Skip to main content

Game-Decision Model for Isolating Intruder and Bridging Tradeoff Between Energy and Security

  • Conference paper
  • First Online:
Cybernetics and Automation Control Theory Methods in Intelligent Algorithms (CSOC 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 986))

Included in the following conference series:

  • 464 Accesses

Abstract

Irrespective of the type and degree of capability, any adversaries’ results in significant loss of energy among the physical devices connected in Internet-of-Things (IoT). After reviewing existing trends of research-based solution, it was seen that various complex cryptographic solution has been put forward to claim potential security but they were not found to claim if their solution could stop unwanted energy depletion too during the process of safeguarding the physical devices. Therefore, this paper presents a game-decision making model that is capable of assessing the level of vulnerability as well as legitimacy of the IoT devices during the communication process that finally leads to identification followed by isolating the compromised or malicious IoT devices. The study outcome was found to offer better identification of the threats for multi-staged games in contrast to existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hwang, K., Chen, M.: Big-Data Analytics for Cloud, IoT and Cognitive Computing. Wiley, Hoboken (2017)

    Google Scholar 

  2. Krishna Prasad, A.V.: Exploring the Convergence of Big Data and the Internet of Things. IGI Global, Hershey (2017)

    Google Scholar 

  3. Bhadoria, R.S., Chaudhari, N., Tomar, G.S., Singh, S.: Exploring Enterprise Service Bus in the Service-Oriented Architecture Paradigm. IGI Global, Hershey (2017)

    Book  Google Scholar 

  4. Humayed, A., Lin, J., Li, F., Luo, B.: Cyber-physical systems security—a survey. IEEE Internet of Things J. 4(6), 1802–1831 (2017)

    Article  Google Scholar 

  5. Benzarti, S., Triki, B., Korbaa, O.: A survey on attacks in Internet of Things based networks. In: 2017 International Conference on Engineering & MIS (ICEMIS), Monastir, pp. 1–7 (2017)

    Google Scholar 

  6. Mendez, D.M., Papapanagiotou, I., Yang, B.: Internet of things: survey on security. J. Inf. Secur. J.: Global Persp. 27(3), 162–182 (2018)

    Google Scholar 

  7. Sain, M., Kang, Y.J., Lee, H.J.: Survey on security in Internet of Things: state of the art and challenges. In: 2017 19th International Conference on Advanced Communication Technology (ICACT), Bongpyeong, pp. 699–704 (2017)

    Google Scholar 

  8. Benabdessalem, R., Hamdi, M., Kim, T.H.: A survey on security models, techniques, and tools for the Internet of Things. In: 2014 7th International Conference on Advanced Software Engineering and Its Applications, Haikou, pp. 44–48 (2014)

    Google Scholar 

  9. Dragomir, D., Gheorghe, L., Costea, S., Radovici, A.: A survey on secure communication protocols for IoT systems. In: 2016 International Workshop on Secure Internet of Things (SIoT), Heraklion, pp. 47–62 (2016)

    Google Scholar 

  10. Shakhov, V., Koo, I., Rodionov, A.: Energy exhaustion attacks in wireless networks. In: 2017 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON), Novosibirsk, pp. 1–3 (2017)

    Google Scholar 

  11. Bertino, E., Islam, N.: Botnets and Internet of Things security. Computer 50(2), 76–79 (2017)

    Article  Google Scholar 

  12. Bhattarai, S., Wang, Y.: End-to-end trust and security for Internet of Things applications. Computer 51(4), 20–27 (2018)

    Article  Google Scholar 

  13. Burg, A., Chattopadhyay, A., Lam, K.Y.: Wireless communication and security issues for cyber-physical systems and the Internet-of-Things. Proc. IEEE 106(1), 38–60 (2018)

    Article  Google Scholar 

  14. Nurse, J.R.C., Creese, S., De Roure, D.: Security risk assessment in Internet of Things systems. IT Prof. 19(5), 20–26 (2017)

