{"id":"https://openalex.org/W7084997786","doi":"https://doi.org/10.1109/tce.2025.3618653","title":"Enhancing IoT Security in SDN Environments With Game Theory and Reinforcement Learning-Driven Dynamic Resource Allocation","display_name":"Enhancing IoT Security in SDN Environments With Game Theory and Reinforcement Learning-Driven Dynamic Resource Allocation","publication_year":2025,"publication_date":"2025-10-07","ids":{"openalex":"https://openalex.org/W7084997786","doi":"https://doi.org/10.1109/tce.2025.3618653"},"language":"en","primary_location":{"id":"doi:10.1109/tce.2025.3618653","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3618653","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Panduranga Ravi Teja","orcid":"https://orcid.org/0009-0003-8084-5926"},"institutions":[{"id":"https://openalex.org/I5847235","display_name":"University of Petroleum and Energy Studies","ror":"https://ror.org/04q2jes40","country_code":"IN","type":"education","lineage":["https://openalex.org/I5847235"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Panduranga Ravi Teja","raw_affiliation_strings":["School of Computer Science, UPES, Dehradun, India"],"raw_orcid":"https://orcid.org/0009-0003-8084-5926","affiliations":[{"raw_affiliation_string":"School of Computer Science, UPES, Dehradun, India","institution_ids":["https://openalex.org/I5847235"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Anish Kumar Vishwakarma","orcid":"https://orcid.org/0000-0003-4881-3409"},"institutions":[{"id":"https://openalex.org/I5847235","display_name":"University of Petroleum and Energy Studies","ror":"https://ror.org/04q2jes40","country_code":"IN","type":"education","lineage":["https://openalex.org/I5847235"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Anish Kumar Vishwakarma","raw_affiliation_strings":["School of Computer Science, UPES, Dehradun, India"],"raw_orcid":"https://orcid.org/0000-0003-4881-3409","affiliations":[{"raw_affiliation_string":"School of Computer Science, UPES, Dehradun, India","institution_ids":["https://openalex.org/I5847235"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Gaseb Alotibi","orcid":"https://orcid.org/0000-0001-8575-9654"},"institutions":[{"id":"https://openalex.org/I72264486","display_name":"University of Tabuk","ror":"https://ror.org/04yej8x59","country_code":"SA","type":"education","lineage":["https://openalex.org/I72264486"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Gaseb Alotibi","raw_affiliation_strings":["Computer Science Department, Applied College, University of Tabuk, Tabuk, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0001-8575-9654","affiliations":[{"raw_affiliation_string":"Computer Science Department, Applied College, University of Tabuk, Tabuk, Saudi Arabia","institution_ids":["https://openalex.org/I72264486"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Awad Albalawi","orcid":null},"institutions":[{"id":"https://openalex.org/I72264486","display_name":"University of Tabuk","ror":"https://ror.org/04yej8x59","country_code":"SA","type":"education","lineage":["https://openalex.org/I72264486"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Awad Albalawi","raw_affiliation_strings":["Department of Management and Information Systems, Al Wajeh University College, University of Tabuk, Tabuk, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Management and Information Systems, Al Wajeh University College, University of Tabuk, Tabuk, Saudi Arabia","institution_ids":["https://openalex.org/I72264486"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Bikash Chandra Sahana","orcid":"https://orcid.org/0000-0002-0369-7718"},"institutions":[{"id":"https://openalex.org/I11793825","display_name":"National Institute of Technology Patna","ror":"https://ror.org/056wyhh33","country_code":"IN","type":"education","lineage":["https://openalex.org/I11793825","https://openalex.org/I4210152752"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Bikash Chandra Sahana","raw_affiliation_strings":["Department of ECE, National Institute of Technology Patna, Patna, India"],"raw_orcid":"https://orcid.org/0000-0002-0369-7718","affiliations":[{"raw_affiliation_string":"Department of ECE, National Institute of Technology Patna, Patna, India","institution_ids":["https://openalex.org/I11793825"]}]},{"author_position":"last","author":{"id":null,"display_name":"Rakesh Ranjan","orcid":"https://orcid.org/0000-0002-0089-1734"},"institutions":[{"id":"https://openalex.org/I5847235","display_name":"University of Petroleum and Energy Studies","ror":"https://ror.org/04q2jes40","country_code":"IN","type":"education","lineage":["https://openalex.org/I5847235"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rakesh Ranjan","raw_affiliation_strings":["School of Computer Science, UPES, Dehradun, India"],"raw_orcid":"https://orcid.org/0000-0002-0089-1734","affiliations":[{"raw_affiliation_string":"School of Computer Science, UPES, Dehradun, India","institution_ids":["https://openalex.org/I5847235"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I5847235"],"apc_list":null,"apc_paid":null,"fwci":0.3224,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.62446249,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"71","issue":"4","first_page":"11513","last_page":"11521"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T11626","display_name":"Metalloenzymes and iron-sulfur proteins","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/2105","display_name":"Renewable Energy, Sustainability and the Environment"},"field":{"id":"https://openalex.org/fields/21","display_name":"Energy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11626","display_name":"Metalloenzymes and iron-sulfur proteins","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/2105","display_name":"Renewable Energy, Sustainability and the Environment"},"field":{"id":"https://openalex.org/fields/21","display_name":"Energy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10092","display_name":"Organometallic Complex Synthesis and Catalysis","score":0.004600000102072954,"subfield":{"id":"https://openalex.org/subfields/1605","display_name":"Organic Chemistry"},"field":{"id":"https://openalex.org/fields/16","display_name":"Chemistry"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11281","display_name":"Asymmetric Hydrogenation and