Game-Theoretic Security Analysis in Heterogeneous IoT Networks: A Competition Perspective

被引:0
|
作者
Zhu, Yuyao [1 ]
Wu, Huici [1 ,2 ]
Tao, Xiaofeng [1 ,2 ]
Wang, Shen [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Natl Engn Res Ctr Mobile Network Technol, Beijing 100876, Peoples R China
[2] Dept Broadband Commun, Pengcheng Lab, Shenzhen 518066, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 21期
基金
中国国家自然科学基金;
关键词
Security; Internet of Things; Resource management; Entropy; Games; Network security; Computational modeling; Internet of Things (IoT); multiconnected heterogeneous networks; resource allocation; security game; RESOURCE-ALLOCATION; INTERNET; SCHEME;
D O I
10.1109/JIOT.2024.3435879
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many interconnected terminals in the Internet of Things (IoT) networks raise significant security risks. From a competitive perspective, the many heterogeneous nodes, including various wireless terminals, access points, and base stations are the competing targets between the defenders and potential attackers. This article proposes a security competition model based on the game theory to address the security competition problem. The model has two players, a defender and an attacker, who allocate resources to each IoT node according to their strategies. A novel metric, security entropy, derived from the security probability, quantifies each node's security status. Based on the node heterogeneity, the overall security performance of the considered IoT network is evaluated with a topology-determined weighted security entropy. The defender and the attacker, respectively, aim to decrease and increase the weighted security entropy while balancing the cost, which constitutes their utility functions. The existence of the unique Nash equilibrium is proved. A best response selection algorithm for the optimal solutions is designed. The experimental results demonstrate that the proposed model effectively represents the goal orientation and interaction between the attackers and defenders in various scenarios. Additionally, increasing the cost for the attackers significantly reduces their resource allocation, especially to the attackers leading to a decrease in the system's security entropy.
引用
收藏
页码:35048 / 35059
页数:12
相关论文
共 50 条
  • [21] On game-theoretic models of networks
    Bodlaender, HL
    Dinneen, MJ
    Khoussainov, B
    ALGORITHMS AND COMPUTATION, PROCEEDINGS, 2001, 2223 : 550 - 561
  • [22] Competitive diffusion in signed social networks: A game-theoretic perspective
    Lin, Xue
    Jiao, Qiang
    Wang, Long
    AUTOMATICA, 2020, 112
  • [23] Local Voltage Control in Distribution Networks: A Game-Theoretic Perspective
    Zhou, Xinyang
    Tian, Jie
    Chen, Lijun
    Dall'Anese, Emiliano
    2016 North American Power Symposium (NAPS), 2016,
  • [24] On Game-Theoretic Network Security Provisioning
    Stefan Rass
    Journal of Network and Systems Management, 2013, 21 : 47 - 64
  • [25] A Game Theoretic Analysis of Service Competition and Pricing in Heterogeneous Wireless Access Networks
    Niyato, Dusit
    Hossain, Ekram
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (12) : 5150 - 5155
  • [26] On Game-Theoretic Network Security Provisioning
    Rass, Stefan
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2013, 21 (01) : 47 - 64
  • [27] A game-theoretic traverse analysis: Price competition and strategic investment
    Mantovi, Andrea
    Schianchi, Augusto
    STRUCTURAL CHANGE AND ECONOMIC DYNAMICS, 2019, 49 : 301 - 311
  • [28] Competition for migrating customers: a game-theoretic analysis in a regulated regime
    Maille, Patrick
    Naldi, Maurizio
    Tuffin, Bruno
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [29] A Game-Theoretic Approach for Bandwidth Allocation and Pricing in Heterogeneous Wireless Networks
    Fu, Bin
    Wei, Zhiqing
    Yan, Xiao
    Zhang, Kezhong
    Feng, Zhiyong
    Zhang, Qixun
    2015 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2015, : 1684 - 1689
  • [30] Game-theoretic approach for network access selection in heterogeneous integrated networks
    Chen Q.-B.
    Zhou W.-G.
    Chai R.
    Tang L.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (09): : 1643 - 1652