    Article  Google Scholar 

  15. Singh, J., et al.: Twenty security considerations for cloud-supported Internet of Things (2015)

    Google Scholar 

  16. Szymanski, T.H.: Security and privacy for a green Internet of Things. IT Prof. 19(5), 34–41 (2017)

    Article  Google Scholar 

  17. Wolf, M., Serpanos, D.: Safety and security in cyber-physical systems and Internet-of-Things systems. Proc. IEEE 106(1), 9–20 (2018)

    Article  Google Scholar 

  18. Hu, L., et al.: Cooperative jamming for physical layer security enhancement in Internet of Things. IEEE Internet of Things J. 5(1), 219–228 (2018)

    Article  Google Scholar 

  19. Liu, Y., Kuang, Y., Xiao, Y., Xu, G.: SDN-based data transfer security for Internet of Things. IEEE Internet of Things J. 5(1), 257–268 (2018)

    Article  Google Scholar 

  20. Villari, M., et al.: Software defined membrane: policy-driven edge and Internet of Things security. IEEE Cloud Comput. 4(4), 92–99 (2017)

    Article  Google Scholar 

  21. Moustafa, N., Adi, E., Turnbull, B., Hu, J.: A new threat intelligence scheme for safeguarding industry 4.0 systems. IEEE Access 6, 32910–32924 (2018)

    Article  Google Scholar 

  22. Mughal, M.A., Luo, X., Ullah, A., Ullah, S., Mahmood, Z.: A lightweight digital signature based security scheme for human-centered Internet of Things. IEEE Access 6, 31630–31643 (2018)

    Article  Google Scholar 

  23. Pereira, G.C.C.F., et al.: Performance evaluation of cryptographic algorithms over IoT platforms and operating systems. Secur. Commun. Netw. 2017, 16 (2017)

    Article  Google Scholar 

  24. Raza, S., et al.: S3K: scalable security with symmetric keys—DTLS key establishment for the Internet of things. IEEE Trans. Autom. Sci. Eng. 13(3), 1270–1280 (2016)

    Article  Google Scholar 

  25. Xiao, D., Yu, Y.: Cryptanalysis of compact-LWE and related lightweight public key encryption. Secur. Commun. Netw. 2018, 9 (2018)

    Google Scholar 

  26. Qu, C., et al.: Blockchain based credibility verification method for IoT entities. Secur. Commun. Netw. 2018, 11 (2018)

    Article  Google Scholar 

  27. Song, W.-T., Hu, B., Zhao, X.-F.: Privacy protection of IoT based on fully homomorphic encryption. Wirel. Commun. Mob. Comput. 2018, 7 (2018)

    Google Scholar 

  28. Wu, H., Wang, W.: A game theory based collaborative security detection method for Internet of Things systems. IEEE Trans. Inf. Forensics Secur. 13(6), 1432–1445 (2018)

    Article  Google Scholar 

  29. Xu, G., et al.: Network security situation awareness based on semantic ontology and user-defined rules for Internet of Things. IEEE Access 5, 21046–21056 (2017)

    Article  Google Scholar 

  30. Zhang, M., et al.: Tolerating sensitive-leakage with larger plaintext-space and higher leakage-rate in privacy-aware Internet-of-Things. IEEE Access 6, 33859–33870 (2018)

    Article  Google Scholar 

  31. Agah, A., Das, S.K., Basu, K.: A game theory based approach for security in wireless sensor networks. In: IEEE International Conference on Performance, Computing, and Communications, pp. 259–263 (2004)

    Google Scholar 

  32. Hamdi, M., Abie, H.: Game-based adaptive security in the Internet of Things for eHealth. In: 2014 IEEE International Conference on Communications (ICC), Sydney, NSW, pp. 920–925 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bhagyashree Ambore .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ambore, B., Suresh, L. (2019). Game-Decision Model for Isolating Intruder and Bridging Tradeoff Between Energy and Security. In: Silhavy, R. (eds) Cybernetics and Automation Control Theory Methods in Intelligent Algorithms. CSOC 2019. Advances in Intelligent Systems and Computing, vol 986. Springer, Cham. https://doi.org/10.1007/978-3-030-19813-8_2

Download citation

Publish with us

Policies and ethics