Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
Ad hoc network routing and security: A review: Research Articles
International Journal of Communication Systems
A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks
CMC '09 Proceedings of the 2009 WRI International Conference on Communications and Mobile Computing - Volume 03
Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
The Internet of Things: A survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Network Security: A Decision and Game-Theoretic Approach
Network Security: A Decision and Game-Theoretic Approach
Key management systems for sensor networks in the context of the Internet of Things
Computers and Electrical Engineering
Internet of Things: Applications and Challenges in Technology and Standardization
Wireless Personal Communications: An International Journal
Security Challenges in the IP-based Internet of Things
Wireless Personal Communications: An International Journal
Wireless Personal Communications: An International Journal
Game theoretic resistance to denial of service attacks using hidden difficulty puzzles
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
IEEE Transactions on Information Forensics and Security
Internet of things: objectives and scientific challenges
Journal of Computer Science and Technology - Special issue on Natural Language Processing
Hi-index | 0.00 |
A particular challenging problem in designing Internet of Things is that how to detect and prevent internal attacks, because all nodes try their best to save their limited network resource. So it is difficult to achieve optimal objectives simultaneously, game theory provides an appropriate tool. In this paper, we propose a non-cooperative differential game model, which allows all nodes to choose the optimal amount of network resource to invest in information security contingent upon the state of game. In our model, we specifically consider how the vulnerability of information and the potential loss from such vulnerability affects the optimal amount of resources that should be devoted to securing that information. In the paper, the optimal strategies of selfish nodes and malicious nodes are obtained respectively. The simulation results show that our game model has a good performance in stability of the probability that the selfish nodes discover the malicious nodes under the optimal strategies of the selfish and the malicious nodes.