A non-cooperative differential game-based security model in fog computing

2017 ◽  
Vol 14 (1) ◽  
pp. 180-189 ◽  
Author(s):  
Zhi Li ◽  
Xianwei Zhou ◽  
Yanzhu Liu ◽  
Haitao Xu ◽  
Li Miao
2018 ◽  
Vol 2018 ◽  
pp. 1-9 ◽  
Author(s):  
Xingshuo An ◽  
Fuhong Lin ◽  
Shenggang Xu ◽  
Li Miao ◽  
Chao Gong

Fog computing is an emerging network paradigm. Due to its characteristics (e.g., geo-location and constrained resource), fog computing is subject to a broad range of security threats. Intrusion detection system (IDS) is an essential security technology to deal with the security threats in fog computing. We have introduced a fog computing IDS (FC-IDS) framework in our previous work. In this paper, we study the optimal intrusion response strategy in fog computing based on the FC-IDS scheme proposed in our previous work. We postulate the intrusion process in fog computing and describe it with a mathematical model based on differential game theory. According to this model, the optimal response strategy is obtained corresponding to the optimal intrusion strategy. Theoretical analysis and simulation results demonstrate that our security model can effectively stabilize the intrusion frequency of the invaders in fog computing.


2014 ◽  
Vol 16 (04) ◽  
pp. 1450016 ◽  
Author(s):  
LEON A. PETROSYAN ◽  
DAVID W. K. YEUNG

This paper presents a solution formula for the payoff distribution procedure of a bargaining problem in cooperative differential game that would lead to a time consistent outcome. In particular, individual rationality is satisfied for every player throughout the cooperation period.


IEEE Access ◽  
2017 ◽  
Vol 5 ◽  
pp. 22313-22328 ◽  
Author(s):  
Hadeal Abdulaziz Al Hamid ◽  
Sk Md Mizanur Rahman ◽  
M. Shamim Hossain ◽  
Ahmad Almogren ◽  
Atif Alamri

Sign in / Sign up

Export Citation Format

Share Document