Skip to main content

Using Game Theory to Address New Security Risks in the IoT

  • Chapter
  • First Online:
Game Theory, the Internet of Things and 5G Networks

Part of the book series: EAI/Springer Innovations in Communication and Computing ((EAISICC))

Abstract

An Internet of things (IoT) botnet is a network formed by connecting together a number of computers, smart devices and appliances connected to the Internet. This new type of network does not come without risk, since devices participating in the IoT can easily be infected with malicious software in order to be controlled by authorities that are not the owners of the devices. The botnet is in turn used, without the knowledge of the devices’ owner(s), and forced to act as a set of transmitting devices on behalf of the hackers. It is often the case that owners of smart devices and IoT-connected appliances do not consider the significance of having strong security when connecting these devices to the Internet, even if it is as simple as making sure that a strong password is set. It is very important to note here that strong passwords that are updated often can quite satisfactorily safeguard access to the device. The chapter uses game theory to model a coalition that would handle the password generation process in such an IoT scenario, in order to reduce the risk of IoT nodes being hijacked.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Antoniou, J., Koukoutsidis, I., Pitsillides, A., Stavrakakis, I.: Access network synthesis in next generation networks. Comput. Netw. 53(15), 2716–2726 (2009)

    Article  Google Scholar 

  2. Banzhaf, J.: Weighted voting doesn’t work: a mathematical analysis. Rutgers Law Rev. 19(2), 317–343 (1965)

    Google Scholar 

  3. Brams, S.J., Fishburn, P.C.: When is size a liability? Bargaining power in minimal winning coalitions. C.V. Starr Center for Applied Economics, New York University (Working Papers) (1994)

    Google Scholar 

  4. Brams, S.J., Fishburn P.C.: Minimal winning coalitions in weighted-majority voting games. Soc. Choice Welf. 13(4), 397–417 (1996)

    Article  MathSciNet  Google Scholar 

  5. Gillies, D.: Solutions to non-zero games. In: Contributions to the Theory of Games. Annals of Mathematical Studies no. 40, vol. 4, pp. 47–85. Princeton University Press, Princeton (1959)

    Google Scholar 

  6. Haradau, R., Napel, S.: Holler-Packel value and index: a new characterization. Homo Oeconomicus 24(2), 255–268 (2007)

    Google Scholar 

  7. Microsoft Azure: Internet of Things (IoT) Bot Scenario. Azure Bot Service (2017). https://docs.microsoft.com/en-us/azure/bot-service/bot-service-scenario-internet-things?view=azure-bot-service-3.0. Accessed 15 Jan 2019

  8. Myerson, R.B.: Game Theory: Analysis of Conflict. Harvard University Press, Cambridge (2004)

    MATH  Google Scholar 

  9. Riker, W.H.: The Theory of Political Coalitions. Yale University Press, New Haven (1962)

    MATH  Google Scholar 

  10. Shapley, L.S., Shubik, M.: A method for evaluating the distribution of power in a committee system. Am. Polit. Sci. Rev. 48(3), 787–792 (1954)

    Article  Google Scholar 

  11. Stone-Gross, B. et. al.: Your botnet is my botnet: analysis of a botnet takeover. In: Proceedings of the 16th ACM Conference on Computer and Communication Security, pp. 635–647 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Antoniou, J. (2020). Using Game Theory to Address New Security Risks in the IoT. In: Game Theory, the Internet of Things and 5G Networks. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-16844-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-16844-5_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-16843-8

  • Online ISBN: 978-3-030-16844-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics