Abstract
An Internet of things (IoT) botnet is a network formed by connecting together a number of computers, smart devices and appliances connected to the Internet. This new type of network does not come without risk, since devices participating in the IoT can easily be infected with malicious software in order to be controlled by authorities that are not the owners of the devices. The botnet is in turn used, without the knowledge of the devices’ owner(s), and forced to act as a set of transmitting devices on behalf of the hackers. It is often the case that owners of smart devices and IoT-connected appliances do not consider the significance of having strong security when connecting these devices to the Internet, even if it is as simple as making sure that a strong password is set. It is very important to note here that strong passwords that are updated often can quite satisfactorily safeguard access to the device. The chapter uses game theory to model a coalition that would handle the password generation process in such an IoT scenario, in order to reduce the risk of IoT nodes being hijacked.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Antoniou, J., Koukoutsidis, I., Pitsillides, A., Stavrakakis, I.: Access network synthesis in next generation networks. Comput. Netw. 53(15), 2716–2726 (2009)
Banzhaf, J.: Weighted voting doesn’t work: a mathematical analysis. Rutgers Law Rev. 19(2), 317–343 (1965)
Brams, S.J., Fishburn, P.C.: When is size a liability? Bargaining power in minimal winning coalitions. C.V. Starr Center for Applied Economics, New York University (Working Papers) (1994)
Brams, S.J., Fishburn P.C.: Minimal winning coalitions in weighted-majority voting games. Soc. Choice Welf. 13(4), 397–417 (1996)
Gillies, D.: Solutions to non-zero games. In: Contributions to the Theory of Games. Annals of Mathematical Studies no. 40, vol. 4, pp. 47–85. Princeton University Press, Princeton (1959)
Haradau, R., Napel, S.: Holler-Packel value and index: a new characterization. Homo Oeconomicus 24(2), 255–268 (2007)
Microsoft Azure: Internet of Things (IoT) Bot Scenario. Azure Bot Service (2017). https://docs.microsoft.com/en-us/azure/bot-service/bot-service-scenario-internet-things?view=azure-bot-service-3.0. Accessed 15 Jan 2019
Myerson, R.B.: Game Theory: Analysis of Conflict. Harvard University Press, Cambridge (2004)
Riker, W.H.: The Theory of Political Coalitions. Yale University Press, New Haven (1962)
Shapley, L.S., Shubik, M.: A method for evaluating the distribution of power in a committee system. Am. Polit. Sci. Rev. 48(3), 787–792 (1954)
Stone-Gross, B. et. al.: Your botnet is my botnet: analysis of a botnet takeover. In: Proceedings of the 16th ACM Conference on Computer and Communication Security, pp. 635–647 (2009)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Antoniou, J. (2020). Using Game Theory to Address New Security Risks in the IoT. In: Game Theory, the Internet of Things and 5G Networks. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-16844-5_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-16844-5_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16843-8
Online ISBN: 978-3-030-16844-5
eBook Packages: EngineeringEngineering (R0)