Skip to Content
SensorsSensors
  • Article
  • Open Access

29 July 2022

Fuzzy-Based Privacy-Preserving Scheme of Low Consumption and High Effectiveness for IoTs: A Repeated Game Model

and
School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China
*
Author to whom correspondence should be addressed.

Abstract

In the Internet of things (IoTs), data transmission via network coding is highly vulnerable to intra-generation and inter-generation pollution attacks. To mitigate such attacks, some resource-intensive privacy-preserving schemes have been adopted in the previous literature. In order to balance resource consumption and data-privacy-preserving issues, a novel fuzzy-based privacy-preserving scheme is proposed. Our scheme is constructed on a T-S fuzzy trust theory, and network coding data streams are routed in optimal clusters formulated by a designed repeated game model to defend against pollution attacks. In particular, the security of our scheme relies on the hardness of the discrete logarithm. Then, we prove that the designed repeated game model has a subgame-perfect Nash equilibrium, and the model can improve resource utilization efficiency under the condition of data security. Simulation results show that the running time of the proposed privacy-preserving scheme is less than 1 s and the remaining energy is higher than 4 J when the length of packets is greater than 400 and the number of iterations is 100. Therefore, our scheme has higher time and energy efficiency than those of previous studies. In addition, the effective trust cluster formulation scheme (ETCFS) can formulate an optimal cluster more quickly under a kind of camouflage attack.

1. Introduction

The Internet of things (IoTs) refers to the networked connection of all daily objects, which can play an eminent role in the application of services based on the Internet of things, such as intelligent fire protection, industrial monitoring, intelligence collection, renewable energy adaptation, and so on, greatly simplifying and bringing convenience to life [1,2]. However, IoT is vulnerable to various network attacks, which can destroy the process of data transmission and increase energy consumption. Therefore, in the previous literature, many privacy-preserving schemes have been proposed to protect the security of data. Furthermore, network coding technology has been introduced into IoTs for protecting the privacy of data, where the sensor data is divided into multiple generations. Specifically, the multiple packets in any generation are signed by an identifier. With this kind of packet mixing, characteristic of the network coding, an internal or external enemy can inject some fake or modified packets into the information flow, making it more vulnerable to contamination attack, so that IoT devices cannot identify the correct and trusted data. In addition, the polluted data will spread widely. In response to network-coding-enabled IoT attack scenarios, we consider two typical types of pollution attacks. We firstly consider intra-generation attacks, where the attacker modifies the innocent packets in multiple generations. Secondly, we consider inter-generation attacks, where the attacker forges the malicious packets into valid packets in one generation. In contrast with previous defense works, we introduce a T-S fuzzy trust evaluation model to defend against malicious IoT devices and construct an energy-efficient privacy-preserving framework. In the T-S fuzzy trust evaluation model, limited bandwidth and power consumption are considered. Meanwhile, our T-S fuzzy trust model can obtain a more accurate trust evaluation value under the premise of ensuring the required stability of IoTs. Referring to [3,4,5], we design a repeated game model to perfect the energy-efficient privacy-preserving scheme, where the subgame Nash equilibrium of the repeated game model can balance the data security and network resource consumption [6]. The contributions of this research are given as follows:
  • Firstly, we propose a novel privacy-preserving scheme based on T-S fuzzy trust theory to mitigate the pollution attacks, in which the security is proved according to the hardness of the discrete logarithm.
  • Secondly, we construct a repeated game model to formulate the optimal cluster, in which subgame-perfect Nash equilibrium is achieved, and the energy efficiency is higher than in previous research under a kind of camouflage attack.
  • Finally, we prove the correctness of our privacy-preserving scheme through strict mathematical derivation and verify the performance superiority of our scheme by simulation.
The organization of this paper is as follows. In Section 2, we present the previous theories, including privacy-preserving schemes, T-S fuzzy technology, and the game theory on which this research is based. In addition, we present a variety of improved models adapted to coding trust in IoTs and discuss the shortcomings of these works in Section 3. After that, we propose the energy-efficient privacy-preserving scheme based on the T-S fuzzy trust model and repeated game model in Section 4. Then, the simulation results and discussion are provided in Section 5, proving the correctness and accuracy of our proposed model. Finally, we draw our conclusions in Section 6.

3. System Model

3.1. Network Model

In this paper, a linear network coding enabling IoT is considered, in which an IoT device sends a batch of sequenced messages to multiple target nodes. The delivered messages are divided into M generations, where each message can be regarded as an n-dimensional vector over the finite field F p . Here, p is a pre-determined prime integer. Meanwhile, each generation contains m native messages. Without loss of generality, the i-th generation is labeled by an ρ -bit binary string I d i { 0 , 1 } ρ , where i { 1 , , M } and ρ log 2 M . Let Γ = { I d 1 , , I d M } represent the set of generation identifiers. Then, the set of native messages belonging to the i-th generation is defined as { D i , 1 , , D i , m } , where
D i , j = ( D i , j ( 1 ) , , D i , j ( n ) ) F p n , j { 1 , , m }
In this network model, the trust T between IoT devices is considered. The trusted routing device set in the next round of data transmission is selected by the trust value generated in the previous round of data transmission.

