当前位置: X-MOL 学术Trans. Emerg. Telecommun. Technol. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
ANGUISH: Security attack in narrowband-Internet of Things (NB-IoT) using game theory and hardware analysis
Transactions on Emerging Telecommunications Technologies ( IF 2.5 ) Pub Date : 2020-07-02 , DOI: 10.1002/ett.3987
Vinod Kumar 1 , Rakesh Kumar Jha 2 , Sanjeev Jain 3
Affiliation  

In recent years, the Internet of Things (IoT) plays a vital role in our daily life. IoT is dominating in many areas like industries, health care, smart home, social network, defense sector, and the education sector. In the last couple of years, users are facing different challenges like security issues related to social network and defense sector. In this article, our prime focus is to secure the social and defense network associated with narrowband-Internet of Things. This article proposes the artificial intelligence (AI)-based defense security attacks using unmanned aerial vehicle (UAV). In the first part of the article, we have proposed attack modeling on smart home scenario and finalize the critical parameter for performance analysis. In the next section, the performance analysis based on game theory (GT) (AI based) approach is attained, using different techniques like nash equilibrium and Prisoner's dilemma. In the last section, detailed hardware analysis has been carried out for analyzing attack in real-time scenario and is illustrated with the help of step-by-step process. Our proposed model proves that UAV-based router can spoof by the intruder with the probability of 0.4 using GT and hardware analysis.

中文翻译:

痛苦:使用博弈论和硬件分析的窄带物联网 (NB-IoT) 安全攻击

近年来,物联网 (IoT) 在我们的日常生活中发挥着至关重要的作用。物联网在许多领域占据主导地位,如工业、医疗保健、智能家居、社交网络、国防和教育部门。在过去的几年中,用户面临着不同的挑战,例如与社交网络和国防部门相关的安全问题。在本文中,我们的主要重点是保护与窄带物联网相关的社交和防御网络。本文提出了使用无人机 (UAV) 基于人工智能 (AI) 的防御安全攻击。在文章的第一部分,我们提出了针对智能家居场景的攻击建模,并最终确定了性能分析的关键参数。在下一节中,获得了基于博弈论(GT)(基于人工智能)方法的性能分析,使用不同的技术,如纳什均衡和囚徒困境。在最后一节中,对实时场景中的攻击进行了详细的硬件分析,并在分步过程的帮助下进行了说明。我们提出的模型证明了基于无人机的路由器可以使用 GT 和硬件分析以 0.4 的概率被入侵者欺骗。
更新日期:2020-07-02
down
wechat
bug