Skip to main content
Log in

A Security Differential Game Model for Sensor Networks in Context of the Internet of Things

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

A particular challenging problem in designing Internet of Things is that how to detect and prevent internal attacks, because all nodes try their best to save their limited network resource. So it is difficult to achieve optimal objectives simultaneously, game theory provides an appropriate tool. In this paper, we propose a non-cooperative differential game model, which allows all nodes to choose the optimal amount of network resource to invest in information security contingent upon the state of game. In our model, we specifically consider how the vulnerability of information and the potential loss from such vulnerability affects the optimal amount of resources that should be devoted to securing that information. In the paper, the optimal strategies of selfish nodes and malicious nodes are obtained respectively. The simulation results show that our game model has a good performance in stability of the probability that the selfish nodes discover the malicious nodes under the optimal strategies of the selfish and the malicious nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Ma, H. D. (2011). Internet of things: Objectives and scientific challenges. Journal of Computer Science and Technology, 26(6), 919–924.

    Article  Google Scholar 

  2. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54, 2787–2805.

    Article  MATH  Google Scholar 

  3. Bandyopadhyay, D., & Sen, J. (2011). Internet of things: Applications and challenges in technology and standardization. Wireless Personal Communications, 58, 49–69.

    Article  Google Scholar 

  4. Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S. L., Kumar, S. S., & Wehrle, K. (2011). Security challenges in the IP-based internet of things. Wireless Personal Communications, 61, 527–542.

    Article  Google Scholar 

  5. Yu, W., Zhu, J., & Liu, K. J. R. (2007). Securing cooperative ad-hoc networks under noise and imperfect monitoring: Strategies and game theoretic analysis. IEEE Transactions on Information Forensics and Security, 2(2), 240–253.

    Article  MathSciNet  Google Scholar 

  6. Roman, R., Alcaraz, C., Lopez, J., & Sklavos, N. (2011). Key management systems for sensor networks in the context of the internet of things. Computers & Electrical Engineering, 37(2), 147–159.

    Article  Google Scholar 

  7. Michiardi, P., & Molva, R. (2002). Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Communication and multimedia security conference (p. 2002).

  8. Mohi, M., Movaghar, A., & Zadeh, P. M. (2009). A Bayesian game approach for preventing DoS attacks in wireless sensor networks. In 2009 international conference on communications and mobile computing (pp. 507–511).

  9. Michalas, A., Komninos, N., & Prasad, N. R. (2011). Multiplayer game for DDoS attacks resilience in ad hoc networks. In 2nd international conference on wireless communication, vehicular technology, information theory and aerospace & electronic systems technology (pp. 1–5).

  10. Buttyan, L., & Hubaux, J. P. (2007). Security and cooperation in wireless networks. Cambridge: Cambridge University Press.

    Google Scholar 

  11. Sagduyu, Y. E., & Ephremides, A. (2009). A game-theoretic analysis of denial of service attacks in wireless random access. Journal on Wireless Networks, 15, 651–666.

    Article  Google Scholar 

  12. Agah, A., & Das, S. K. (2007). Preventing DoS attacks in wireless sensor networks: A repeated game theory approach. International Journal of Network Security, 5(2), 145–153.

    Google Scholar 

  13. Sagduyu, Y. E., Berry, R., & Ephremides, A. (2009). MAC games for distributed wireless network security with incomplete information of selfish and malicious user types. In Proceedings of IEEE international conference on game theory for networks (GameNets).

  14. Lin, L., Wang, A., Zhou, X., & Miao, X. (2012). Noncooperative differential game based efficiency-aware traffic assignment for multipath routing in CRAHN. Wireless Personal Commnunications, 62, 443–454.

    Article  Google Scholar 

  15. Stankovic, M., Johansson, K., & Stipanovic, D. (2010). Distributed seeking of Nash equilibria in mobile sensor networks. In 49th IEEE conference on decision and control, USA (pp. 5598–5603).

  16. Narasimhan, H., Varadarajan, V., & Rangan, C. (2010). Game theoretic resistance to denial of service attacks using hidden difficulty puzzles. In ISPEN 2010, LNCS 6047 (pp. 359–376).

  17. Alpcan, T., & Basar, T. (2011). Network security: A decision and game-theoretic approach. Cambridge: Cambridge University Press.

    MATH  Google Scholar 

  18. Bommannavar, P., Alpcan, T., & Bambos, N. (2011). Security risk management via dynamic games with learning. In IEEE ICC 2011 Proceedings.

  19. Zhang, R., Song, L., Han, Z., & Jiao, B. (2011). Improve physical layer security in cooperative wireless network using distributed auction games. In IEEE INFOCOM 2011 workshop on cognitive & cooperative, networks (pp. 18–23).

  20. Li, X., & Lyu, M. R. (2008). A novel coalitional game model for security issues in wireless networks. In Global telecommunications conference (pp. 1–6).

  21. Saad, W., Horungnes, A., Han, Z., & Basar, T. (2009). Network formation games for wireless multi-hop networks in the presence of eavesdroppers. In 2009 3rd IEEE international workshop on computational advances in multi-sensor adaptive processing (pp. 1–4).

  22. Slater, D., Tague, P., Poovendran, R., & Li, M. (2009). A game-theoretic framework for jamming attacks and mitigation in commercial aircraft wireless networks. American Institute of Aeronautics and Astronautics, AIAA infotech at aerospace conference, April 2009.

  23. Sagduyu, Y. E., Berry, R. A., & Ephremides, A. (2011). Jamming games in wireless networks with incomplete information. IEEE Communication Magazine, 49, 112–118.

    Google Scholar 

  24. Sorger, G. (1989). Competitive dynamic advertising: A modification of the case game. Journal of Economics and Control, 13, 55–80.

    Article  MathSciNet  MATH  Google Scholar 

  25. Zhang, C., Zhou, M. C., & Yu, M. (2007). Ad hoc network security: A review. International Journal Communications and Systems, 20(8), 909–925.

    Article  Google Scholar 

  26. Yeung, D. W. K., & Petrosyan, L. A. (2006). Cooperative stochastic differential games. Berlin: Springer.

    MATH  Google Scholar 

  27. Osborne, M. J., & Rubinstein, A. (1994). A course in game theory. Cambridge, MA: MIT Press.

    MATH  Google Scholar 

Download references

Acknowledgments

The authors thank the Editor and the anonymous reviewers very much for their very useful comments that improved our manuscript. This work is supported by the Foundation for Key Program of Ministry of Education, People’s Republic of China (No. 311007) and the National Science Foundation Project of People’s Republic of China (No. 61202079, 61170014 and 61003250).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yan Ding.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ding, Y., Zhou, Xw., Cheng, Zm. et al. A Security Differential Game Model for Sensor Networks in Context of the Internet of Things. Wireless Pers Commun 72, 375–388 (2013). https://doi.org/10.1007/s11277-013-1018-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-013-1018-y

Keywords

Navigation