Incentive Jamming-Based Secure Routing in Decentralized Internet of Things

Yang Xu, Jia Liu*, Yulong Shen, Jun Liu, Xiaohong Jiang, Tarik Taleb

*Corresponding author for this work

    Research output: Contribution to journalArticleScientificpeer-review

    43 Citations (Scopus)
    180 Downloads (Pure)

    Abstract

    This article focuses on the secure routing problem in the decentralized Internet of Things (IoT). We consider a typical decentralized IoT scenario composed of peer legitimate devices, unauthorized devices (eavesdroppers), and selfish helper jamming devices (jammers), and propose a novel incentive jamming-based secure routing scheme. For a pair of source and destination, we first provide theoretical modeling to reveal how the transmission security performance of a given route is related to the jamming power of jammers in the IoT. Then, we design an incentive mechanism with which the source pays some rewards to stimulate the artificial jamming among selfish jammers, and also develop a two-stage Stackelberg game framework to determine the optimal source rewards and jamming power. Finally, with the help of the theoretical modeling as well as the source rewards and jamming power setting results, we formulate a shortest weighted path-finding problem to identify the optimal route for secure data delivery between the source-destination pair, which can be solved by employing the Dijkstra's or Bellman-Ford algorithm. We prove that the proposed routing scheme is individually rational, stable, distributed, and computationally efficient. Simulation and numerical results are provided to demonstrate the performance of our routing scheme.

    Original languageEnglish
    Article number9199881
    Pages (from-to)3000-3013
    Number of pages14
    JournalIEEE Internet of Things Journal
    Volume8
    Issue number4
    DOIs
    Publication statusPublished - 15 Feb 2021
    MoE publication typeA1 Journal article-refereed

    Keywords

    • Incentive mechanism
    • Internet of Things (IoT) security
    • jamming
    • physical layer security (PLS)
    • routing

    Fingerprint

    Dive into the research topics of 'Incentive Jamming-Based Secure Routing in Decentralized Internet of Things'. Together they form a unique fingerprint.

    Cite this