Defending Against DDOS Attacks on IoT Network Throughput: A Trust-Stackelberg Game Model

被引:0
|
作者
Qi, Chunyang [1 ]
Huang, Jie [1 ,2 ]
Huang, Cheng [3 ]
Wu, Huaqing [3 ]
Shen, Xuemin [3 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 211189, Peoples R China
[2] Purple Mt Labs, Nanjing 211111, Peoples R China
[3] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
D O I
10.1109/GLOBECOM48099.2022.10000946
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IoTs generally rely on resource-constrained devices to sense, relay, and collect data, which are highly vulnerable to Distributed-Denial-of-Services (DDOS) attacks on network throughput. In this paper, we propose a trust-based method to optimize the network throughput of IoTs under DDOS attacks. Specifically, with the assistance of a small number of dedicatedly deployed defense nodes as defenders, a network controller can first measure the behavior of other IoT nodes and categorize them into three types (i.e., innocent, selfish, and attack) through a well-designed trust evaluation model. Then, a Stackelberg game model is constructed accordingly, where defenders are leaders and other nodes are followers. We carefully define the utilities of the leaders and the followers in the game, and transform the optimization problem of the network throughput into the maximization problem of the defenders' utilities considering the utilities of the followers. We adopt the Dinkelbach Programming (DP)-based algorithm to solve the maximization problem such that a Stackelberg equilibrium can be reached with optimized network throughput. Extensive simulations are performed to demonstrate that the proposed defense method can significantly increase the IoT network throughput under different DDOS attack intensities.
引用
收藏
页码:6259 / 6264
页数:6
相关论文
共 50 条
  • [1] Defending Against Ddos Attacks in Rpl Using Subjective Logic Based Trust Approach For IOT
    Kiran, Vidhu
    Sardana, Anita
    Kaur, Puninder
    2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2022, 2022, : 1656 - 1660
  • [2] An adaptive trust-Stackelberg game model for security and energy efficiency in dynamic cognitive radio networks
    Fang, He
    Xu, Li
    Li, Jie
    Choo, Kim-Kwang Raymond
    COMPUTER COMMUNICATIONS, 2017, 105 : 124 - 132
  • [3] An Adaptive Approach for Defending against DDoS Attacks
    Li, Muhai
    Li, Ming
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2010, 2010
  • [4] DDoS Defense for IoT: A Stackelberg Game Model-Enabled Collaborative Framework
    Chen, Xu
    Xiao, Liang
    Feng, Wei
    Ge, Ning
    Wang, Xianbin
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12): : 9659 - 9674
  • [5] Practical Techniques for Defending against DDoS Attacks
    Chen, Eric Y.
    Yonezawa, Akinori
    3RD ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, 2005, 2005,
  • [6] Safeguarding IoT networks against DDoS attacks using deep learning based zero trust network access
    Khan, Murad
    ELECTRONICS LETTERS, 2024, 60 (21)
  • [7] Defending against spoofed DDoS attacks with path fingerprint
    Lee, FY
    Shieh, S
    COMPUTERS & SECURITY, 2005, 24 (07) : 571 - 586
  • [8] Two Layer Defending Mechanism against DDoS Attacks
    Subramanian, Kiruthika
    Gunasekaran, Preetha
    Selvaraj, Mercy
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2015, 12 (04) : 317 - 324
  • [9] Defending Wireless Infrastructure Against the Challenge of DDoS Attacks
    Xianjun Geng
    Yun Huang
    Andrew B. Whinston
    Mobile Networks and Applications, 2002, 7 : 213 - 223
  • [10] Defending wireless infrastructure against the challenge of DDoS attacks
    Geng, XJ
    Huang, Y
    Whinston, AB
    MOBILE NETWORKS & APPLICATIONS, 2002, 7 (03): : 213 - 223