Catalysis","score":0.002400000113993883,"subfield":{"id":"https://openalex.org/subfields/1604","display_name":"Inorganic Chemistry"},"field":{"id":"https://openalex.org/fields/16","display_name":"Chemistry"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.8241000175476074},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.600600004196167},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5547999739646912},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5422999858856201},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.4970000088214874},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.48190000653266907},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.4429999887943268},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.3962000012397766},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.38609999418258667}],"concepts":[{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.8241000175476074},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7526999711990356},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.600600004196167},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5547999739646912},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5422999858856201},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.4970000088214874},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.48190000653266907},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.4429999887943268},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4343000054359436},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4124000072479248},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.3962000012397766},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.38609999418258667},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38589999079704285},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.38429999351501465},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.37770000100135803},{"id":"https://openalex.org/C2779391423","wikidata":"https://www.wikidata.org/wiki/Q17009728","display_name":"Dynamic pricing","level":2,"score":0.3774000108242035},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.35600000619888306},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.3513000011444092},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.33469998836517334},{"id":"https://openalex.org/C73795354","wikidata":"https://www.wikidata.org/wiki/Q287618","display_name":"Sequential game","level":3,"score":0.3181999921798706},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.2919999957084656},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.2800000011920929},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.2777000069618225},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.27619999647140503},{"id":"https://openalex.org/C46637626","wikidata":"https://www.wikidata.org/wiki/Q6693015","display_name":"Low latency (capital markets)","level":2,"score":0.27570000290870667},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.26669999957084656},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.2597000002861023},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.25699999928474426},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.25690001249313354},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.2558000087738037}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3618653","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3618653","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W3021211886","https://openalex.org/W3049551041","https://openalex.org/W3094198577","https://openalex.org/W3113240487","https://openalex.org/W3195258212","https://openalex.org/W4200282099","https://openalex.org/W4289950777","https://openalex.org/W4313577129","https://openalex.org/W4323338365","https://openalex.org/W4384945968","https://openalex.org/W4388040583","https://openalex.org/W4391164288","https://openalex.org/W4392309162","https://openalex.org/W4401211368","https://openalex.org/W4401508866","https://openalex.org/W4402125489","https://openalex.org/W4402205672","https://openalex.org/W4402473782","https://openalex.org/W4408703451","https://openalex.org/W4410427595","https://openalex.org/W4413288621"],"related_works":[],"abstract_inverted_index":{"The":[0,31,82,142],"Internet":[1],"of":[2,78,115],"Things":[3],"(IoT)":[4],"is":[5],"expanding":[6],"rapidly":[7],"as":[8],"more":[9],"consumer":[10,164],"devices":[11],"become":[12],"connected.":[13],"This":[14],"expansion":[15],"presents":[16,34],"significant":[17],"security":[18,95,150,158],"challenges":[19],"for":[20,160],"Software-Defined":[21],"Networking":[22],"(SDN),":[23],"where":[24],"static":[25],"defense":[26],"mechanisms":[27],"are":[28,71],"often":[29],"insufficient.":[30],"proposed":[32,117,143],"work":[33,144],"a":[35,120,154],"novel":[36],"framework":[37,159],"that":[38],"enhances":[39],"Intrusion":[40],"Detection":[41],"Systems":[42],"(IDS)":[43],"by":[44,102],"combining":[45],"dynamic":[46],"resource":[47],"allocation":[48],"with":[49,125,131],"game":[50],"theory":[51],"and":[52,67,96,136,151,156],"Reinforcement":[53],"Learning":[54],"(RL).":[55],"In":[56],"this":[57],"framework,":[58],"the":[59,63,68,75,113,116,146],"strategic":[60],"interactions":[61],"among":[62],"IDS,":[64],"potential":[65],"attackers,":[66],"SDN":[69,162],"controller":[70,83],"modeled":[72],"to":[73,90,106,139],"reflect":[74],"complex":[76],"dynamics":[77],"consumer-centric":[79],"IoT":[80],"environments.":[81,165],"allocates":[84],"resources":[85],"in":[86,134,163],"real":[87],"time,":[88],"adapting":[89],"network":[91],"demands":[92],"while":[93],"maintaining":[94],"performance.":[97],"RL":[98],"optimizes":[99],"these":[100],"decisions":[101],"enabling":[103],"continuous":[104],"adaptation":[105],"evolving":[107],"attack":[108,122],"patterns.":[109],"Simulation":[110],"results":[111],"validate":[112],"effectiveness":[114],"approach,":[118],"achieving":[119],"98.2%":[121],"detection":[123],"rate":[124],"only":[126],"1.8%":[127],"false":[128],"positives,":[129],"along":[130],"measurable":[132],"improvements":[133],"throughput":[135],"latency":[137],"compared":[138],"baseline":[140],"methods.":[141],"resolves":[145],"key":[147],"trade-off":[148],"between":[149],"efficiency,":[152],"delivering":[153],"robust":[155],"efficient":[157],"IoT-enabled":[161]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
