Reliability of autonomous Internet of Things systems with intrusion detection attack-defense game design

DC Wang, R Chen, H Al-Hamadi - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this article we develop an intrusion detection attack-defense game for Internet of Things
(IoT) systems for which autonomous IoT devices collaboratively solve a problem. We …

Attack and defense strategies for intrusion detection in autonomous distributed IoT systems

H Al-Hamadi, R Chen, DC Wang, M Almashan - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, we develop a methodology to capture and analyze the interplay of attack-
defense strategies for intrusion detection in an autonomous distributed Internet of Things …

Coverage Reliability of IoT Intrusion Detection System based on Attack-Defense Game Design

S Sun, X Fan, Y Xia, C Zhu, S Liu… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The emergence of new applications of Internet of Things (IoT) makes its security and
reliability become one of the most concerning issues and requires more breakthroughs. To …

Signaling game-based availability assessment for edge computing-assisted IoT systems with malware dissemination

Y Shen, S Shen, Z Wu, H Zhou, S Yu - Journal of Information Security and …, 2022 - Elsevier
IoT malware dissemination seriously exacerbates the decline of IoT system availability,
which deteriorates the users experience. To address the issue, we first predict the optimal …

A game of things: Strategic allocation of security resources for iot

A Rullo, D Midi, E Serra, E Bertino - … on Internet-of-Things Design and …, 2017 - dl.acm.org
In many Internet of Thing (IoT) application domains security is a critical requirement,
because malicious parties can undermine the effectiveness of IoT-based systems by …

Game theory-based security vulnerability quantification for social internet of things

S Lee, S Kim, K Choi, T Shon - Future Generation Computer Systems, 2018 - Elsevier
In modern society, information and communication technology (ICT) has been applied to
various areas such as home, industry, and finance. Therefore, social networks using Internet …

A moving target defense strategy for internet of things cybersecurity

AA Mercado-Velázquez, PJ Escamilla-Ambrosio… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) systems are becoming more common and present in our daily lives.
The increase of Internet-connected devices has caused attackers to focus their attention …

A novel multi-agent and multilayered game formulation for intrusion detection in Internet of Things (IoT)

BUI Khan, F Anwar, RF Olanrewaju, BR Pampori… - IEEE …, 2020 - ieeexplore.ieee.org
The current era of smart computing and enabling technologies encompasses the Internet of
Things (IoT) as a network of connected, intelligent objects where objects range from sensors …

Pareto optimal security resource allocation for Internet of Things

A Rullo, D Midi, E Serra, E Bertino - ACM Transactions on Privacy and …, 2017 - dl.acm.org
In many Internet of Thing (IoT) application domains security is a critical requirement,
because malicious parties can undermine the effectiveness of IoT-based systems by …

Trust-based management in IoT federations

H Yahyaoui, Z Maamar, M Al-Khafajiy… - Future Generation …, 2022 - Elsevier
This paper presents a trust-based evolutionary game model for managing Internet-of-Things
(IoT) federations. The model adopts trust-based payoff to either reward or penalize things …