3.1.1. Trust Encoding at Data

For the j-th native messages D i , j in the i-th generation, a t-dimensional unit vector p j , with the j-th entry being the measurable trustworthiness T i , j for IoT devices and the other being 0, is appended into the native messages. Then, the corresponding augmented block c i , j is given as follows:
c i , j = ( p j , D i , j ) = ( 0 , , 0 j 1 , T i , j , 0 , , 0 t j t , D i , j ) F p t + n , j { 1 , , t } ,
according to the bi-linear map polynomial-time algorithm, the corresponding encrypted block is given by
E i , j = E n c r y p t ( h , I d i , c i , j ) = ( 0 , , 0 j 1 , e T i , j , 0 , , 0 t j t , D i , j ) ,
where h is the parameter in the bi-liner map between two multiplicative cyclic groups, and I d i is the number of IoT devices.

3.1.2. Trust Decoding for Receivers

When the network controller receives the encoding data, the data block is first decrypted and stored in the buffer. After receiving m non-linearly correlated data blocks, the network controller can recover the native messages by Gaussian elimination. Then, an ACK message will be fed back to the sender to confirm the transmission of the next generation of messages.

3.2. Adversary Model

We assume that there exists an attacker attempting to launch attacks in this network. The types of attacks are listed as follows:
  • Pollution attack: Attackers attempt to launch malicious data injection attacks to disrupt the data transmission. Then, data integrity and privacy are compromised.
  • Camouflage attack: Attackers deceive their surrounding trust evaluation devices by pretending to be the normal devices, which leads to the wrong trust measurement results.

3.3. T-S Fuzzy Trust Model

Here, the data-privacy-preserving model between IoT devices is introduced. However, we should also consider routing security issues in data transmission. With the development of trust evaluation technology in routing security, Li et al. [34] studied the trust routing model instead of the traditional cryptographic scheme to defend against malicious nodes in IoTs. In practical applications of IoTs, the degree of trustworthiness between IoT devices is usually complex and variable. In this section, we reasonably assume a T-S fuzzy model to mitigate the influence of subjective factors in trust evaluation. The T-S fuzzy model is defined as follows:
Definition 1.
Suppose that the domain X = { x 1 , x 2 , , x n } is a non-empty set, and x i ( i = 1 , 2 , , n ) is an element in X . For x i X , there is a mapping relation as follows: μ T : X [ 0 , 1 ] , x i μ T ( x i ) [ 0 , 1 ] ; then, the set T = { ( x 1 μ T ( x 1 ) ) , ( x 2 μ T ( x 2 ) ) , , ( x n μ T ( x n ) ) } is defined as a fuzzy subset ( x i X ) on X μ T ( x i ) , which is called the membership degree of x i to fuzzy subset T , and the mapping μ T is called the membership function of fuzzy subset T .
In Definition 1, X = { x 1 , x 2 , , x n } is the set of IoT devices. Here, we chose the communication trust T c and energy trust T e as the fuzzy characters z k to objectively describe the trustworthiness of IoT devices. Therefore, the vector v ( x j i ) = v j i = ( μ 1 i , μ 2 i , , μ m i ) formed by the membership degree of each subject competing for these finite fuzzy parameters z k is used as the evaluation trust vector of μ j i [ 0 , 1 ] , ( j = 1 , 2 , , l ) for x i , while v j i is the evaluation trust vector of node j to node i , and μ k i ( k = 1 , 2 , , m ) is the membership degree of node i ( x i ) to fuzzy parameter z k evaluated by node j . Then, the definition of the fuzzy rule is given as follows:
Definition 2.
IF v 1 i is X μ T ( 1 , x i ) and v 2 i is X μ T ( 2 , x i ) , , v j i is X μ T ( j , x i ) , THEN
x ˙ ( t ) = A i 1 i 2 i p x ( t ) + B i 1 i 2 i p μ ( t ) + a 1 ( t ) + B w n ( t ) y j 1 ( t ) = C j 2 x ( t ) , j 1 = 1 , , m h y j 2 ( t ) = C j 2 x ( t ) + a 2 j 2 ( t ) , j 2 = m h + 1 , , m ,
Where x ( t ) R n is the network statement, μ ( t ) R l denotes the map input, n ( t ) is the bias of noise, a 1 ( t ) R l is the attack intensity in network, a 2 ( t ) R l is the transmission bias for indirect trust evaluation, and y j 1 ( t ) R and y j 2 ( t ) R are respectively the output of direct and indirect trustworthiness in the T-S fuzzy model. In addition, m is the number of IoT devices within two hops of node x i , and h is the number of IoT devices that can communicate directly with node x i . Then, C is the measurable trustworthiness including communication trust C 1 and energy trust C 2 , while A i 1 i 2 i p , B i 1 i 2 i p , and B w are known matrices with suitable dimensions. Then, the y ( t ) and C can be rewritten as follows,
y ( t ) = y 1 ( t ) y 2 ( t ) , C = C 1 C 2 ,
Then, a singleton fuzzifier inference method with center average defuzzifiers is applied to rewrite the T-S fuzzy model as follows:
x ˙ ( t ) = 1 i 1 = 1 r 1 i 2 = 1 r 2 i p = 1 r p j = 1 p X μ T ( 1 , x i ) × i 1 = 1 r 1 i 2 = 1 r 2 i p = 1 r p j = 1 p X μ T ( 1 , x i ) × A i 1 p x ( t ) + B i 1 p μ ( t ) + a 1 ( t ) + B w n y ( t ) = C x ( t ) + a 2 ( t ) .
Therefore, we can obtain the objective T-S fuzzy set T = { y ( 1 ) , y ( 2 ) , , y ( t ) } , 1 t n .

