A game-theoretic technique for securing IoT devices against Mirai botnet

Author(s):  
Olga Hachinyan ◽  
Anastasiya Khorina ◽  
Sergey Zapechnikov
Sensors ◽  
2020 ◽  
Vol 20 (23) ◽  
pp. 6761
Author(s):  
Anjan Bandyopadhyay ◽  
Vikash Kumar Singh ◽  
Sajal Mukhopadhyay ◽  
Ujjwal Rai ◽  
Fatos Xhafa ◽  
...  

In the Internet of Things (IoT) + Fog + Cloud architecture, with the unprecedented growth of IoT devices, one of the challenging issues that needs to be tackled is to allocate Fog service providers (FSPs) to IoT devices, especially in a game-theoretic environment. Here, the issue of allocation of FSPs to the IoT devices is sifted with game-theoretic idea so that utility maximizing agents may be benign. In this scenario, we have multiple IoT devices and multiple FSPs, and the IoT devices give preference ordering over the subset of FSPs. Given such a scenario, the goal is to allocate at most one FSP to each of the IoT devices. We propose mechanisms based on the theory of mechanism design without money to allocate FSPs to the IoT devices. The proposed mechanisms have been designed in a flexible manner to address the long and short duration access of the FSPs to the IoT devices. For analytical results, we have proved the economic robustness, and probabilistic analyses have been carried out for allocation of IoT devices to the FSPs. In simulation, mechanism efficiency is laid out under different scenarios with an implementation in Python.


Electronics ◽  
2021 ◽  
Vol 10 (3) ◽  
pp. 356
Author(s):  
Chunghyun Lee ◽  
Gunhee Jang ◽  
Nhu-Ngoc Dao ◽  
Demeke Shumeye Lakew ◽  
Cheol Lee ◽  
...  

Unmanned aerial vehicle (UAV) communication is regarded as a promising technology for lightweight Internet of Things (IoT) communications in narrowband-IoT (NB-IoT) systems deployed in rugged terrain. In such UAV-assisted NB-IoT systems, the optimal UAV placement and resource allocation play a critical role. Consequently, the joint optimization of the UAV placement and resource allocation is considered in this study to improve the system capacity. Because the considered optimization problem is an NP-hard problem and owing to its non-convex property, it is difficult to optimize both the UAV placement and resource allocation simultaneously. Therefore, a competitive clustering algorithm has been developed by exchanging strategies between the UAV and the adjacent IoT devices to optimize the UAV placement. With multiple iterations, the UAV and the IoT devices within the coverage area of the UAV, converge their clustering strategies, which are suboptimal, to satisfy both sides. The bordering IoT devices of the adjacent clusters are then migrated heuristically toward each other to obtain the optimal system capacity maximization. Finally, the transmission throughput is optimized using the Nash equilibrium. The simulation results demonstrate that the algorithms proposed in this study exhibit rapid convergence, within 10 iterations, even in a large environment. The performance evaluation demonstrates that the proposed scheme improves the system capacity of the existing schemes by approximately 28%.


Sensors ◽  
2020 ◽  
Vol 21 (1) ◽  
pp. 162
Author(s):  
Hassan Fawaz ◽  
Kinda Khawam ◽  
Samer Lahoud ◽  
Cedric Adjih ◽  
Steven Martin

LoRaWAN is a popular internet of things (IoT) solution over the unlicensed radio band. It sustains low-cost, durable, and long range IoT wireless communications. Nonetheless, with over 24 billion connected IoT devices being expected by the end of the year, and over 50 billion by 2025, the concurrent and legacy approaches to spreading factor and channel assignment in LoRaWAN networks can no longer keep up. This is exacerbated with the growing densification of IoT device deployments and, with the increasing requirements for better throughput and packet delivery ratios. In this paper, we propose a proportional fair-based joint optimal formulation for spreading factor and channel assignment in multi-operator LoRaWAN deployments. The objective of this problem is to maximize the total sum of the logarithmic normalized throughput. We split the problem into two subproblems, and propose a game theoretic approach to solving them. We prove that our games converge towards a pure Nash equilibrium and, afterwards, solve the optimization problems using both semi-distributed and completely distributed algorithms. Via simulations, we show that our algorithms greatly improve the total normalized throughput for LoRaWAN as well as the packet success rate, in comparison to the legacy approaches.


10.29007/1wpl ◽  
2018 ◽  
Author(s):  
Martin Escardo ◽  
Paulo Oliva

Using techniques from higher-type computability theory and proof theory we extend the well-known game-theoretic technique of backward induction to finite games of unbounded length. The main application is a closed formula for calculating strategy profiles in Nash equilibrium and subgame perfect equilibrium even in the case of games where the length of play is not a-priori fixed.


2017 ◽  
pp. 120-130
Author(s):  
A. Lyasko

Informal financial operations exist in the shadow of official regulation and cannot be protected by the formal legal instruments, therefore raising concerns about the enforcement of obligations taken by their participants. This paper analyzes two alternative types of auxiliary institutions, which can coordinate expectations of the members of informal value transfer systems, namely attitudes of trust and norms of social control. It offers some preliminary approaches to creating a game-theoretic model of partner interaction in the informal value transfer system. It also sheds light on the perspectives of further studies in this area of institutional economics.


2018 ◽  
pp. 114-131
Author(s):  
O. Yu. Bondarenko

his article explores theoretical and experimental approach to modeling social interactions. Communication and exchange of information with other people affect individual’s behavior in numerous areas. Generally, such influence is exerted by leaders, outstanding individuals who have a higher social status or expert knowledge. Social interactions are analyzed in the models of social learning, game theoretic models, conformity models, etc. However, there is a lack of formal models of asymmetric interactions. Such models could help elicit certain qualities characterizing higher social status and perception of status by other individuals, find the presence of leader influence and analyze its mechanism.


Sign in / Sign up

Export Citation Format

Share Document