{"title":"自主分布式物联网系统的攻击防御策略分析","authors":"H. Al-Hamadi, I. Chen, Ding-Chau Wang","doi":"10.1109/isads45777.2019.9155617","DOIUrl":null,"url":null,"abstract":"We develop an analytical model to capture the interplay of attack-defense strategies of an autonomous distributed Internet of Things system (ADIoTS). Every node participates in intrusion detection of a target node of the same type, thus necessitating that every good node plays a set of defense strategies and every bad node plays a set of attack strategies for achieving their own goals. The end product is a methodology for identifying the best defense strategies to maximize the system lifetime.","PeriodicalId":331050,"journal":{"name":"2019 IEEE 14th International Symposium on Autonomous Decentralized System (ISADS)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Analysis of Attack-Defense Strategies in Autonomous Distributed IoT Systems\",\"authors\":\"H. Al-Hamadi, I. Chen, Ding-Chau Wang\",\"doi\":\"10.1109/isads45777.2019.9155617\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We develop an analytical model to capture the interplay of attack-defense strategies of an autonomous distributed Internet of Things system (ADIoTS). Every node participates in intrusion detection of a target node of the same type, thus necessitating that every good node plays a set of defense strategies and every bad node plays a set of attack strategies for achieving their own goals. The end product is a methodology for identifying the best defense strategies to maximize the system lifetime.\",\"PeriodicalId\":331050,\"journal\":{\"name\":\"2019 IEEE 14th International Symposium on Autonomous Decentralized System (ISADS)\",\"volume\":\"120 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 14th International Symposium on Autonomous Decentralized System (ISADS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/isads45777.2019.9155617\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 14th International Symposium on Autonomous Decentralized System (ISADS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/isads45777.2019.9155617","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of Attack-Defense Strategies in Autonomous Distributed IoT Systems
We develop an analytical model to capture the interplay of attack-defense strategies of an autonomous distributed Internet of Things system (ADIoTS). Every node participates in intrusion detection of a target node of the same type, thus necessitating that every good node plays a set of defense strategies and every bad node plays a set of attack strategies for achieving their own goals. The end product is a methodology for identifying the best defense strategies to maximize the system lifetime.