4. The Energy-Efficient Privacy-Preserving Scheme Based on T-S Fuzzy Trust Model and Repeated Game Model

In this section, we introduce the framework of our privacy-preserving scheme. Figure 1 shows the relationship between fuzzy trust evaluation, the repeated game model, and the trust privacy-preserving scheme, in which the repeated game helps the network controller formulate the optimal cluster to send the data to the trust privacy-preserving scheme. The game model can obtain a balance between network performance and resource consumption so that we can ensure maximum network performance by consuming fewer resources. Here, network performance indicators include defense attack capability, energy consumption, and so on. Explanations of this can be found in [35]. Therefore, the IoT data can be safely transmitted with low energy consumption.
Figure 1. The framework of the fuzzy-based privacy-preserving scheme based on the repeated game. The devices in the solid line frame are common IoT devices in the cluster, and the dotted line is the routing device that guarantees data uploading.

4.1. A Privacy-Preserving Scheme Based on T-S Fuzzy Trust Model

In this subsection, we propose a privacy-preserving scheme based on the T-S fuzzy model, which can protect data privacy against pollution attacks in coding IoT networks. Firstly, the scheme can be formulated as four steps (Encrypt, Sign, Verify, Decrypt). The details of those steps are given as follows:
  • Encrypt (h, T , I d i c ). According to Definition 1, the trust set T contains 0 and 1. When the trustworthiness of IoT devices is 1, the coding data will be received. Then, the source is generated as a series of t-bit binary strings s j j = 1 t . A keyed pseudo-random function f : { 0 , 1 } * × { 0 , 1 } * × K F p is applied to generate the encryption matrix
    E c , T = c e i , 1 c e i , t .
    Therefore, we rewrite Equation (3) as follows,
    E i , j = E n c r y p t ( h , T , I d i , c i , j ) = ( E c , T , D i , j ) .
  • Sign ( s k , I d i , c ). Suppose a full-domain hash function H : { 0 , 1 } * F p as a random oracle. The signature of source c is given by
    Δ = ζ i = 1 t + n c i s k i + i = 1 t c i H I d i s k t + n + 1 ,
    where s k is the signature key such that s k = s k 1 , , s k t + n + 1 , s k i R F p . Then, the data blocks c i i 1 σ and Δ i i 1 σ of the i-th generation are combined as follows:
    Θ i = i = 1 σ T i c i , i = 1 σ Δ T i , I d i .
  • Verify ( p k , c , I d i , Δ ). When the public key p k , a data block c , a generation I d i , and the signature Δ are given, the compared computation is given by
    η 1 = e ( Δ , o )
    and
    η 2 = e ( ζ , i = 1 t + n h i c i · i = 1 t h t + n + 1 H ( I d i ) c i ) .
    where o is the generator of G , p k = ( ζ , o , G , G D , h ) , and μ R G { 1 } . G and G D are two multiplicative cyclic groups, which satisfy e : G × G G D in a bilinear map, and h : = o s k 1 , , o s k t + n + 1 . When η 1 = η 2 , the verification is successful; otherwise, it fails.
  • Decrypt (h, T , I d i c ). When the secret key k and the pseudo-random function f are given, the decryption matrix can be computed as follows:
    DE c , T = c e i , 1 1 c e i , t 1

