Abstract
Internet of Things (IoT) is a network of heterogeneous physical devices connected over the Internet. Each of the devices is capable of collecting and processing data. Due to the connection with the Internet, the IoT devices become more susceptible to attacks by malicious nodes, which may result in privacy loss and security breaches. Thus, network security is necessary for the privacy of transmitted messages. In this context, we propose a scheme, Service-Oriented game-theoretic Security (SOS), which provides a simple yet robust security solution for IoT networks. Here, we have amalgamated our scheme with Named Data Networking (NDN), which is more of a data content-specific approach, unlike the traditional IP address search. In this scheme, at first, the hop count between the sender and the receiver is used to generate the public key to encrypt the messages by the sender. When the receiver receives this message, it decrypts the message with the help of the decryption function generated by the sender using the hop count between them as the private key. A non-cooperative Stackelberg game-theoretic model is used to model defenders and attackers, which helps to decide strategies to maximize the payoff (profit) of the defenders to protect the network from malicious attacks. The results are further extended for a modified public key encryption technique, which results in the robustness of the security scheme to be used for all real-life network scenarios. Simulation results show that the proposed scheme, SOS, has a better performance compared to the existing state-of-the-art security schemes, UAKMP and CLS, in terms of time complexity, message overhead, throughput, and attack probability.
Original language | English |
---|---|
Article number | 9424193 |
Pages (from-to) | 3197-3208 |
Number of pages | 12 |
Journal | IEEE Transactions on Network and Service Management |
Volume | 18 |
Issue number | 3 |
DOIs | |
Publication status | Published - Sept 2021 |
Keywords
- Internet of things
- SOA
- Stackelberg game
- hop count
- malicious nodes
- named data networking
- payoff
- privacy
- security
- strategy
ASJC Scopus subject areas
- Computer Networks and Communications
- Electrical and Electronic Engineering