Trust Evaluation for Light Weight Security in Sensor Enabled Internet of Things: Game Theory Oriented Approach

被引:43
|
作者
Rani, Rinki [1 ]
Kumar, Sushil [1 ]
Dohare, Upasana [1 ]
机构
[1] Jawaharlal Nehru Univ, Sch Comp & Syst Sci, New Delhi 110067, India
关键词
Clustering; energy; game theory; Internet of Things (IoT); security; sensor networks; trust; SYSTEM; NETWORKS; SCHEME;
D O I
10.1109/JIOT.2019.2917763
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In sensor-enabled Internet of Things (IoT), nodes are deployed in an open and remote environment, therefore, are vulnerable to a variety of attacks. Recently, trust-based schemes have played a pivotal role in addressing nodes' misbehavior attacks in IoT. However, the existing trust-based schemes apply network wide dissemination of the control packets that consume excessive energy in the quest of trust evaluation, which ultimately weakens the network lifetime. In this context, this paper presents an energy efficient trust evaluation (EETE) scheme that makes use of hierarchical trust evaluation model to alleviate the malicious effects of illegitimate sensor nodes and restricts network wide dissemination of trust requests to reduce the energy consumption in clustered-sensor enabled IoT. The proposed EETE scheme incorporates three dilemma game models to reduce additional needless transmissions while balancing the trust throughout the network. Specially: 1) a cluster formation game that promotes the nodes to be cluster head (CH) or cluster member to avoid the extraneous cluster; 2) an optimal cluster formation dilemma game to affirm the minimum number of trust recommendations for maintaining the balance of the trust in a cluster; and 3) an activity-based trust dilemma game to compute the Nash equilibrium that represents the best strategy for a CH to launch its anomaly detection technique which helps in mitigation of malicious activity. Simulation results show that the proposed EETE scheme outperforms the current trust evaluation schemes in terms of detection rate, energy efficiency and trust evaluation time for clustered-sensor enabled IoT.
引用
收藏
页码:8421 / 8432
页数:12
相关论文
共 42 条
  • [21] A Game-Theoretic Approach for Increasing Resource Utilization in Edge Computing Enabled Internet of Things
    Kumar, Sumit
    Gupta, Ruchir
    Lakshmanan, K.
    Maurya, Vipin
    IEEE ACCESS, 2022, 10 : 57974 - 57989
  • [22] Light-Weight Security and Data Provenance for Multi-Hop Internet of Things
    Kamal, Mohsin
    Tariq, Muhammad
    IEEE ACCESS, 2018, 6 : 34439 - 34448
  • [23] Approach to Sustainable Trust and Reputation Evaluation in Distributed Mobile Networks of the Internet of Things
    Turkina, Victoriia
    Ihnatiev, Dmytro
    2020 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT): IOT, BIG DATA AND AI FOR A SAFE & SECURE WORLD AND INDUSTRY 4.0, 2020, : 117 - 121
  • [24] Intelligence, security, and vehicular sensor networks in internet of things (IoT)-enabled smart-cities: An overview
    Al-Turjman, Fadi
    Lemayian, Joel Poncha
    COMPUTERS & ELECTRICAL ENGINEERING, 2020, 87
  • [25] A Big Data Mining and Blockchain-Enabled Security Approach for Agricultural Based on Internet of Things
    Zhang, Feng
    Zhang, Yongheng
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020 (2020):
  • [26] Intelligent Intrusion Detection for Internet of Things Security: A Deep Convolutional Generative Adversarial Network-Enabled Approach
    Wu, Yixuan
    Nie, Laisen
    Wang, Shupeng
    Ning, Zhaolong
    Li, Shengtao
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (04) : 3094 - 3106
  • [27] Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: A Contract Design Approach
    Chen, Juntao
    Zhu, Quanyan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) : 2736 - 2750
  • [28] ANGUISH: Security attack in narrowband-Internet of Things (NB-IoT) using game theory and hardware analysis
    Kumar, Vinod
    Jha, Rakesh Kumar
    Jain, Sanjeev
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (06)
  • [29] Mobile Edge Computing Enabled 5G Health Monitoring for Internet of Medical Things: A Decentralized Game Theoretic Approach
    Ning, Zhaolong
    Dong, Peiran
    Wang, Xiaojie
    Hu, Xiping
    Guo, Lei
    Hu, Bin
    Guo, Yi
    Qiu, Tie
    Kwok, Ricky Y. K.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2021, 39 (02) : 463 - 478
  • [30] Enhanced Network Intrusion Detection System for Internet of Things Security Using Multimodal Big Data Representation with Transfer Learning and Game Theory
    Ullah, Farhan
    Turab, Ali
    Ullah, Shamsher
    Cacciagrano, Diletta
    Zhao, Yue
    SENSORS, 2024, 24 (13)