A Reinforcement Protection Game in the Internet of Things

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The vast scale of the Internet of Things (IoT), combined with its heterogeneous nature involving many different types of devices and machines, could lead the IoT to be vulnerable to a variety of security threats and malicious attacks. Addressing the broad array of threats requires that different security mechanisms are deployed at appropriate locations within the broader IoT communication network. In this paper, we examine this problem by applying a resource allocation approach involving a game-theoretical framework to model: (a) an attack aimed to maximize total damage to the network, and (b) an attack aimed to compromise at least one of the devices. To evaluate the probability of a successful attack we apply a contest success function, and found the associated equilibrium strategies in closed form. Additionally, we note an interesting relationship between equilibrium strategies in security reinforcement games and OFDM transmission games under hostile jamming. A criteria is designed that allows one to determine whether an IoT controller’s resources is sufficient to protect all of the IoT devices it manages.

Cite

CITATION STYLE

APA

Garnaev, A., & Trappe, W. (2018). A Reinforcement Protection Game in the Internet of Things. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 242, pp. 85–95). Springer Verlag. https://doi.org/10.1007/978-3-319-93797-7_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free