当前位置: X-MOL 学术Wirel. Commun. Mob. Comput. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Intrusion Detection into Cloud-Fog-Based IoT Networks Using Game Theory
Wireless Communications and Mobile Computing ( IF 2.146 ) Pub Date : 2020-11-16 , DOI: 10.1155/2020/8819545
Poria Pirozmand 1 , Mohsen Angoraj Ghafary 2 , Safieh Siadat 2 , Jiankang Ren 3
Affiliation  

The Internet of Things is an emerging technology that integrates the Internet and physical smart objects. This technology currently is used in many areas of human life, including education, agriculture, medicine, military and industrial processes, and trade. Integrating real-world objects with the Internet can pose security threats to many of our day-to-day activities. Intrusion detection systems (IDS) can be used in this technology as one of the security methods. In intrusion detection systems, early and correct detection (with high accuracy) of intrusions is considered very important. In this research, game theory is used to develop the performance of intrusion detection systems. In the proposed method, the attacker infiltration mode and the behavior of the intrusion detection system as a two-player and nonparticipatory dynamic game are completely analyzed and Nash equilibrium solution is used to create specific subgames. During the simulation performed using MATLAB software, various parameters were examined using the definitions of game theory and Nash equilibrium to extract the parameters that had the most accurate detection results. The results obtained from the simulation of the proposed method showed that the use of intrusion detection systems in the Internet of Things based on cloud-fog can be very effective in identifying attacks with the least amount of errors in this network.

中文翻译:

利用博弈论对基于云雾的物联网进行入侵检测

物联网是一种新兴技术,将互联网和物理智能对象集成在一起。目前,该技术已用于人类生活的许多领域,包括教育,农业,医学,军事和工业过程以及贸易。将现实世界的对象与Internet集成可能会对我们的许多日常活动构成安​​全威胁。入侵检测系统(IDS)可以在此技术中用作安全方法之一。在入侵检测系统中,尽早正确地检测入侵(具有高精度)被认为非常重要。在这项研究中,使用博弈论来开发入侵检测系统的性能。在建议的方法中,完整分析了攻击者的渗透模式和入侵检测系统作为两人且无参与的动态博弈的行为,并使用纳什均衡解来创建特定的子博弈。在使用MATLAB软件进行的仿真过程中,使用博弈论和纳什均衡的定义检查了各种参数,以提取出具有最准确检测结果的参数。仿真结果表明,在基于云雾的物联网中使用入侵检测系统可以非常有效地识别出该网络中错误最少的攻击。使用博弈论和纳什均衡的定义检查各种参数,以提取具有最准确检测结果的参数。仿真结果表明,在基于云雾的物联网中使用入侵检测系统可以非常有效地识别出该网络中错误最少的攻击。使用博弈论和纳什均衡的定义检查各种参数,以提取具有最准确检测结果的参数。仿真结果表明,在基于云雾的物联网中使用入侵检测系统可以非常有效地识别出该网络中错误最少的攻击。
更新日期:2020-11-16
down
wechat
bug