4.2. The Correctness and Security Analysis of Our Privacy-Preserving Sheme

In this subsection, we provide the correctness analysis of our privacy-preserving scheme with two theorems and proofs.
Theorem 1.
Given an augmented data block c i including coding vector p and native message D , Decrypt ( T , I d i Encrypt ( h , T , I d i , c ) ) = c .
Proof of Theorem 1.
According to Equation (8), the encrypted augmented data block c E is given as follows:
c E = E c , T · ( p , D ) = ( E c , T · p , E c , T · D ) ,
Then, according to our scheme, the decryption matrix can be expressed as follows:
c D = D E c , T · c E = D E c , T · ( E c , T · p , E c , T · D ) = c e 1 c e 1 · c e c e · p , c e c e · D = ( p , D ) = c
Therefore, The proof is completed. □
Theorem 2.
For any generation I d i and c F p t + n ,Verify( p k , c , I d i , Δ) is successful.
Proof of Theorem 2.
According to Equations (9)–(12), we have
η 1 = e ( Δ , o ) = e ( ζ i = 1 t + n c i s k i + i = 1 t c i H I d i s k t + n + 1 , o ) = e ( ζ , o ) i = 1 t + n c i s k i + i = 1 t c i H I d i s k t + n + 1
and
η 2 = e ( ζ , i = 1 t + n h i c i · i 1 t h t + n + 1 H ( I d i ) c i ) = e ( ζ , i = 1 t + n o s k i c i · i 1 t o s k t + n + 1 H ( I d i ) c i ) = e ( ζ , o i = 1 t + n c i s k + i = 1 t c i H I d i s k t + n + 1 ) = e ( ζ , o ) i = 1 t + n c i s k i + i = 1 t c i H I d i s k t + n + 1
Therefore, η 1 = η 2 can be held for any generation I d i and c F p t + n . □
The security of our privacy-preserving scheme relies on the hardness of the discrete logarithm over G , where for any x Z p * and given ( g , g x ) , x cannot be computed in any polynomial algorithm [36].

4.3. The Optimization Cluster Formulation Scheme Based on Repeated Game Model

After considering the data privacy and the trustworthiness of IoT devices, an effective trust cluster formulation scheme (ETCFS) is designed based on the repeated game for preserving the network stability and conserving the power consumption due to packet re-transmission. Many studies in the literature have reported that the repeated game model can solve the balance problem between network performance and resource consumption.

4.3.1. Repeated Game Model

In this sub-subsection, we first present a repeated game model based on the trustworthiness to elect the trust route IoT devices. Then, the subgame-perfect Nash equilibrium is given. Furthermore, the repeated game model is formally defined as follows:
(a)
Attackers A r = { A 1 , A 2 , , A r } and defenders D r = { D 1 , D 2 , , D r } are the cooperating parties in the repeated game, where r N + .
(b)
Given the utility function U A r and U D r , and the loss discount δ , the average utility is lim r j = 1 r U A r and lim r j = 1 r U D r , where r is number of iterations according to the lifetime of the network. Furthermore, the total payoff for both parties are respectively as follows:
U A = U A 1 + δ U A 2 + δ 2 U A 3 + + δ r 1 U A r = r = 1 r δ r 1 U A r ,
U D = U D 1 + δ U D 2 + δ 2 U D 3 + + δ r 1 U D r = r = 1 r δ r 1 U D r ,
where the weight of the current and future payoff is inconsistent, and the future payoff is generally less than the weight of the current payoff.
(c)
The proposed repeated game model is finite due to the power of the entire network being predetermined. Therefore, the finite repeated game can be solved by the backward method, which basically converges to the sub-game equilibrium.

4.3.2. The Solution of Repeated Game Model for Optimizing Cluster Formulation

In the IoT, the various IoT devices including pads, phones, and monitors are members of the cluster (CM). The network controller hopes that the IoT devices with higher energy and trustworthiness become cluster heads (CH). Furthermore, the energy level E of IoT devices is divided into two subsets, that is, E h and E l based on the remaining energy, where E h is the set of nodes having energy more than or equal to the threshold E t h , and E l is lower than E t h . Each IoT device in the cluster can select CH or CM according to the two strategies S = C H , C M . In addition, the payoff of players can be found in Table 1.
Table 1. The different payoffs under different behaviors of players.
Meanwhile, the network controller is a defender, and other IoT devices may be normal or malicious, so the utility function U A r and U D r in the iteration r can be defined as follows:
(a)
Suppose that all members of E h and E l IoT devices become CH with no CM, and the payoffs of defender and attacker are decreasing. At this time, the cluster is illegal. Therefore, the utility of defender and attacker in the iteration r can be expressed as
U D , T r = α T h 2 θ C h U A , T r = α T l ,
where α and θ are the weights of the reward and penalty, α + θ = 1 , α , θ [ 0 , 1 ] . T h and T l are the trustworthiness of low-energy and high-energy IoT devices. Meanwhile, C h and C l are the communication costs of high-energy and low-energy IoT devices.
(b)
Suppose that E h and E l IoT devices respectively become CH and CM; the payoff of the defender is the highest, and that of the attacker is the lowest. Therefore, the utility of the defender and attacker in the iteration r can be expressed as
U D , T r = 2 α T h θ C h U A , T r = α T l 2 θ C l ,
(c)
Suppose that E l and E h IoT devices respectively become CH and CM, and the payoffs of the attacker are the highest. However, the CH with E l can also help the network controller formulate a legal cluster. Therefore, the weight of reward and penalty are predefined, and the utility of defender and attacker in the iteration r are given by
U D , T r = T h θ C h U A , T r = 2 α T l θ C l ,
(d)
Suppose that E l and E h IoT devices have become CM with no CH; then, the cluster is illicit. Therefore, the respective utilities of the defender and attacker in the iteration r are given by
U D , T r = α T h 2 θ C h U A , T r = α T l θ C l ,
Then, we achieve subgame-perfect Nash equilibrium ( ψ * , ξ * ) = ( 1 , 0 ) according to the evolutionarily stable strategy (ESS) [35]. The details can be seen in Appendix A.

