| Literature DB >> 30469434 |
Bingjie Liu1, Haitao Xu2, Xianwei Zhou3.
Abstract
With the rapid development of the Internet of Things, there are a series of security problems faced by the IoT devices. As the IoT devices are generally devices with limited resources, how to effectively allocate the restricted resources facing the security problems is the key issue at present. In this paper, we study the resource allocation problem in threat defense for the resource-constrained IoT system, and propose a Stackelberg dynamic game model to get the optimal allocated resources for both the defender and attackers. The proposed Stackelberg dynamic game model is composed by one defender and many attackers. Given the objective functions of the defender and attackers, we analyze both the open-loop Nash equilibrium and feedback Nash equilibrium for the defender and attackers. Then both the defender and attackers can control their available resources based on the Nash equilibrium solutions of the dynamic game. Numerical simulation results show that correctness and effeteness of the proposed model.Entities:
Keywords: Internet of Things; Nash equilibrium; Stackelberg dynamic game; resource allocation; threat defense
Year: 2018 PMID: 30469434 PMCID: PMC6263514 DOI: 10.3390/s18114074
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Parameter settings.
| Parameter |
|
|
|
|
|
|
|
|
|
|---|---|---|---|---|---|---|---|---|---|
| Value | −0.85 | 0.6 | −0.5 | 0.3 | 0.5 | 0.2 | 0.1 | 0.5 | 0.4 |
Figure 1(a) Optimal strategy of the attackers; (b) optimal strategy of the defender.
Figure 2Optimal strategy of the attacker with different over time.
Figure 3(a) Risk level variation for a system with one attacker; (b) risk level variation for a system with different numbers of attackers.
Figure 4Risk level with a large number of attackers under open-loop control.
Figure 5(a) Optimal strategy of the attacker; (b) optimal strategy of the defender.
Figure 6(a) Risk level variation for a system with one attacker; (b) risk level variation for a system with different numbers of attackers.
Figure 7Risk level with a large number of attackers under feedback control.
Figure 8The time complexity of the proposed game model.