Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things

Quang Duy La, Tony Q.S. Quek, Jemin Lee, Shi Jin, Hongbo Zhu

Research output: Contribution to journalArticlepeer-review

95 Citations (Scopus)


In modern days, breakthroughs in information and communications technologies lead to more and more devices of every imaginable type being connected to the Internet. This also strengthens the need for protection against cyber-Attacks, as virtually any devices with a wireless connection could be vulnerable to malicious hacking attempts. Meanwhile, honeypot-based deception mechanism has been considered as one of the methods to ensure security for modern networks in the Internet of Things (IoT). In this paper, we address the problem of defending against attacks in honeypot-enabled networks by looking at a game-Theoretic model of deception involving an attacker and a defender. The attacker may try to deceive the defender by employing different types of attacks ranging from a suspicious to a seemingly normal activity, while the defender in turn can make use of honeypots as a tool of deception to trap attackers. The problem is modeled as a Bayesian game of incomplete information, where equilibria are identified for both the one-shot game and the repeated game versions. Our results show that there is a threshold for the frequency of active attackers, above which both players will take deceptive actions and below which the defender can mix up his/her strategy while keeping the attacker's success rate low.

Original languageEnglish
Article number7442780
Pages (from-to)1025-1035
Number of pages11
JournalIEEE Internet of Things Journal
Issue number6
Publication statusPublished - 2016 Dec

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Information Systems
  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications


Dive into the research topics of 'Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things'. Together they form a unique fingerprint.

Cite this