entropy while balancing the cost, which constitutes their utility functions. The existence of the unique Nash equilibrium is proved. A best response selection algorithm for the optimal solutions is designed. The experimental results demonstrate that the proposed model effectively represents the goal orientation and interaction between the attackers and defenders in various scenarios. Additionally, increasing the cost for the attackers significantly reduces their resource allocation, especially to the attackers leading to a decrease in the system's security entropy.
引用
收藏
页码:35048 / 35059
页数:12
相关论文
共 50 条
  • [1] Game-Theoretic Security Analysis of Quantum Networks
    Rass, Stefan
    Schartner, Peter
    ICQNM 2009: THIRD INTERNATIONAL CONFERENCE ON QUANTUM, NANO AND MICRO TECHNOLOGIES: PROCEEDINGS, 2009, : 20 - 25
  • [2] Security in Networks: A Game-Theoretic Approach
    Gueye, Assane
    Walrand, Jean C.
    47TH IEEE CONFERENCE ON DECISION AND CONTROL, 2008 (CDC 2008), 2008, : 829 - 834
  • [3] Competition policy: A game-theoretic perspective - Phlips,L
    Church, J
    ECONOMIC JOURNAL, 1997, 107 (444): : 1590 - 1592
  • [4] Competition policy: A game-theoretic perspective - Phlips,L
    Ordover, JA
    JOURNAL OF ECONOMIC LITERATURE, 1997, 35 (03) : 1408 - 1409
  • [5] Competition policy: A game-theoretic perspective - Phlips,L
    Polo, M
    JOURNAL OF ECONOMICS-ZEITSCHRIFT FUR NATIONALOKONOMIE, 1997, 65 (01): : 111 - 113
  • [6] A game-theoretic perspective of deep neural networks
    Ren, Chunying
    Wu, Zijun
    Xu, Dachuan
    Xu, Wenqing
    THEORETICAL COMPUTER SCIENCE, 2023, 939 : 48 - 62
  • [7] Game-Theoretic Admission Control in Heterogeneous Wireless Networks
    Liu, Gan
    Zhou, Liang
    Xiao, Kan
    Yu, Bo
    Zhu, Guangxi
    Wang, Biao
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 229 - 232
  • [8] Competition policy. A game-theoretic perspective - Phlips,L
    DeFraja, G
    MANCHESTER SCHOOL OF ECONOMIC AND SOCIAL STUDIES, 1997, 65 (02): : 231 - 232
  • [9] Nanoscale molecular communication networks: a game-theoretic perspective
    Jiang, Chunxiao
    Chen, Yan
    Liu, K. J. Ray
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2015,
  • [10] Nanoscale molecular communication networks: a game-theoretic perspective
    Chunxiao Jiang
    Yan Chen
    K J Ray Liu
    EURASIP Journal on Advances in Signal Processing, 2015