{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T00:55:35Z","timestamp":1760230535407,"version":"build-2065373602"},"reference-count":41,"publisher":"MDPI AG","issue":"15","license":[{"start":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T00:00:00Z","timestamp":1659052800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Nature Science Foundation of China","award":["61562059","61461027","61462060"],"award-info":[{"award-number":["61562059","61461027","61462060"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In the Internet of things (IoTs), data transmission via network coding is highly vulnerable to intra-generation and inter-generation pollution attacks. To mitigate such attacks, some resource-intensive privacy-preserving schemes have been adopted in the previous literature. In order to balance resource consumption and data-privacy-preserving issues, a novel fuzzy-based privacy-preserving scheme is proposed. Our scheme is constructed on a T-S fuzzy trust theory, and network coding data streams are routed in optimal clusters formulated by a designed repeated game model to defend against pollution attacks. In particular, the security of our scheme relies on the hardness of the discrete logarithm. Then, we prove that the designed repeated game model has a subgame-perfect Nash equilibrium, and the model can improve resource utilization efficiency under the condition of data security. Simulation results show that the running time of the proposed privacy-preserving scheme is less than 1 s and the remaining energy is higher than 4 J when the length of packets is greater than 400 and the number of iterations is 100. Therefore, our scheme has higher time and energy efficiency than those of previous studies. In addition, the effective trust cluster formulation scheme (ETCFS) can formulate an optimal cluster more quickly under a kind of camouflage attack.<\/jats:p>","DOI":"10.3390\/s22155674","type":"journal-article","created":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T04:04:00Z","timestamp":1659326640000},"page":"5674","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Fuzzy-Based Privacy-Preserving Scheme of Low Consumption and High Effectiveness for IoTs: A Repeated Game Model"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4698-4888","authenticated-orcid":false,"given":"Laicheng","family":"Cao","sequence":"first","affiliation":[{"name":"School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0013-8053","authenticated-orcid":false,"given":"Min","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,7,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.comnet.2018.11.025","article-title":"Current research on Internet of Things (IoT) security: A survey","volume":"148","author":"Noor","year":"2018","journal-title":"Comput. Netw."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"8421","DOI":"10.1109\/JIOT.2019.2917763","article-title":"Trust Evaluation for Light Weight Security in Sensor Enabled Internet of Things: Game Theory Oriented Approach","volume":"6","author":"Rani","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"104238","DOI":"10.1016\/j.engappai.2021.104238","article-title":"Strategies of attack\u2013defense game for wireless sensor networks considering the effect of confidence level in fuzzy environment","volume":"102","author":"Wu","year":"2021","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2845","DOI":"10.1109\/JSEN.2021.3132682","article-title":"Energy-Saving Clustering Routing Protocol for Wireless Sensor Networks Using Fuzzy Inference","volume":"22","author":"Hou","year":"2022","journal-title":"IEEE Sens. J."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Kumar, S., Goswami, A., Gupta, R., Singh, S.P., and Lay-Ekuakille, A. (2022). A Game-Theoretic Approach for Cost-Effective Multicast Routing in the Internet of Things. IEEE Internet Things J.","DOI":"10.1109\/JIOT.2022.3164028"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"148510","DOI":"10.1109\/ACCESS.2020.3015941","article-title":"An Efficient Load Balancing Scheme of Energy Gauge Nodes to Maximize the Lifespan of Constraint Oriented Networks","volume":"8","author":"Adil","year":"2020","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/TCSS.2021.3092746","article-title":"A Security and Privacy-Preserving Approach Based on Data Disturbance for Collaborative Edge Computing in Social IoT Systems","volume":"9","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"ref_8","unstructured":"Zhao, F., Kalker, T., Medard, M., and Han, K.J. (2006, January 22\u201324). Signatures for Content Distribution with Network Coding. Proceedings of the 2006 40th Annual Conference on Information Sciences and Systems, Princeton, NJ, USA."