Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
143 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

A Game-Theoretic Approach for Enhancing Security and Data Trustworthiness in IoT Applications (1911.08161v1)

Published 19 Nov 2019 in eess.SP and cs.NI

Abstract: Wireless sensor networks (WSNs)-based internet of things (IoT) are among the fast booming technologies that drastically contribute to different systems management and resilience data accessibility. Designing a robust IoT network imposes some challenges such as data trustworthiness (DT) and power management. This paper presents a repeated game model to enhance clustered WSNs-based IoT security and DT against the selective forwarding (SF) attack. Besides, the model is capable of detecting the hardware (HW) failure of the cluster members (CMs) and conserve the power consumption due to packet retransmission. The model relies on TDMA protocol to facilitate the detection process and to avoid collision between the delivered packets at the cluster head (CH). The proposed model aims to keep packets transmitting, isotropic or non-isotropic transmission, from the CMs to the CH for maximizing the DT and aims to distinguish between the malicious CM and the one suffering from HW failure. Accordingly, it can manage the consequently lost power due to the malicious attack effect or HW malfunction. Simulation results indicate the proposed mechanism improved performance with TDMA over six different environments against the SF attack that achieves the Pareto optimal DT as compared to a non-cooperative defense mechanism.

Citations (71)

Summary

We haven't generated a summary for this paper yet.