Incentive Jamming-Based Secure Routing in Decentralized Internet of Things

نویسندگان

چکیده

This article focuses on the secure routing problem in decentralized Internet of Things (IoT). We consider a typical IoT scenario composed peer legitimate devices, unauthorized devices (eavesdroppers), and selfish helper jamming (jammers), propose novel incentive jamming-based scheme. For pair source destination, we first provide theoretical modeling to reveal how transmission security performance given route is related power jammers IoT. Then, design an mechanism with which pays some rewards stimulate artificial among jammers, also develop two-stage Stackelberg game framework determine optimal power. Finally, help as well setting results, formulate shortest weighted path-finding identify for data delivery between source-destination pair, can be solved by employing Dijkstra's or Bellman-Ford algorithm. prove that proposed scheme individually rational, stable, distributed, computationally efficient. Simulation numerical results are provided demonstrate our

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Energy Efficient Multi Path Routing Protocol in Internet of Things

Internet of things (IoT) is a network with a wide range of smart and physical objects and gadgets that can exchange information with each other. IOT introduces a variety of services that human life is dependent on its secure and accessible activities. These networks face numerous problems in terms of energy consumption and reliable communication to send the correct data. Moreover, the character...

متن کامل

improvement of Location-based Algorithm in the Internet of Things

Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...

متن کامل

Research of routing protocol in RFID-based internet of things

Under the environment of the Internet of Things, The applications of RFID and WSN have a trend of mutual infiltration. RFID reader with the function of WSN is called RFID node. On one hand, it can recognize the tags within its communication range, on the other hand, with the help of WSN it can coordinate with its neighbor nodes through wireless handshaking. In order to make an efficient datum c...

متن کامل

Energy-Efficient Content-Based Routing in Internet of Things

The convergence of the Internet, sensor networks, and Radio Frequency Identification (RFID) systems has ushered to the concept of Internet of Things (IoT) which is capable of connecting daily things, making them smart through sensing, reasoning, and cooperating with other things. Further, RFID technology enables tracking of an object and assigning it a unique ID. IoT has the potential for a wid...

متن کامل

Bayesian Modeling Based on Data from the Internet of Things

The Internet of Things is suggested as the upcoming revolution in the Information and communication technology due to its very high capability of making various businesses and industries more productive and efficient. This productivity comes from the emergence of innovation and the introduction of new capabilities for businesses. Different industries have shown varying reactions to IOT, but wha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Internet of Things Journal

سال: 2021

ISSN: ['2372-2541', '2327-4662']

DOI: https://doi.org/10.1109/jiot.2020.3025151