Incentive Jamming-Based Secure Routing in Decentralized Internet of Things
نویسندگان
چکیده
This article focuses on the secure routing problem in decentralized Internet of Things (IoT). We consider a typical IoT scenario composed peer legitimate devices, unauthorized devices (eavesdroppers), and selfish helper jamming (jammers), propose novel incentive jamming-based scheme. For pair source destination, we first provide theoretical modeling to reveal how transmission security performance given route is related power jammers IoT. Then, design an mechanism with which pays some rewards stimulate artificial among jammers, also develop two-stage Stackelberg game framework determine optimal power. Finally, help as well setting results, formulate shortest weighted path-finding identify for data delivery between source-destination pair, can be solved by employing Dijkstra's or Bellman-Ford algorithm. prove that proposed scheme individually rational, stable, distributed, computationally efficient. Simulation numerical results are provided demonstrate our
منابع مشابه
Energy Efficient Multi Path Routing Protocol in Internet of Things
Internet of things (IoT) is a network with a wide range of smart and physical objects and gadgets that can exchange information with each other. IOT introduces a variety of services that human life is dependent on its secure and accessible activities. These networks face numerous problems in terms of energy consumption and reliable communication to send the correct data. Moreover, the character...
متن کاملimprovement of Location-based Algorithm in the Internet of Things
Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...
متن کاملResearch of routing protocol in RFID-based internet of things
Under the environment of the Internet of Things, The applications of RFID and WSN have a trend of mutual infiltration. RFID reader with the function of WSN is called RFID node. On one hand, it can recognize the tags within its communication range, on the other hand, with the help of WSN it can coordinate with its neighbor nodes through wireless handshaking. In order to make an efficient datum c...
متن کاملEnergy-Efficient Content-Based Routing in Internet of Things
The convergence of the Internet, sensor networks, and Radio Frequency Identification (RFID) systems has ushered to the concept of Internet of Things (IoT) which is capable of connecting daily things, making them smart through sensing, reasoning, and cooperating with other things. Further, RFID technology enables tracking of an object and assigning it a unique ID. IoT has the potential for a wid...
متن کاملBayesian Modeling Based on Data from the Internet of Things
The Internet of Things is suggested as the upcoming revolution in the Information and communication technology due to its very high capability of making various businesses and industries more productive and efficient. This productivity comes from the emergence of innovation and the introduction of new capabilities for businesses. Different industries have shown varying reactions to IOT, but wha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Internet of Things Journal
سال: 2021
ISSN: ['2372-2541', '2327-4662']
DOI: https://doi.org/10.1109/jiot.2020.3025151