A Game-Theoretic Approach for Enhancing Security and Data Trustworthiness in IoT Applications

11/19/2019
by   Mohamed S. Abdalzaher, et al.
0

Wireless sensor networks (WSNs)-based internet of things (IoT) are among the fast booming technologies that drastically contribute to different systems management and resilience data accessibility. Designing a robust IoT network imposes some challenges such as data trustworthiness (DT) and power management. This paper presents a repeated game model to enhance clustered WSNs-based IoT security and DT against the selective forwarding (SF) attack. Besides, the model is capable of detecting the hardware (HW) failure of the cluster members (CMs) and conserve the power consumption due to packet retransmission. The model relies on TDMA protocol to facilitate the detection process and to avoid collision between the delivered packets at the cluster head (CH). The proposed model aims to keep packets transmitting, isotropic or non-isotropic transmission, from the CMs to the CH for maximizing the DT and aims to distinguish between the malicious CM and the one suffering from HW failure. Accordingly, it can manage the consequently lost power due to the malicious attack effect or HW malfunction. Simulation results indicate the proposed mechanism improved performance with TDMA over six different environments against the SF attack that achieves the Pareto optimal DT as compared to a non-cooperative defense mechanism.

READ FULL TEXT

page 2

page 4

page 6

page 10

page 12

page 13

page 15

page 17

research
08/12/2019

Employing Game Theory and TDMA Protocol to Enhance Security and Manage Power Consumption in WSNs-based Cognitive Radio

The rapid development of wireless sensor networks (WSNs) is the signific...
research
03/24/2020

The DAO Induction Attack Against the RPL-based Internet of Things

RPL is the emerging routing standard for low power and lossy networks (L...
research
10/07/2021

MPD: Moving Target Defense through Communication Protocol Dialects

Communication protocol security is among the most significant challenges...
research
02/04/2019

Residual Energy Based Cluster-head Selection in WSNs for IoT Application

Wireless sensor networks (WSN) groups specialized transducers that provi...
research
02/19/2021

Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem

The Internet of Things (IoT) ecosystem allows communication between bill...
research
12/14/2017

An Enhanced Access Reservation Protocol with a Partial Preamble Transmission Mechanism in NB-IoT Systems

In this letter, we propose an enhanced Access Reservation Protocol (ARP)...
research
11/21/2020

A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem

Internet of Things (IoT) provides the possibility for milliards of devic...

Please sign up or login with your details

Forgot password? Click here to reset