An Intelligent Security Approach using Game Theory to Detect DoS Attacks In IoT
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 9
Abstract
The Internet of Things (IoT) is a new concept in the world of Information and Communication Technology (ICT). The structure of this global network is highly interconnected and presents a new category of challenges from the security, trust, and privacy perspectives. The data transfer problems through the Denial-of-Service (DoS) attacks simply occur in this network and lead to service slow down or system crash. At the present time, traditional techniques are being widely used to confront the denial-of-service attacks in the Internet of Things and unfortunately, smart techniques have been less studied and exploited. In this research, a security solution on the basis of game theory is proposed to detect the denial-of-service attacks and prevent the problems in the services of the network of the Internet of Things. In order to scrutinize the performance of the suggested method in the network, this method was simulated using the NS2 simulator. The simulation results confirmed that the game-theory strategies in the proposed method outperformed the existing methods. Furthermore, in order to verify the acquired findings, a comparative evaluation was exhibited according to the three factors of operational throughput, latency, and energy consumption.
Authors and Affiliations
Farzaneh Yazdankhah, Ali Reza Honarvar
Distance Prediction for Commercial Serial Crime Cases Using Time Delay Neural Networks
The prediction of the next serial criminal time is important in the field of criminology for preventing the recurring actions of serial criminals. In the associated dynamic systems, one of the main sources of instability...
Data Mining in Education
Data mining techniques are used to extract useful knowledge from raw data. The extracted knowledge is valuable and significantly affects the decision maker. Educational data mining (EDM) is a method for extracting useful...
Comparative Study for Software Project Management Approaches and Change Management in the Project Monitoring & Controlling
A software project encounters many changes during the software development life cycle. The key challenge is to control these changes and manage their impact on the project plan, budget, and implementation schedules. A we...
Impact of ICT on Students’ Academic Performance: Applying Association Rule Mining and Structured Equation Modeling
Information and communication technology (ICT) plays a significant role in university students’ academic performance. This research examined the effect of ICT on the students’ academic performance at different private un...
Satellite Image Enhancement using Wavelet-domain based on Singular Value Decomposition
Improving the quality of satellite images has been considered an essential field of research in remote sensing and computer vision. There are currently numerous techniques and algorithms used to achieve enhanced performa...