5. Simulation Result and Discussion

This section shows the simulation result of the energy-efficient privacy-preserving scheme and ETCFS scheme in IoTs. We use the OMNET++ simulator to construct the network model with malicious activity and compute the trustworthiness of each IoT device. The details of parameters used to configure the network model are given in Table 2. Then, we compare the ETCFS scheme with state-of-the-art TDDG [33], HIDS [37], and LHIDS [38] to show the effectiveness of the above schemes. In addition, the maximum running iteration of the simulation is 100.
Table 2. The simulation network parameters.

5.1. Simulation Parameter Setting

In this subsection, we define the metrics, including trustworthiness, the running time of the privacy-preserving scheme, and the lifetime of the IoT, to discuss the performance of the privacy-preserving scheme and ETCFS scheme.
(a)
The trustworthiness of each IoT device consists of direct trust T d i r e c t and indirect trust T i n d i r e c t . The total trust is defined as follows:
T t o t a l = λ 1 T d i r e c t + λ 2 T i n d i r e c t
where λ 1 and λ 2 are the weight parameters of direct and indirect trust, which satisfy λ 1 + λ 2 = 1 . The trust evaluation method including direct and indirect trust can be found in [39].
(b)
The running time of the privacy-preserving scheme reflects the effectiveness of our scheme, which can run faster than previous schemes [40,41], while satisfying the demand for data privacy.
(c)
The lifetime of the IoT reflects lower resource consumption than in other literature. Furthermore, the lifetime of IoTs with our repeated game model is the highest.

5.2. Performance Comparison

In this subsection, we compare the performance of the proposed privacy-preserving and ETCFS scheme with the state-of-the-art methods under the preset network parameters.
(a)
Energy Efficiency with T-S Fuzzy Trust Model: In Figure 2 and Figure 3, the energy consumption of our T-S fuzzy trust model is compared with NCS0-, NCS1-, and ID-based schemes. The result of the simulation shows that our scheme has the lowest energy consumption. As the number of attack nodes in the IoT increases, the energy required for trust evaluation gradually increases. However, the energy consumption of our scheme has been in a stable state, and there is no significant increase. Meanwhile, our scheme has the highest remaining energy than other schemes when the i t e r a t i o n = [30–100].
Figure 2. The energy consumption with T-S fuzzy trust model.
Figure 3. The remaining energy for the T-S fuzzy trust model with different iterations.
(b)
Time Efficiency of Our Privacy-Preserving Scheme: In Figure 4, the runtime of our trust-based privacy-preserving scheme is the lowest compared to the other three methods. In addition, our scheme has higher stability according to the magnitude of running time variation.
Figure 4. The running time of signature, encryption, and verification in different schemes against packet length.
(c)
Time Consumption with Cluster Formulation: In Figure 5 and Figure 6, we compare the time consumption when the hop limit is 1 and 2 under camouflage attack. Based on theoretically verifying that the proposed repeated game has effective game equilibrium, we also find our game-based cluster formulation has the lowest time consumption.
Figure 5. The time consumption with cluster formulation under different schemes in camouflage attack (hop limit = 1).
Figure 6. The time consumption with cluster formulation under different schemes in camouflage attack (hop limit = 2).

6. Conclusions

This paper investigates a novel fuzzy-based privacy-preserving scheme to defend against pollution attacks in coding IoTs and constructs a repeated game model to balance data security and energy consumption. We propose a T-S fuzzy trust evaluation method to replace the traditional cryptography scheme and reduce the energy consumption in IoTs. Then, we introduce the trust-based privacy-preserving scheme, in which the security relies on the hardness of the discrete logarithm. Finally, an optimal cluster formulation based on the repeated game model is proposed to balance the data security and energy consumption. The result shows that the cluster formulation can mitigate the camouflage attack. In addition, our scheme only considers two types of attacks in IoTs. Therefore, we will consider more kinds of attacks on IoT data, and construct more effective privacy-preserving schemes in future work.

Author Contributions

Conceptualization, L.C. and M.Z.; methodology, L.C.; software, M.Z.; validation, L.C. and M.Z.; formal analysis, M.Z.; investigation, L.C.; resources, M.Z.; data curation, L.C.; writing—original draft preparation, M.Z.; writing—review and editing, L.C.; visualization, M.Z.; supervision, L.C.; project administration, M.Z.; funding acquisition, L.C. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Nature Science Foundation of China under (grant no. 61562059, 61461027, 61462060).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Data sharing not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Appendix A.1. The Optimizing Solution of Defenders

