Abstract
The large network of smart devices and the complexity of networks have made it almost impossible to make the data and communication between devices more secure. The number of cyber-attacks on these IoT devices has been steadily increasing. So here a survey on game theory model is presented, and the attackers are rational human beings, so they try to harm the system to their best of ability and so their moves can be predicted which can be used by the defenders with some game theory concepts to take proper security decisions and make an efficient security framework. This chapter is a survey on game theory-based security frameworks and explores and evaluates different types of threats, security requirements and constraints related to IoT, how Game Theory can be used in field of IoT, along with the game theory models used is to develop security frameworks for IoT.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
G. Sharma, S. Vidalis, N. Anand, C. Menon, S. Kumar, A survey on layer-wise security attacks in IoT: Attacks, countermeasures, and open-issues, https://doi.org/10.3390/electronics10192365 (2021).
J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, W. Zhao, A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications, https://doi.org/10.1109/JIOT.2017.2683200 (2017).
H. Wu, Z. Wang, Multi-source fusion-based security detection method for heterogeneous networks, https://doi.org/10.1016/J.COSE.2018.01.003 (2018).
Y. Yu, K. Li, W. Zhou, P. Li, Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures, https://doi.org/10.1016/j.jnca.2011.03.005 (2012).
M. S. Abdalzaher, K. Seddik, O. M. Maha Elsabrouty, H. Furukawa, A. Abdel-Rahman, Game theory meets wireless sensor networks security requirements and threats mitigation: a survey, https://doi.org/10.3390/s16071003 (2016).
S. Lee, S. Kim, K. Choi, T. Shon, Game theory-based security vulnerability quantification for social Internet of Things, https://doi.org/10.1016/j.future.2017.09.032 (2017).
F. Fang, S. Liu, A. Basak, Q. Zhu, C. D. Kiekintveld, C. A. Kamhoua, Introduction to game theory, https://doi.org/10.1002/9781119723950.ch2 (2021).
X. Liang, Y. **ao, Game theory for network security, https://doi.org/10.1109/SURV.2012.062612.00056 (2013).
H. Wu, W. Wang, A game theory based collaborative security detection method for Internet of Things systems, https://doi.org/10.1109/TIFS.2018.2790382 (2018).
Y. B. Reddy, A game theory approach to detect malicious nodes in wireless sensor networks, https://doi.org/10.1109/SENSORCOMM.2009.76 (2009).
S. Hameed, F. I. Khan, B. Hameed, Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review, https://doi.org/10.1155/2019/9629381 (2019).
S. Hameed, F. I. Khan, B. Hameed, Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review, https://doi.org/10.1155/2019/9629381 (2019).
Y. Wang, G. Attebury, B. Ramamurthy, A survey of security issues in wireless sensor networks, https://doi.org/10.1109/COMST.2006.315852 (2006).
L. Yuan, G. Qu, Design space exploration for energy-efficient secure sensor network, https://doi.org/10.1109/ASAP.2002.1030707 (2002).
S. Pal, M. Hitchens, T. Rabehaja, S. Mukhopadhyay, Security Requirements for the Internet of Things: A Systematic Approach, https://doi.org/10.3390/s20205897 (2020).
M. R. Islam1, K. M. Aktheruzzaman, An analysis of cybersecurity attacks against Internet of Things and security solutions, https://doi.org/10.4236/jcc.2020.84002 (2020).
A. Gouissem, K. Abualsaud, E. Yaacoub, T. Khattab, M. Guizani, Game theory for anti-jamming strategy in multichannel slow fading IoT networks, https://doi.org/10.1109/JIOT.2021.3066384 (2021).
C. A. Holt, A. E. Roth, The Nash equilibrium: A perspective, https://doi.org/10.1073/pnas.0308738101 (2004).
C. Chi, Y. Wang, X. Tong, M. Siddula, Z. Cai, Game theory in internet of things: A survey, https://doi.org/10.1109/JIOT.2021.3133669 (2021).
Z. Xu, A. Qu, K. An, Coalitional game based joint beamforming and power control for physical layer security enhancement in cognitive IoT networks, https://doi.org/10.23919/JCC.2021.12.009 (2021).
F. G. Marmol, G. M. Perez, TRMSim-WSN, trust and reputation models simulator for wireless sensor networks, https://doi.org/10.1109/ICC.2009.5199545 (2009).
M. Kodialam, T. Lakshman, Detecting network intrusions via sampling: a game theoretic approach, https://doi.org/10.1109/INFCOM.2003.1209210 (2003).
F. G. Marmol, G. M. Perez, TRMSim-WSN, Trust and Reputation Models Simulator for Wireless Sensor Networks, https://doi.org/10.1109/ICC.2009.5199545 (2009).
M. Kodialam, T. Lakshman, Detecting network intrusions via sampling: a game theoretic approach, https://doi.org/10.1109/INFCOM.2003.1209210 (2003).
L. Harn, Group authentication, https://doi.org/10.1109/TC.2012.251 (2012).
K. Komathy, P. Narayanasamy, Trust-based evolutionary game model assisting AODV routing against selfishness, https://doi.org/10.1016/j.jnca.2008.02.008 (2008).
H. Z, Game theory in wireless and communication networks: Theory, models, and applications, https://assets.cambridge.org/97805211/96963/frontmatter/9780521196963_frontmatter.pdf (2012).
A. Tabassum, W. Lebda, Security framework for IoT devices against cyber-attacks, https://doi.org/10.5121/csit.2019.91321 (2019).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Joshi, P., Kamediya, S., Kumar, R., Chandavarkar, B.R. (2023). Survey on Game Theory-Based Security Framework for IoT. In: Misra, R., et al. Advances in Data Science and Artificial Intelligence. ICDSAI 2022. Springer Proceedings in Mathematics & Statistics, vol 403. Springer, Cham. https://doi.org/10.1007/978-3-031-16178-0_25
Download citation
DOI: https://doi.org/10.1007/978-3-031-16178-0_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-16177-3
Online ISBN: 978-3-031-16178-0
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)