ABSTRACT

By representing the intricate connections of the IoT as a graph, we can investigate the network vulnerability of the IoT to various attack schemes. Three defense schemes are investigated to counter fatal attacks: the intrinsic topological defense scheme, the fusion-based defense scheme, and the sequential defense scheme. Furthermore, by formulating the interplay between an adversary and a defender as a two-player zero-sum game, in which they aim to maximize their own payoffs in terms of network connectivity, we can use the game equilibrium to evaluate network robustness. A sequential defense scheme is also introduced to defend against fatal attacks in the IoT. The results are demonstrated via realworld network data.