U D E h CH = r = 1 r δ r 1 [ ξ ( α T h 2 θ C h ) + ( 1 ξ ) ( 2 α T h θ C h ) ] U D E h CM = r = 1 r δ r 1 [ ξ ( T h θ C h ) + ( 1 ξ ) ( α T h 2 θ C h ) ] U D E l CH = r = 1 r δ r 1 [ ξ ( α T h 2 θ C h ) + ( 1 ξ ) ( T h θ C h ) ] U D E l CM = r = 1 r δ r 1 [ ξ ( 2 α T h θ C h ) + ( 1 ξ ) ( α T h 2 θ C h ) ] ,
U D ¯ = ψ U D E h CH + ( 1 ψ ) U D E h CM + ( 1 ψ ) U D E l CH + ψ U D E l CM = r = 1 r δ r 1 ψ ξ ( α T h 2 θ C h ) + ψ ( 1 ξ ) ( 2 α T h θ C h ) + ( 1 ψ ) ξ ( T h θ C h ) + ( 1 ψ ) ( 1 ξ ) ( α T h 2 θ C h ) + ( 1 ψ ) ξ ( α T h 2 θ C h ) + ( 1 ψ ) ( 1 ξ ) ( T h θ C h ) + ψ ξ ( 2 α T h θ C h ) + ψ ( 1 ξ ) ( α T h 2 θ C h ) = r = 1 r δ r 1 [ ( α T h 2 θ C h ) + ( 2 α T h θ C h ) ψ + ( T h θ C h ) ( 1 ψ ) ] = r = 1 r δ r 1 [ ( 1 + 2 ψ ) α T h 3 θ C h + T h ( 1 ψ ) ]
d ψ d r = ψ ( U D E h CH + U D E l CM U D ¯ ) = ψ r = 1 r δ r 1 ξ ( α T h 2 θ C h ) + ( 1 ξ ) ( 2 α T h θ C h ) + ξ ( 2 α T h θ C h ) + ( 1 ξ ) ( α T h 2 θ C h ) [ ( 1 + 2 ψ ) α T h 3 θ C h + T h ( 1 ψ ) ] = ψ r = 1 r δ r 1 [ ( 2 2 ψ ) α T h ( 1 ψ ) T h ) ] = r = 1 r δ r 1 ψ ( 1 ψ ) ( 2 α T h T h )
when d ψ d r = 0 , the player D achieves a stable state. Therefore, when ψ * = 0 or 1, the player D has the highest payoff.

Appendix A.2. The Optimizing Solution of Attackers

Similarly, the expression of player A is obtained as follows:
U A E h CH = r = 1 r δ r 1 [ ψ ( α T l ) + ( 1 ψ ) ( α T l 2 θ C l ) ] U A E h CM = r = 1 r δ r 1 [ ψ ( 2 α T l θ C l ) + ( 1 ψ ) ( α T l θ C l ) ] U A E l CH = r = 1 r δ r 1 [ ψ ( α T l ) + ( 1 ψ ) ( 2 α T l θ C l ) ] U A E l CM = r = 1 r δ r 1 [ ψ ( α T l 2 θ C l ) + ( 1 ψ ) ( α T l θ C l ) ]
U A ¯ = ξ U A E h CH + ( 1 ξ ) U A E h CM + ( 1 ξ ) U A E l CH + ξ U A E l CM = r = 1 r δ r 1 ξ ( α T l 2 θ C l ) + ( 1 ξ ) ( 2 α T l θ C l ) + ( 1 ψ ) ( α T l θ C l ) + ψ ( α T l ) = r = 1 r δ r 1 [ ( 3 ξ ) α T l + ( ψ ξ 2 ) θ C l ]
d ξ d r = r = 1 r δ r 1 ξ ( U A E h CM + U A E l CH U A ¯ ) = r = 1 r δ r 1 ξ ψ ( 2 α T l θ C l ) + ( 1 ψ ) ( α T l θ C l ) + ψ ( α T l ) + ( 1 ψ ) ( 2 α T l θ C l ) ( 3 ξ ) α T l ( ψ ξ 2 ) θ C l = r = 1 r δ r 1 ξ [ ( ψ + ξ ) α T l + ξ θ C l ]
When the ψ * = 0 ; the ξ * = 0 , relatively; the ψ * = 1 ; the ξ * = 0 ; and the optimizing payoffs of defender and attacker can be achieved. Furthermore, according to the reality, the subgame-perfect nash equilibrium is obtained as ( ψ * , ξ * ) = ( 1 , 0 ) .

