• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Wang, J. (Wang, J..) [1] (Scholars:王俊) | Pei, H. (Pei, H..) [2] | Wang, R. (Wang, R..) [3] | Lin, R. (Lin, R..) [4] (Scholars:林瑞全) | Fang, Z. (Fang, Z..) [5] (Scholars:方舟) | Shu, F. (Shu, F..) [6]

Indexed by:

Scopus

Abstract:

Cognitive Industrial Internet of Things (CIIoT) permits Secondary Users (SUs) to use the spectrum bands owned by Primary Users (PUs) opportunistically. However, in the absence of the PUs, the selfish SUs could mislead the normal SUs to leave the spectrum bands by initiating a Primary User Emulation Attack (PUEA). In addition, the application of Energy Harvesting (EH) technology can exacerbate the threat of security. Because the energy cost of initiating a PUEA is offset to some extent by EH technology which can proactively replenish the energy of the selfish nodes. Thus, EH technology can increase the motivation of the selfish SUs to initiate a PUEA. To address the higher motivation of the selfish SUs attacking in CIIoT scenario where the EH technology is applied, in this paper, an EH-PUEA system model is first established to study the security countermeasures in this severe scenario of PUEA problems. Next, a new reward and punishment defense management mechanism is proposed, and then the dynamics of the selfish SUs and the normal SUs in a CIIoT network are studied based on Evolutionary Game Theory (EGT), and the punishment parameter is adjusted according to the dynamics of the selfish SUs to reduce the proportion of the selfish SUs’ group choosing an attack strategy, so as to increase the throughput achieved by the normal SUs’ group. Finally, the simulation results show that the proposed mechanism is superior to the conventional mechanism in terms of throughput achieved by the normal SUs’ group in CIIoT scenario with EH technology applied. IEEE

Keyword:

Cognitive Industrial Internet of Things (CIIoT) Energy harvesting energy harvesting (EH) evolutionary game theory (EGT) Games Game theory Industrial Internet of Things Jamming primary user emulation attack (PUEA) Security Throughput

Community:

  • [ 1 ] [Wang J.]College of Electrical Engineering and Automation, Fuzhou University, Fuzhou, China
  • [ 2 ] [Pei H.]College of Electrical Engineering and Automation, Fuzhou University, Fuzhou, China
  • [ 3 ] [Wang R.]College of Electrical Engineering and Automation, Fuzhou University, Fuzhou, China
  • [ 4 ] [Lin R.]College of Electrical Engineering and Automation, Fuzhou University, Fuzhou, China
  • [ 5 ] [Fang Z.]College of Electrical Engineering and Automation, Fuzhou University, Fuzhou, China
  • [ 6 ] [Shu F.]School of Information and Communication Engineering, Hainan University, Haikou, China

Reprint 's Address:

Email:

Show more details

Related Keywords:

Source :

IEEE Transactions on Network and Service Management

ISSN: 1932-4537

Year: 2024

Issue: 4

Volume: 21

Page: 1-1

4 . 7 0 0

JCR@2023

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Online/Total:56/10043995
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1