2018
DOI: 10.3390/s18114074
|View full text |Cite
|
Sign up to set email alerts
|

Stackelberg Dynamic Game-Based Resource Allocation in Threat Defense for Internet of Things

Abstract: With the rapid development of the Internet of Things, there are a series of security problems faced by the IoT devices. As the IoT devices are generally devices with limited resources, how to effectively allocate the restricted resources facing the security problems is the key issue at present. In this paper, we study the resource allocation problem in threat defense for the resource-constrained IoT system, and propose a Stackelberg dynamic game model to get the optimal allocated resources for both the defende… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(14 citation statements)
references
References 33 publications
0
5
0
Order By: Relevance
“…The principles of epidemic modelling were applied to IoT networks composed of wireless sensor nodes to describe the uncertain propagation trajectory, where the most commonly are model SI, SIR and SIS [21][22][23]. The game theory was introduced into IoT network to obtain allocated resources for the defenders and the attackers [11,16,[24][25][26]. The adversary was set as the attacker chooses to pollute when knowing the position of the sensor, and some deployment schemes of sensors in the adversarial environment was proposed [11,27,28].…”
Section: The Dynamics Of Scheduling Strategymentioning
confidence: 99%
“…The principles of epidemic modelling were applied to IoT networks composed of wireless sensor nodes to describe the uncertain propagation trajectory, where the most commonly are model SI, SIR and SIS [21][22][23]. The game theory was introduced into IoT network to obtain allocated resources for the defenders and the attackers [11,16,[24][25][26]. The adversary was set as the attacker chooses to pollute when knowing the position of the sensor, and some deployment schemes of sensors in the adversarial environment was proposed [11,27,28].…”
Section: The Dynamics Of Scheduling Strategymentioning
confidence: 99%
“…Nash equilibrium can be solved by the proposed evolutionary algorithm to preserve the communication performance of the IoT network under jamming attack. A Stackelberg dynamic game model is proposed to get the optimal allocated resources in [30], which is effective to allocate resource in threat Defense for IoT. Facing an unknown jamming attack, an equilibrium strategy in waterfilling form was derived in OFDM system, and an algorithm was proposed to determine the parameters of the waterfilling equation.…”
Section: Related Workmentioning
confidence: 99%
“…Retrieved from https://www.ibm.com/support/knowledgecenter/en/ SSPHQG_7.2/concept/ha_concepts_physical_logical.html), which provides us a proper approach to modeling IoT and other real layered network systems, is used in this paper. IoT is a huge network which combines functional devices with the Internet [15]. In IoT, there are functional collaboration and dependency relationships among smart devices such as information-sensing devices, information-processing devices, information-fusion devices, and effectors.…”
Section: Introductionmentioning
confidence: 99%
“…NIP is also a useful model for researching the protection of IoT, e.g., the defensive resource allocation [15] and adversarial outbreak detection [19]. Numerous variations of NIP have been proposed and studied to meet different hypotheses under particular scenarios [16,17,[20][21][22][23][24].…”
Section: Introductionmentioning
confidence: 99%