References

  1. Noor, M.B.M.; Hassan, W.H. Current research on Internet of Things (IoT) security: A survey. Comput. Netw. 2018, 148, 283–294. [Google Scholar] [CrossRef]
  2. Rani, R.; Kumar, S.; Dohare, U. Trust Evaluation for Light Weight Security in Sensor Enabled Internet of Things: Game Theory Oriented Approach. IEEE Internet Things J. 2019, 6, 8421–8432. [Google Scholar] [CrossRef]
  3. Wu, Y.; Kang, B.; Wu, H. Strategies of attack–defense game for wireless sensor networks considering the effect of confidence level in fuzzy environment. Eng. Appl. Artif. Intell. 2021, 102, 104238. [Google Scholar] [CrossRef]
  4. Hou, J.; Qiao, J.; Han, X. Energy-Saving Clustering Routing Protocol for Wireless Sensor Networks Using Fuzzy Inference. IEEE Sens. J. 2022, 22, 2845–2857. [Google Scholar] [CrossRef]
  5. Kumar, S.; Goswami, A.; Gupta, R.; Singh, S.P.; Lay-Ekuakille, A. A Game-Theoretic Approach for Cost-Effective Multicast Routing in the Internet of Things. IEEE Internet Things J. 2022. [Google Scholar] [CrossRef]
  6. Adil, M.; Khan, R.; Almaiah, M.A.; Binsawad, M.; Ali, J.; Saaidah, A.A.; Ta, Q.T.H. An Efficient Load Balancing Scheme of Energy Gauge Nodes to Maximize the Lifespan of Constraint Oriented Networks. IEEE Access 2020, 8, 148510–148527. [Google Scholar] [CrossRef]
  7. Zhang, P.; Wang, Y.; Kumar, N.; Jiang, C.; Shi, G. A Security and Privacy-Preserving Approach Based on Data Disturbance for Collaborative Edge Computing in Social IoT Systems. IEEE Trans. Comput. Soc. Syst. 2021, 9, 97–108. [Google Scholar] [CrossRef]
  8. Zhao, F.; Kalker, T.; Medard, M.; Han, K.J. Signatures for Content Distribution with Network Coding. In Proceedings of the 2006 40th Annual Conference on Information Sciences and Systems, Princeton, NJ, USA, 22–24 March 2006. [Google Scholar]
  9. Peng, Z.; Jiang, Y.; Lin, C.; Yao, H.; Shen, X. Padding for orthogonality: Efficient subspace authentication for network coding. In Proceedings of the Infocom, Shanghai, China, 10–15 April 2011. [Google Scholar]
  10. Guangjun, L.; Bin, W. Secure network coding against intra/inter-generation pollution attacks. China Commun. 2013, 10, 100–110. [Google Scholar] [CrossRef]
  11. Li, Y.; Yao, H.; Chen, M.; Jaggi, S.; Rosen, A. RIPPLE Authentication for Network Coding. In Proceedings of the 2010 Proceedings IEEE INFOCOM, San Diego, CA, USA, 14–19 March 2010; pp. 1–9. [Google Scholar] [CrossRef]
  12. Cheng, C.; Jiang, T. An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding. IEEE Trans. Comput. 2013, 62, 2096–2100. [Google Scholar] [CrossRef]
  13. Cheng, C.; Lee, J.; Jiang, T.; Takagi, T. Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding. IEEE Trans. Inf. Forensics Secur. 2016, 11, 993–1002. [Google Scholar] [CrossRef]
  14. Li, T.; Chen, W.; Tang, Y.; Yan, H. A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT. Secur. Commun. Netw. 2018, 2018, 9641273. [Google Scholar] [CrossRef]
  15. Fiandrotti, A.; Gaeta, R.; Grangetto, M. Simple Countermeasures to Mitigate the Effect of Pollution Attack in Network Coding-Based Peer-to-Peer Live Streaming. IEEE Trans. Multimed. 2015, 17, 562–573. [Google Scholar] [CrossRef] [Green Version]
  16. Antonopoulos, A.; Verikoukis, C. COPS: Cooperative Statistical Misbehavior Mitigation in Network-Coding-aided Wireless Networks. IEEE Trans. Ind. Inform. 2017, 14, 1436–1446. [Google Scholar] [CrossRef]
  17. Lawrence, T.; Li, F.; Ali, I.; Kpiebaareh, M.Y.; Christopher, T. An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification. J. Syst. Archit. 2021, 116, 102051. [Google Scholar] [CrossRef]
  18. Sodhro, A.H.; Sennersten, C.; Ahmad, A. Towards Cognitive Authentication for Smart Healthcare Applications. Sensors 2022, 22, 2101. [Google Scholar] [CrossRef]
  19. Li, X.J.; Yan, J.J.; Yang, G.H. Adaptive Fault Estimation for T-S Fuzzy Interconnected Systems Based on Persistent Excitation Condition via Reference Signals. IEEE Trans. Cybern. 2018, 49, 2822–2834. [Google Scholar] [CrossRef]
  20. Rajeswari, A.R.; Kulothungan, K.; Ganapathy, S.; Kannan, A. Trusted energy aware cluster based routing using fuzzy logic for WSN in IoT. J. Intell. Fuzzy Syst. 2021, 40, 9197–9211. [Google Scholar] [CrossRef]
  21. Cao, K.-R.; Liu, J.-Q.; Huang, X.-L.; Gao, X.-Z.; Ban, X.-J. Stability Analysis of T–S Fuzzy Control Systems by Using Set Theory. J. Harbin Inst. Technol. 2012, 19, 7–11. [Google Scholar]