},{"key":"ref_9","unstructured":"Peng, Z., Jiang, Y., Lin, C., Yao, H., and Shen, X. (2011, January 10\u201315). Padding for orthogonality: Efficient subspace authentication for network coding. Proceedings of the Infocom, Shanghai, China."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/CC.2013.6633749","article-title":"Secure network coding against intra\/inter-generation pollution attacks","volume":"10","author":"Guangjun","year":"2013","journal-title":"China Commun."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Li, Y., Yao, H., Chen, M., Jaggi, S., and Rosen, A. (2010, January 14\u201319). RIPPLE Authentication for Network Coding. Proceedings of the 2010 Proceedings IEEE INFOCOM, San Diego, CA, USA.","DOI":"10.1109\/INFCOM.2010.5462051"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2096","DOI":"10.1109\/TC.2012.135","article-title":"An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding","volume":"62","author":"Cheng","year":"2013","journal-title":"IEEE Trans. Comput."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1109\/TIFS.2016.2515517","article-title":"Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding","volume":"11","author":"Cheng","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"9641273","DOI":"10.1155\/2018\/9641273","article-title":"A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT","volume":"2018","author":"Li","year":"2018","journal-title":"Secur. Commun. Netw."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1109\/TMM.2015.2402516","article-title":"Simple Countermeasures to Mitigate the Effect of Pollution Attack in Network Coding-Based Peer-to-Peer Live Streaming","volume":"17","author":"Fiandrotti","year":"2015","journal-title":"IEEE Trans. Multimed."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1436","DOI":"10.1109\/TII.2017.2754579","article-title":"COPS: Cooperative Statistical Misbehavior Mitigation in Network-Coding-aided Wireless Networks","volume":"14","author":"Antonopoulos","year":"2017","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"102051","DOI":"10.1016\/j.sysarc.2021.102051","article-title":"An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification","volume":"116","author":"Lawrence","year":"2021","journal-title":"J. Syst. Archit."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Sodhro, A.H., Sennersten, C., and Ahmad, A. (2022). Towards Cognitive Authentication for Smart Healthcare Applications. Sensors, 22.","DOI":"10.3390\/s22062101"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2822","DOI":"10.1109\/TCYB.2018.2820001","article-title":"Adaptive Fault Estimation for T-S Fuzzy Interconnected Systems Based on Persistent Excitation Condition via Reference Signals","volume":"49","author":"Li","year":"2018","journal-title":"IEEE Trans. Cybern."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"9197","DOI":"10.3233\/JIFS-201633","article-title":"Trusted energy aware cluster based routing using fuzzy logic for WSN in IoT","volume":"40","author":"Rajeswari","year":"2021","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref_21","first-page":"7","article-title":"Stability Analysis of T\u2013S Fuzzy Control Systems by Using Set Theory","volume":"19","author":"Cao","year":"2012","journal-title":"J. Harbin Inst. Technol."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"2993","DOI":"10.1109\/TFUZZ.2018.2799171","article-title":"Fault Estimation and Fault-Tolerant Control for Switched Fuzzy Stochastic Systems","volume":"26","author":"Han","year":"2018","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2437","DOI":"10.1109\/TCYB.2017.2707422","article-title":"A New Sensor Fault Isolation Method for T\u2013S Fuzzy Systems","volume":"47","author":"Dong","year":"2017","journal-title":"IEEE Trans. Cybern."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1109\/TFUZZ.2012.2224872","article-title":"Fuzzy-model-based fault-tolerant design for nonlinear stochastic systems against simultaneous sensor and actuator faults","volume":"21","author":"Liu","year":"2012","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"3820","DOI":"10.1109\/TFUZZ.2018.2849702","article-title":"Quantized Stabilization for T\u2013S Fuzzy Systems With Hybrid-Triggered Mechanism and Stochastic Cyber-Attacks","volume":"26","author":"Liu","year":"2018","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1109\/TFUZZ.2019.2902105","article-title":"Input-to-State Stabilization of Interval Type-2 Fuzzy Systems Subject to Cyberattacks: An Observer-Based Adaptive Sliding Mode Approach","volume":"28","author":"Zhang","year":"2019","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/j.fss.2020.08.014","article-title":"Fault detection in finite frequency domain for T-S fuzzy systems with partly unmeasurable premise variables","volume":"421","author":"Yan","year":"2020","journal-title":"Fuzzy Sets Syst."