Abstract
Irrespective of the type and degree of capability, any adversaries’ results in significant loss of energy among the physical devices connected in Internet-of-Things (IoT). After reviewing existing trends of research-based solution, it was seen that various complex cryptographic solution has been put forward to claim potential security but they were not found to claim if their solution could stop unwanted energy depletion too during the process of safeguarding the physical devices. Therefore, this paper presents a game-decision making model that is capable of assessing the level of vulnerability as well as legitimacy of the IoT devices during the communication process that finally leads to identification followed by isolating the compromised or malicious IoT devices. The study outcome was found to offer better identification of the threats for multi-staged games in contrast to existing methods.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Hwang, K., Chen, M.: Big-Data Analytics for Cloud, IoT and Cognitive Computing. Wiley, Hoboken (2017)
Krishna Prasad, A.V.: Exploring the Convergence of Big Data and the Internet of Things. IGI Global, Hershey (2017)
Bhadoria, R.S., Chaudhari, N., Tomar, G.S., Singh, S.: Exploring Enterprise Service Bus in the Service-Oriented Architecture Paradigm. IGI Global, Hershey (2017)
Humayed, A., Lin, J., Li, F., Luo, B.: Cyber-physical systems security—a survey. IEEE Internet of Things J. 4(6), 1802–1831 (2017)
Benzarti, S., Triki, B., Korbaa, O.: A survey on attacks in Internet of Things based networks. In: 2017 International Conference on Engineering & MIS (ICEMIS), Monastir, pp. 1–7 (2017)
Mendez, D.M., Papapanagiotou, I., Yang, B.: Internet of things: survey on security. J. Inf. Secur. J.: Global Persp. 27(3), 162–182 (2018)
Sain, M., Kang, Y.J., Lee, H.J.: Survey on security in Internet of Things: state of the art and challenges. In: 2017 19th International Conference on Advanced Communication Technology (ICACT), Bongpyeong, pp. 699–704 (2017)
Benabdessalem, R., Hamdi, M., Kim, T.H.: A survey on security models, techniques, and tools for the Internet of Things. In: 2014 7th International Conference on Advanced Software Engineering and Its Applications, Haikou, pp. 44–48 (2014)
Dragomir, D., Gheorghe, L., Costea, S., Radovici, A.: A survey on secure communication protocols for IoT systems. In: 2016 International Workshop on Secure Internet of Things (SIoT), Heraklion, pp. 47–62 (2016)
Shakhov, V., Koo, I., Rodionov, A.: Energy exhaustion attacks in wireless networks. In: 2017 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON), Novosibirsk, pp. 1–3 (2017)
Bertino, E., Islam, N.: Botnets and Internet of Things security. Computer 50(2), 76–79 (2017)
Bhattarai, S., Wang, Y.: End-to-end trust and security for Internet of Things applications. Computer 51(4), 20–27 (2018)
Burg, A., Chattopadhyay, A., Lam, K.Y.: Wireless communication and security issues for cyber-physical systems and the Internet-of-Things. Proc. IEEE 106(1), 38–60 (2018)
Nurse, J.R.C., Creese, S., De Roure, D.: Security risk assessment in Internet of Things systems. IT Prof. 19(5), 20–26 (2017)
Singh, J., et al.: Twenty security considerations for cloud-supported Internet of Things (2015)
Szymanski, T.H.: Security and privacy for a green Internet of Things. IT Prof. 19(5), 34–41 (2017)
Wolf, M., Serpanos, D.: Safety and security in cyber-physical systems and Internet-of-Things systems. Proc. IEEE 106(1), 9–20 (2018)
Hu, L., et al.: Cooperative jamming for physical layer security enhancement in Internet of Things. IEEE Internet of Things J. 5(1), 219–228 (2018)
Liu, Y., Kuang, Y., Xiao, Y., Xu, G.: SDN-based data transfer security for Internet of Things. IEEE Internet of Things J. 5(1), 257–268 (2018)
Villari, M., et al.: Software defined membrane: policy-driven edge and Internet of Things security. IEEE Cloud Comput. 4(4), 92–99 (2017)
Moustafa, N., Adi, E., Turnbull, B., Hu, J.: A new threat intelligence scheme for safeguarding industry 4.0 systems. IEEE Access 6, 32910–32924 (2018)
Mughal, M.A., Luo, X., Ullah, A., Ullah, S., Mahmood, Z.: A lightweight digital signature based security scheme for human-centered Internet of Things. IEEE Access 6, 31630–31643 (2018)
Pereira, G.C.C.F., et al.: Performance evaluation of cryptographic algorithms over IoT platforms and operating systems. Secur. Commun. Netw. 2017, 16 (2017)
Raza, S., et al.: S3K: scalable security with symmetric keys—DTLS key establishment for the Internet of things. IEEE Trans. Autom. Sci. Eng. 13(3), 1270–1280 (2016)
Xiao, D., Yu, Y.: Cryptanalysis of compact-LWE and related lightweight public key encryption. Secur. Commun. Netw. 2018, 9 (2018)
Qu, C., et al.: Blockchain based credibility verification method for IoT entities. Secur. Commun. Netw. 2018, 11 (2018)
Song, W.-T., Hu, B., Zhao, X.-F.: Privacy protection of IoT based on fully homomorphic encryption. Wirel. Commun. Mob. Comput. 2018, 7 (2018)
Wu, H., Wang, W.: A game theory based collaborative security detection method for Internet of Things systems. IEEE Trans. Inf. Forensics Secur. 13(6), 1432–1445 (2018)
Xu, G., et al.: Network security situation awareness based on semantic ontology and user-defined rules for Internet of Things. IEEE Access 5, 21046–21056 (2017)
Zhang, M., et al.: Tolerating sensitive-leakage with larger plaintext-space and higher leakage-rate in privacy-aware Internet-of-Things. IEEE Access 6, 33859–33870 (2018)
Agah, A., Das, S.K., Basu, K.: A game theory based approach for security in wireless sensor networks. In: IEEE International Conference on Performance, Computing, and Communications, pp. 259–263 (2004)
Hamdi, M., Abie, H.: Game-based adaptive security in the Internet of Things for eHealth. In: 2014 IEEE International Conference on Communications (ICC), Sydney, NSW, pp. 920–925 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Ambore, B., Suresh, L. (2019). Game-Decision Model for Isolating Intruder and Bridging Tradeoff Between Energy and Security. In: Silhavy, R. (eds) Cybernetics and Automation Control Theory Methods in Intelligent Algorithms. CSOC 2019. Advances in Intelligent Systems and Computing, vol 986. Springer, Cham. https://doi.org/10.1007/978-3-030-19813-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-19813-8_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-19812-1
Online ISBN: 978-3-030-19813-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)