Survey on Game Theory-Based Security Framework for IoT

  • Conference paper
  • First Online:
Advances in Data Science and Artificial Intelligence (ICDSAI 2022)

Part of the book series: Springer Proceedings in Mathematics & Statistics ((PROMS,volume 403))

  • 347 Accesses

Abstract

The large network of smart devices and the complexity of networks have made it almost impossible to make the data and communication between devices more secure. The number of cyber-attacks on these IoT devices has been steadily increasing. So here a survey on game theory model is presented, and the attackers are rational human beings, so they try to harm the system to their best of ability and so their moves can be predicted which can be used by the defenders with some game theory concepts to take proper security decisions and make an efficient security framework. This chapter is a survey on game theory-based security frameworks and explores and evaluates different types of threats, security requirements and constraints related to IoT, how Game Theory can be used in field of IoT, along with the game theory models used is to develop security frameworks for IoT.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. G. Sharma, S. Vidalis, N. Anand, C. Menon, S. Kumar, A survey on layer-wise security attacks in IoT: Attacks, countermeasures, and open-issues, https://doi.org/10.3390/electronics10192365 (2021).

  2. J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, W. Zhao, A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications, https://doi.org/10.1109/JIOT.2017.2683200 (2017).

  3. H. Wu, Z. Wang, Multi-source fusion-based security detection method for heterogeneous networks, https://doi.org/10.1016/J.COSE.2018.01.003 (2018).

  4. Y. Yu, K. Li, W. Zhou, P. Li, Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures, https://doi.org/10.1016/j.jnca.2011.03.005 (2012).

  5. M. S. Abdalzaher, K. Seddik, O. M. Maha Elsabrouty, H. Furukawa, A. Abdel-Rahman, Game theory meets wireless sensor networks security requirements and threats mitigation: a survey, https://doi.org/10.3390/s16071003 (2016).

  6. S. Lee, S. Kim, K. Choi, T. Shon, Game theory-based security vulnerability quantification for social Internet of Things, https://doi.org/10.1016/j.future.2017.09.032 (2017).

  7. F. Fang, S. Liu, A. Basak, Q. Zhu, C. D. Kiekintveld, C. A. Kamhoua, Introduction to game theory, https://doi.org/10.1002/9781119723950.ch2 (2021).

  8. X. Liang, Y. **ao, Game theory for network security, https://doi.org/10.1109/SURV.2012.062612.00056 (2013).

  9. H. Wu, W. Wang, A game theory based collaborative security detection method for Internet of Things systems, https://doi.org/10.1109/TIFS.2018.2790382 (2018).

  10. Y. B. Reddy, A game theory approach to detect malicious nodes in wireless sensor networks, https://doi.org/10.1109/SENSORCOMM.2009.76 (2009).

  11. S. Hameed, F. I. Khan, B. Hameed, Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review, https://doi.org/10.1155/2019/9629381 (2019).

  12. S. Hameed, F. I. Khan, B. Hameed, Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review, https://doi.org/10.1155/2019/9629381 (2019).

  13. Y. Wang, G. Attebury, B. Ramamurthy, A survey of security issues in wireless sensor networks, https://doi.org/10.1109/COMST.2006.315852 (2006).

  14. L. Yuan, G. Qu, Design space exploration for energy-efficient secure sensor network, https://doi.org/10.1109/ASAP.2002.1030707 (2002).

  15. S. Pal, M. Hitchens, T. Rabehaja, S. Mukhopadhyay, Security Requirements for the Internet of Things: A Systematic Approach, https://doi.org/10.3390/s20205897 (2020).

  16. M. R. Islam1, K. M. Aktheruzzaman, An analysis of cybersecurity attacks against Internet of Things and security solutions, https://doi.org/10.4236/jcc.2020.84002 (2020).

  17. A. Gouissem, K. Abualsaud, E. Yaacoub, T. Khattab, M. Guizani, Game theory for anti-jamming strategy in multichannel slow fading IoT networks, https://doi.org/10.1109/JIOT.2021.3066384 (2021).

  18. C. A. Holt, A. E. Roth, The Nash equilibrium: A perspective, https://doi.org/10.1073/pnas.0308738101 (2004).

  19. C. Chi, Y. Wang, X. Tong, M. Siddula, Z. Cai, Game theory in internet of things: A survey, https://doi.org/10.1109/JIOT.2021.3133669 (2021).

  20. Z. Xu, A. Qu, K. An, Coalitional game based joint beamforming and power control for physical layer security enhancement in cognitive IoT networks, https://doi.org/10.23919/JCC.2021.12.009 (2021).

  21. F. G. Marmol, G. M. Perez, TRMSim-WSN, trust and reputation models simulator for wireless sensor networks, https://doi.org/10.1109/ICC.2009.5199545 (2009).

  22. M. Kodialam, T. Lakshman, Detecting network intrusions via sampling: a game theoretic approach, https://doi.org/10.1109/INFCOM.2003.1209210 (2003).

  23. F. G. Marmol, G. M. Perez, TRMSim-WSN, Trust and Reputation Models Simulator for Wireless Sensor Networks, https://doi.org/10.1109/ICC.2009.5199545 (2009).

  24. M. Kodialam, T. Lakshman, Detecting network intrusions via sampling: a game theoretic approach, https://doi.org/10.1109/INFCOM.2003.1209210 (2003).

  25. L. Harn, Group authentication, https://doi.org/10.1109/TC.2012.251 (2012).

  26. K. Komathy, P. Narayanasamy, Trust-based evolutionary game model assisting AODV routing against selfishness, https://doi.org/10.1016/j.jnca.2008.02.008 (2008).

  27. H. Z, Game theory in wireless and communication networks: Theory, models, and applications, https://assets.cambridge.org/97805211/96963/frontmatter/9780521196963_frontmatter.pdf (2012).

  28. A. Tabassum, W. Lebda, Security framework for IoT devices against cyber-attacks, https://doi.org/10.5121/csit.2019.91321 (2019).

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Joshi, P., Kamediya, S., Kumar, R., Chandavarkar, B.R. (2023). Survey on Game Theory-Based Security Framework for IoT. In: Misra, R., et al. Advances in Data Science and Artificial Intelligence. ICDSAI 2022. Springer Proceedings in Mathematics & Statistics, vol 403. Springer, Cham. https://doi.org/10.1007/978-3-031-16178-0_25

Download citation

Publish with us

Policies and ethics

Navigation