DeepAI AI Chat
Log In Sign Up

A Game-Theoretic Approach for Enhancing Security and Data Trustworthiness in IoT Applications

by   Mohamed S. Abdalzaher, et al.
Egypt-Japan University of Science and Technology (E-JUST)

Wireless sensor networks (WSNs)-based internet of things (IoT) are among the fast booming technologies that drastically contribute to different systems management and resilience data accessibility. Designing a robust IoT network imposes some challenges such as data trustworthiness (DT) and power management. This paper presents a repeated game model to enhance clustered WSNs-based IoT security and DT against the selective forwarding (SF) attack. Besides, the model is capable of detecting the hardware (HW) failure of the cluster members (CMs) and conserve the power consumption due to packet retransmission. The model relies on TDMA protocol to facilitate the detection process and to avoid collision between the delivered packets at the cluster head (CH). The proposed model aims to keep packets transmitting, isotropic or non-isotropic transmission, from the CMs to the CH for maximizing the DT and aims to distinguish between the malicious CM and the one suffering from HW failure. Accordingly, it can manage the consequently lost power due to the malicious attack effect or HW malfunction. Simulation results indicate the proposed mechanism improved performance with TDMA over six different environments against the SF attack that achieves the Pareto optimal DT as compared to a non-cooperative defense mechanism.


page 2

page 4

page 6

page 10

page 12

page 13

page 15

page 17


The DAO Induction Attack Against the RPL-based Internet of Things

RPL is the emerging routing standard for low power and lossy networks (L...

MPD: Moving Target Defense through Communication Protocol Dialects

Communication protocol security is among the most significant challenges...

Residual Energy Based Cluster-head Selection in WSNs for IoT Application

Wireless sensor networks (WSN) groups specialized transducers that provi...

Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem

The Internet of Things (IoT) ecosystem allows communication between bill...

An Enhanced Access Reservation Protocol with a Partial Preamble Transmission Mechanism in NB-IoT Systems

In this letter, we propose an enhanced Access Reservation Protocol (ARP)...

TrustSense: An energy efficient trust scheme for clustered wireless sensor networks

Designing security systems for wireless sensor networks presents a chall...