2018
DOI: 10.1109/tifs.2018.2790382
|View full text |Cite
|
Sign up to set email alerts
|

A Game Theory Based Collaborative Security Detection Method for Internet of Things Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
21
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 77 publications
(21 citation statements)
references
References 45 publications
0
21
0
Order By: Relevance
“…Miranda et al [2] propose a security framework for the detection and prevention of intrusions in software-defined networks. Hao et al [3] propose a collaborative game theory-based security detection framework for IoT to model the confrontation between attacker and defender to identify security events. Moreover, collaborative information sharing is achieved by consensus protocol.…”
Section: Motivationmentioning
confidence: 99%
“…Miranda et al [2] propose a security framework for the detection and prevention of intrusions in software-defined networks. Hao et al [3] propose a collaborative game theory-based security detection framework for IoT to model the confrontation between attacker and defender to identify security events. Moreover, collaborative information sharing is achieved by consensus protocol.…”
Section: Motivationmentioning
confidence: 99%
“…It is estimated that approximately 20 billion devices will be connected to the IoT in 5G networks. Due to the openness of the transmission channel, the wireless network is more vulnerable to large-scale malicious attacks compared with the traditional wired network [9]. Traditional methods for securing wireless networks are often based on bit-level security protocols.…”
Section: To Wired Communication the Open Communication Environment Mmentioning
confidence: 99%
“…In [17], a passive blind video similar tamper detection algorithm based on multi-scale normalized mutual information is proposed, which realizes video frame replication, frame insertion and frame deletion tamper detection. Meanwhile, some researchers apply game theory to prevent information from being tampered or theft in [18]- [20]. In [21], the interaction between attacker and defender was model as a noncooperative security game, players adjust their strategy by analyzing and predicting the opponent's strategy.…”
Section: Introductionmentioning
confidence: 99%