ABSTRACT

The future of connectivity is being transformed in technology and scale to unprecedented levels. Driven by business cases focusing on consumer-centrism and data-driven applications, this innovation is capitalizing in part on large scale Internet of Things (IoT) deployments. While IoTs are a new technology in concept, the types and numbers of IoT devices involved in the current and future economy are becoming a marker of progress toward the Next-Gen digital economy.

When considering the role of IoT in future innovation, special attention is warranted, specifically considering connectivity and security challenges. Addressing those challenges is critical, particularly considering IoTs limited processing capacity and energy efficiency requirements. A more complex picture emerges when we consider heterogeneous networks with massive IoT deployments and wireless channel sharing. In such environments, some IoT devices could be exploited and act maliciously to negatively impact the remaining IoT devices. This chapter considers a heterogeneous communication environment with IoT devices transmitting over a wireless channel in the presence of adversarial IoT devices inducing jamming interference attacks.

We adopt a game-theoretic framework and utilize an iterated game formulation to develop a physical-layer security approach aiming to ensure information availability for an IoT device undergoing active interference attacks. Interactions of a selected representative IoT device against adversary devices are investigated to study the impact of intentional interference on signal quality, and to quantify a metric of IoT information availability. This is considered in conjunction with the need for more efficient and scalable scheduling approaches for large scale IoT deployments. To alleviate the scheduling overhead, a game-theoretic transmission strategy for uncoordinated IoT channel access is developed to achieve the target security metric while conserving the IoT device's limited resources. Simulation results of the proposed approach help illustrate how a select IoT device can achieve its desired security performance over time, through the proposed transmission strategies.