  22. Han, J.; Zhang, H.; Wang, Y.; Zhang, K. Fault Estimation and Fault-Tolerant Control for Switched Fuzzy Stochastic Systems. IEEE Trans. Fuzzy Syst. 2018, 26, 2993–3003. [Google Scholar] [CrossRef]
  23. Dong, J.; Wu, Y.; Yang, G.H. A New Sensor Fault Isolation Method for T–S Fuzzy Systems. IEEE Trans. Cybern. 2017, 47, 2437–2447. [Google Scholar] [CrossRef]
  24. Liu, M.; Cao, X.; Shi, P. Fuzzy-model-based fault-tolerant design for nonlinear stochastic systems against simultaneous sensor and actuator faults. IEEE Trans. Fuzzy Syst. 2012, 21, 789–799. [Google Scholar] [CrossRef]
  25. Liu, J.; Wei, L.; Xie, X.; Tian, E.; Fei, S. Quantized Stabilization for T–S Fuzzy Systems With Hybrid-Triggered Mechanism and Stochastic Cyber-Attacks. IEEE Trans. Fuzzy Syst. 2018, 26, 3820–3834. [Google Scholar] [CrossRef]
  26. Zhang, Z.; Niu, Y.; Song, J. Input-to-State Stabilization of Interval Type-2 Fuzzy Systems Subject to Cyberattacks: An Observer-Based Adaptive Sliding Mode Approach. IEEE Trans. Fuzzy Syst. 2019, 28, 190–203. [Google Scholar] [CrossRef]
  27. Yan, J.J.; Yang, G.H.; Li, X.J. Fault detection in finite frequency domain for T-S fuzzy systems with partly unmeasurable premise variables. Fuzzy Sets Syst. 2020, 421, 158–177. [Google Scholar] [CrossRef]
  28. Mohamed, A.; Karim, S.; Maha, E.; Osamu, M.; Hiroshi, F.; Adel, A.R. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey. Sensors 2016, 16, 1003. [Google Scholar]
  29. Riahi Sfar, A.; Challal, Y.; Moyal, P.; Natalizio, E. A Game Theoretic Approach for Privacy Preserving Model in IoT-Based Transportation. IEEE Trans. Intell. Transp. Syst. 2019, 20, 4405–4414. [Google Scholar] [CrossRef]
  30. Abdalzaher, M.S.; Seddik, K.; Muta, O.; Mohamed. Using Stackelberg game to enhance cognitive radio sensor networks security. IET Commun. 2017, 11, 1503–1511. [Google Scholar] [CrossRef]
  31. Abdalzaher, M.S.; Seddik, K.; Muta, O. An effective Stackelberg game for high-assurance of data trustworthiness in WSNs. In Proceedings of the 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece, 3–6 July 2017. [Google Scholar]
  32. Abdalzaher, M.S.; Seddik, K.; Muta, O. Using repeated game for maximizing high priority data trustworthiness in Wireless Sensor Networks. In Proceedings of the 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece, 3–6 July 2017. [Google Scholar]
  33. Duan, J.; Gao, D.; Yang, D.; Foh, C.H.; Chen, H.H. An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications. Internet Things J. 2014, 1, 58–69. [Google Scholar] [CrossRef]
  34. Li, Y.; Shi, L.; Chen, T. Detection against linear deception attacks on multi-sensor remote state estimation. IEEE Trans. Control. Netw. Syst. 2017, 5, 846–856. [Google Scholar] [CrossRef]
  35. Yan, S.; Peng, M.; Cao, X. A Game Theory Approach for Joint Access Selection and Resource Allocation in UAV Assisted IoT Communication Networks. IEEE Internet Things J. 2019, 6, 1663–1674. [Google Scholar] [CrossRef]
  36. Liu, X.; Huang, J.; Wu, Y.; Zong, G. A privacy-preserving signature scheme for network coding. IEEE Access 2019, 7, 109739–109750. [Google Scholar] [CrossRef]
  37. Yan, K.; Wang, S.; Wang, S.; Liu, C. Hybrid intrusion detection system for enhancing the security of a cluster-based wireless sensor network. In Proceedings of the 2010 3rd International Conference on Computer Science and Information Technology, Chengdu, China, 9–11 July 2010; Volume 1, pp. 114–118. [Google Scholar]
  38. Sedjelmaci, H.; Senouci, S.M.; Taleb, T. An accurate security game for low-resource IoT devices. IEEE Trans. Veh. Technol. 2017, 66, 9381–9393. [Google Scholar] [CrossRef]
  39. Qi, C.; Huang, J.; Wang, B.; Wang, H. A Novel Privacy-Preserving Mobile-Coverage Scheme Based on Trustworthiness in HWSNs. Wirel. Commun. Mob. Comput. 2021, 2021, 9935780. [Google Scholar] [CrossRef]
  40. Boneh, D.; Freeman, D.; Katz, J.; Waters, B. Signing a linear subspace: Signature schemes for network coding. In Proceedings of the International Workshop on Public Key Cryptography, Irvine, CA, USA, 18–20 March 2009; pp. 68–87. [Google Scholar]
  41. Lin, Q.; Yan, H.; Huang, Z.; Chen, W.; Shen, J.; Tang, Y. An ID-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access 2018, 6, 20632–20640. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.