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.3390\/s16071003","article-title":"Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey","volume":"16","author":"Mohamed","year":"2016","journal-title":"Sensors"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"4405","DOI":"10.1109\/TITS.2018.2885054","article-title":"A Game Theoretic Approach for Privacy Preserving Model in IoT-Based Transportation","volume":"20","author":"Challal","year":"2019","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1503","DOI":"10.1049\/iet-com.2016.1336","article-title":"Using Stackelberg game to enhance cognitive radio sensor networks security","volume":"11","author":"Abdalzaher","year":"2017","journal-title":"IET Commun."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Abdalzaher, M.S., Seddik, K., and Muta, O. (2017, January 3\u20136). An effective Stackelberg game for high-assurance of data trustworthiness in WSNs. Proceedings of the 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece.","DOI":"10.1109\/ISCC.2017.8024697"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Abdalzaher, M.S., Seddik, K., and Muta, O. (2017, January 3\u20136). Using repeated game for maximizing high priority data trustworthiness in Wireless Sensor Networks. Proceedings of the 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece.","DOI":"10.1109\/ISCC.2017.8024586"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/JIOT.2014.2314132","article-title":"An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications","volume":"1","author":"Duan","year":"2014","journal-title":"Internet Things J."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"846","DOI":"10.1109\/TCNS.2017.2648508","article-title":"Detection against linear deception attacks on multi-sensor remote state estimation","volume":"5","author":"Li","year":"2017","journal-title":"IEEE Trans. Control. Netw. Syst."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1663","DOI":"10.1109\/JIOT.2018.2873308","article-title":"A Game Theory Approach for Joint Access Selection and Resource Allocation in UAV Assisted IoT Communication Networks","volume":"6","author":"Yan","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"109739","DOI":"10.1109\/ACCESS.2019.2933870","article-title":"A privacy-preserving signature scheme for network coding","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Yan, K., Wang, S., Wang, S., and Liu, C. (2010, January 9\u201311). Hybrid intrusion detection system for enhancing the security of a cluster-based wireless sensor network. Proceedings of the 2010 3rd International Conference on Computer Science and Information Technology, Chengdu, China.","DOI":"10.1109\/ICCSIT.2010.5563886"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"9381","DOI":"10.1109\/TVT.2017.2701551","article-title":"An accurate security game for low-resource IoT devices","volume":"66","author":"Sedjelmaci","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"9935780","DOI":"10.1155\/2021\/9935780","article-title":"A Novel Privacy-Preserving Mobile-Coverage Scheme Based on Trustworthiness in HWSNs","volume":"2021","author":"Qi","year":"2021","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Boneh, D., Freeman, D., Katz, J., and Waters, B. (2009, January 18\u201320). Signing a linear subspace: Signature schemes for network coding. Proceedings of the International Workshop on Public Key Cryptography, Irvine, CA, USA.","DOI":"10.1007\/978-3-642-00468-1_5"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"20632","DOI":"10.1109\/ACCESS.2018.2809426","article-title":"An ID-based linearly homomorphic signature scheme and its application in blockchain","volume":"6","author":"Lin","year":"2018","journal-title":"IEEE Access"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/15\/5674\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:58:51Z","timestamp":1760140731000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/15\/5674"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,29]]},"references-count":41,"journal-issue":{"issue":"15","published-online":{"date-parts":[[2022,8]]}},"alternative-id":["s22155674"],"URL":"https:\/\/doi.org\/10.3390\/s22155674","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2022,7,29]]}}}