Stackelberg Dynamic Game-Based Resource Allocation in Threat Defense for Internet of Things

With the rapid development of the Internet of Things, there are a series of security problems faced by the IoT devices. As the IoT devices are generally devices with limited resources, how to effectively allocate the restricted resources facing the security problems is the key issue at present. In this paper, we study the resource allocation problem in threat defense for the resource-constrained IoT system, and propose a Stackelberg dynamic game model to get the optimal allocated resources for both the defender and attackers. The proposed Stackelberg dynamic game model is composed by one defender and many attackers. Given the objective functions of the defender and attackers, we analyze both the open-loop Nash equilibrium and feedback Nash equilibrium for the defender and attackers. Then both the defender and attackers can control their available resources based on the Nash equilibrium solutions of the dynamic game. Numerical simulation results show that correctness and effeteness of the proposed model.

[1]  Jin-cui Yang,et al.  Security model and key technologies for the Internet of things , 2011 .

[2]  E. Blum,et al.  The Mathematical Theory of Optimal Processes. , 1963 .

[3]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[4]  David W. K. Yeung,et al.  Cooperative Stochastic Differential Games , 2005 .

[5]  Robert Green,et al.  Communication security in internet of thing: preventive measure and avoid DDoS attack over IoT network , 2015, SpringSim.

[6]  Liu Ren-hui,et al.  Model Identification of Risk Management System , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[7]  Yong-Sik Choi,et al.  A Study on Sensor Node Capture Defense Protocol for Ubiquitous Sensor Network , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[8]  Li Miao,et al.  A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing , 2018, Secur. Commun. Networks.

[9]  Radha Poovendran,et al.  Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[10]  Lei Yang,et al.  Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC , 2018, Wirel. Commun. Mob. Comput..

[11]  Yuan Xue Key management schemes for distributed sensor networks , 2008 .

[12]  Srijith Krishnan Nair,et al.  Self Managed Security Cell, a Security Model for the Internet of Things and Services , 2009, 2009 First International Conference on Advances in Future Internet.

[13]  Quanyan Zhu,et al.  Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[14]  Radha Poovendran,et al.  Modeling adaptive node capture attacks in multi-hop wireless networks , 2007, Ad Hoc Networks.

[15]  Ilsun You,et al.  A Novel Utility Based Resource Management Scheme in Vehicular Social Edge Computing , 2018, IEEE Access.

[16]  Rathanakar Acharya,et al.  Data integrity and intrusion detection in Wireless Sensor Networks , 2008, 2008 16th IEEE International Conference on Networks.

[17]  Michael Bloem,et al.  A stackelberg game for power control and channel allocation in cognitive radio networks , 2007, Valuetools 2007.

[18]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[19]  Jun-won Ho Distributed Detection of Node Capture Attacks in Wireless Sensor Networks , 2010 .

[20]  Sachin Agarwal,et al.  A stackelberg game for pricing uplink power in wide-band cognitive radio networks , 2008, 2008 47th IEEE Conference on Decision and Control.

[21]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[22]  Fuhong Lin,et al.  Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system , 2018, EURASIP J. Wirel. Commun. Netw..

[23]  Symeon Papavassiliou,et al.  Utility-Based Uplink Power Control in CDMA Wireless Networks with Real-Time Services , 2008, ADHOC-NOW.

[24]  Vladimir Oleshchuk,et al.  Internet of things and privacy preserving technologies , 2009, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology.

[25]  Baoquan Zhang,et al.  Evaluation on security system of internet of things based on Fuzzy-AHP method , 2011, 2011 International Conference on E-Business and E-Government (ICEE).

[26]  Caiming Liu,et al.  A Novel Approach to IoT Security Based on Immunology , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[27]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[28]  John S. Baras,et al.  On the Mitigation of Interference Imposed by Intruders in Passive RFID Networks , 2016, GameSec.

[29]  Symeon Papavassiliou,et al.  Joint utility-based uplink power and rate allocation in wireless networks: A non-cooperative game theoretic framework , 2013, Phys. Commun..

[30]  Kim-Kwang Raymond Choo,et al.  Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices , 2018, IEEE Consumer Electronics Magazine.

[31]  Orestis Mavropoulos,et al.  A conceptual model to support security analysis in the internet of things , 2017, Comput. Sci. Inf. Syst..

[32]  Hannes Tschofenig,et al.  Securing the Internet of Things: A Standardization Perspective , 2014, IEEE Internet of Things Journal.

[33]  R. Srikant,et al.  Revenue-maximizing pricing and capacity expansion in a many-users regime , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[34]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.