2023
DOI: 10.1002/cpe.7826
|View full text |Cite
|
Sign up to set email alerts
|

A parallel game model‐based intrusion response system for cross‐layer security in industrial internet of things

Abstract: SummaryWith the rise of industrialization, the importance of the industrial Internet of Things (IIoT) has increased significantly, and with it comes a variety of security threats. Therefore, the security of these networks is critical. Industrial Response Systems (IRSs), as the last line of security, plays an important role in the security system of the Industrial Internet of Things. In this paper, a new IRS model based on the non‐cooperative game is proposed. First, by combining the Partially Observable Markov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 37 publications
0
0
0
Order By: Relevance
“…The physical layer security is regarded as the first line of defense for Industrial Internet of Things security [13,14]. This is because physical layer security involves the security of infrastructure such as network devices, sensors, and controllers.…”
Section: Introductionmentioning
confidence: 99%
“…The physical layer security is regarded as the first line of defense for Industrial Internet of Things security [13,14]. This is because physical layer security involves the security of infrastructure such as network devices, sensors, and controllers.…”
Section: Introductionmentioning
confidence: 99%
“…The physical layer security is regarded as the first line of defense for industrial Internet security [14,15].This is because physical layer security involves the security of infrastructure such as network devices, sensors, and controllers. These infrastructure are the foundation of industrial Internet operations, and once they are threatened or attacked, it may have a serious impact on the entire network [16,17].…”
Section: Introductionmentioning
confidence: 99%