“…[2,3,7,8,11,[13][14][15][16][17][18] Among them, majority use the location-based technique. [2,3,7,11,13,15,17] They detect by the location change as seen by monitor nodes. The distributed version only involves neighbor nodes.…”
We have previously shown that the first stage scheme is effective in the detection of physical capture attacks in wireless sensor networks. Like most existing detection schemes, our scheme relies upon message passing. Regular message passing consumes considerable energy. In this paper the first stage scheme is integrated with a novel sleep/wakeup mechanism, which is completely pre-scheduled based upon a node's internal clock. The scheduling tolerates minor clock alignment errors, so no frequent synchronization is needed. In addition, a sink-based dissemination technique is adopted, which replaces frequent and overlapped flooding of many regular nodes with sparse sink-triggered flooding. The adoption further saves energy expense. A LDCFSD protocol has been implemented in simulation. Simulation results have confirmed above conclusion.
“…[2,3,7,8,11,[13][14][15][16][17][18] Among them, majority use the location-based technique. [2,3,7,11,13,15,17] They detect by the location change as seen by monitor nodes. The distributed version only involves neighbor nodes.…”
We have previously shown that the first stage scheme is effective in the detection of physical capture attacks in wireless sensor networks. Like most existing detection schemes, our scheme relies upon message passing. Regular message passing consumes considerable energy. In this paper the first stage scheme is integrated with a novel sleep/wakeup mechanism, which is completely pre-scheduled based upon a node's internal clock. The scheduling tolerates minor clock alignment errors, so no frequent synchronization is needed. In addition, a sink-based dissemination technique is adopted, which replaces frequent and overlapped flooding of many regular nodes with sparse sink-triggered flooding. The adoption further saves energy expense. A LDCFSD protocol has been implemented in simulation. Simulation results have confirmed above conclusion.
With the rapid development of the Internet of Things, there are a series of security problems faced by the IoT devices. As the IoT devices are generally devices with limited resources, how to effectively allocate the restricted resources facing the security problems is the key issue at present. In this paper, we study the resource allocation problem in threat defense for the resource-constrained IoT system, and propose a Stackelberg dynamic game model to get the optimal allocated resources for both the defender and attackers. The proposed Stackelberg dynamic game model is composed by one defender and many attackers. Given the objective functions of the defender and attackers, we analyze both the open-loop Nash equilibrium and feedback Nash equilibrium for the defender and attackers. Then both the defender and attackers can control their available resources based on the Nash equilibrium solutions of the dynamic game. Numerical simulation results show that correctness and effeteness of the proposed model.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.