
94% of researchers rate our articles as excellent or good
Learn more about the work of our research integrity team to safeguard the quality of each article we publish.
Find out more
ORIGINAL RESEARCH article
Front. Phys.
Sec. Social Physics
Volume 13 - 2025 | doi: 10.3389/fphy.2025.1584958
This article is part of the Research Topic Real-World Applications of Game Theory and Optimization, Volume II View all 10 articles
The final, formatted version of the article will be published soon.
You have multiple emails registered with Frontiers:
Please enter your email address:
If you already have an account, please login
You don't have a Frontiers account ? You can register here
The widespread integration of Internet of Things (IoT) technology in the military domain has brought significant attention to the security concerns surrounding the Internet of Battlefield Things(IoBT). Given the limited communication resources within IoBT, there is a growing focus on detecting network security without interrupting normal network operations. Topology serves as a crucial foundation for the detection of network security in IoBT, facilitating the discovery of abnormal devices and the detection of unauthorized access. Security detection based on topology can effectively enhance the information security and operational levels of IoBT. This paper utilizes matching analysis of time series for information exchanged between neighboring nodes and implements IoBT topology inference based on flow rate estimation, and a threshold parameter adaptive adjustment strategy is innovatively proposed to improve the accuracy of topology inference. The non-cooperative inference method proposed in this paper enables network topology inference without network access and information parsing, exhibiting strong generality and independence from the discovery of acknowledgment frames during information exchange processes. The simulation results demonstrate the feasibility and superiority of this method.
Keywords: Internet of Battlefield Things(IoBT), Non-cooperative, topology inference, Flow rate estimation, Network Security
Received: 28 Feb 2025; Accepted: 20 Mar 2025.
Copyright: © 2025 Huang, Dong, Niu, Peng and Chen. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence:
Rongcheng Dong, National University of Defense Technology, HE FEI, China
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.
Research integrity at Frontiers
Learn more about the work of our research integrity team to safeguard the quality of each article we publish.