Abstract
A particular challenging problem in designing Internet of Things is that how to detect and prevent internal attacks, because all nodes try their best to save their limited network resource. So it is difficult to achieve optimal objectives simultaneously, game theory provides an appropriate tool. In this paper, we propose a non-cooperative differential game model, which allows all nodes to choose the optimal amount of network resource to invest in information security contingent upon the state of game. In our model, we specifically consider how the vulnerability of information and the potential loss from such vulnerability affects the optimal amount of resources that should be devoted to securing that information. In the paper, the optimal strategies of selfish nodes and malicious nodes are obtained respectively. The simulation results show that our game model has a good performance in stability of the probability that the selfish nodes discover the malicious nodes under the optimal strategies of the selfish and the malicious nodes.
Similar content being viewed by others
References
Ma, H. D. (2011). Internet of things: Objectives and scientific challenges. Journal of Computer Science and Technology, 26(6), 919–924.
Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54, 2787–2805.
Bandyopadhyay, D., & Sen, J. (2011). Internet of things: Applications and challenges in technology and standardization. Wireless Personal Communications, 58, 49–69.
Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S. L., Kumar, S. S., & Wehrle, K. (2011). Security challenges in the IP-based internet of things. Wireless Personal Communications, 61, 527–542.
Yu, W., Zhu, J., & Liu, K. J. R. (2007). Securing cooperative ad-hoc networks under noise and imperfect monitoring: Strategies and game theoretic analysis. IEEE Transactions on Information Forensics and Security, 2(2), 240–253.
Roman, R., Alcaraz, C., Lopez, J., & Sklavos, N. (2011). Key management systems for sensor networks in the context of the internet of things. Computers & Electrical Engineering, 37(2), 147–159.
Michiardi, P., & Molva, R. (2002). Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Communication and multimedia security conference (p. 2002).
Mohi, M., Movaghar, A., & Zadeh, P. M. (2009). A Bayesian game approach for preventing DoS attacks in wireless sensor networks. In 2009 international conference on communications and mobile computing (pp. 507–511).
Michalas, A., Komninos, N., & Prasad, N. R. (2011). Multiplayer game for DDoS attacks resilience in ad hoc networks. In 2nd international conference on wireless communication, vehicular technology, information theory and aerospace & electronic systems technology (pp. 1–5).
Buttyan, L., & Hubaux, J. P. (2007). Security and cooperation in wireless networks. Cambridge: Cambridge University Press.
Sagduyu, Y. E., & Ephremides, A. (2009). A game-theoretic analysis of denial of service attacks in wireless random access. Journal on Wireless Networks, 15, 651–666.
Agah, A., & Das, S. K. (2007). Preventing DoS attacks in wireless sensor networks: A repeated game theory approach. International Journal of Network Security, 5(2), 145–153.
Sagduyu, Y. E., Berry, R., & Ephremides, A. (2009). MAC games for distributed wireless network security with incomplete information of selfish and malicious user types. In Proceedings of IEEE international conference on game theory for networks (GameNets).
Lin, L., Wang, A., Zhou, X., & Miao, X. (2012). Noncooperative differential game based efficiency-aware traffic assignment for multipath routing in CRAHN. Wireless Personal Commnunications, 62, 443–454.
Stankovic, M., Johansson, K., & Stipanovic, D. (2010). Distributed seeking of Nash equilibria in mobile sensor networks. In 49th IEEE conference on decision and control, USA (pp. 5598–5603).
Narasimhan, H., Varadarajan, V., & Rangan, C. (2010). Game theoretic resistance to denial of service attacks using hidden difficulty puzzles. In ISPEN 2010, LNCS 6047 (pp. 359–376).
Alpcan, T., & Basar, T. (2011). Network security: A decision and game-theoretic approach. Cambridge: Cambridge University Press.
Bommannavar, P., Alpcan, T., & Bambos, N. (2011). Security risk management via dynamic games with learning. In IEEE ICC 2011 Proceedings.
Zhang, R., Song, L., Han, Z., & Jiao, B. (2011). Improve physical layer security in cooperative wireless network using distributed auction games. In IEEE INFOCOM 2011 workshop on cognitive & cooperative, networks (pp. 18–23).
Li, X., & Lyu, M. R. (2008). A novel coalitional game model for security issues in wireless networks. In Global telecommunications conference (pp. 1–6).
Saad, W., Horungnes, A., Han, Z., & Basar, T. (2009). Network formation games for wireless multi-hop networks in the presence of eavesdroppers. In 2009 3rd IEEE international workshop on computational advances in multi-sensor adaptive processing (pp. 1–4).
Slater, D., Tague, P., Poovendran, R., & Li, M. (2009). A game-theoretic framework for jamming attacks and mitigation in commercial aircraft wireless networks. American Institute of Aeronautics and Astronautics, AIAA infotech at aerospace conference, April 2009.
Sagduyu, Y. E., Berry, R. A., & Ephremides, A. (2011). Jamming games in wireless networks with incomplete information. IEEE Communication Magazine, 49, 112–118.
Sorger, G. (1989). Competitive dynamic advertising: A modification of the case game. Journal of Economics and Control, 13, 55–80.
Zhang, C., Zhou, M. C., & Yu, M. (2007). Ad hoc network security: A review. International Journal Communications and Systems, 20(8), 909–925.
Yeung, D. W. K., & Petrosyan, L. A. (2006). Cooperative stochastic differential games. Berlin: Springer.
Osborne, M. J., & Rubinstein, A. (1994). A course in game theory. Cambridge, MA: MIT Press.
Acknowledgments
The authors thank the Editor and the anonymous reviewers very much for their very useful comments that improved our manuscript. This work is supported by the Foundation for Key Program of Ministry of Education, People’s Republic of China (No. 311007) and the National Science Foundation Project of People’s Republic of China (No. 61202079, 61170014 and 61003250).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ding, Y., Zhou, Xw., Cheng, Zm. et al. A Security Differential Game Model for Sensor Networks in Context of the Internet of Things. Wireless Pers Commun 72, 375–388 (2013). https://doi.org/10.1007/s11277-013-1018-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-013-1018-y