Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/3324320.3324413acmotherconferencesArticle/Chapter ViewAbstractPublication PagesewsnConference Proceedingsconference-collections
Article

Research on Game Model of Wireless Sensor Network Intrusion Detection

Published: 15 March 2019 Publication History

Abstract

Wireless sensor network is widely used in commercial, agricultural, medical and military fields because of its characters of low energetic consumption, flexible configuration, and convenient deployment. However, due to its high requirement to energetic consumption and distribution, wireless sensor network is more vulnerable to be attacked. Therefore, it is more important to integrate intrusion detection system to ensure the node and network security in the wireless sensor network. Based on Game Theory, this paper models the attack and defense process in wireless sensor networks, and improves the Game Model for the intruder’s diversified attack methods, so that it can accurately determine the best defensive strategy of the intrusion detection mechanism, to reduce energy consumption and improve detection efficiency; in addition, we also introduce Agent technology to increase the scalability of the system, to improve the problems caused by single point failure, and improve the fault tolerance of the system. Experiments show that the proposed method has a good effect on the scalability and intrusion detection of wireless sensor networks.

References

[1]
Hai-Fei Si, Zhong Yang, and Jun Wang. Review on research status and application of wireless sensor networks {j}. Journal of Mechanical & Electrical Engineering, 1:006, 2011.
[2]
Zhi-ling Ren, Guang-quan Zhang, Dong Lin, Zhong-bao Zhang, and Xing Zhao. Review on application of wsns. Transducer and Microsystem Technologies, 37:1–3, 2018.
[3]
Murali Kodialam and TV Lakshman. Detecting network intrusions via sampling: a game theoretic approach. In INFOCOM 2003. TwentySecond Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, volume 3, pages 1880–1889. IEEE, 2003.
[4]
Tansu Alpcan and Tamer Basar. An intrusion detection game with limited observations. In Proceedings of the 12th Int. Symp. on Dynamic Games and Applications, 2006.
[5]
Afrand Agah, Sajal K Das, Kalyan Basu, and Mehran Asadi. Intrusion detection in sensor networks: A non-cooperative game approach. In null, pages 343–346. IEEE, 2004.
[6]
Hossein Jadidoleslamy. Designing an agent-based intrusion detection system for heterogeneous wireless sensor networks: Robust, fault tol377 erant and dynamic reconfigurable. International Journal of Communications, Network and System Sciences, 4(08):523, 2011.
[7]
Chi-Ming Wong, Chih-Fong Chang, and Bih-Hwang Lee. A simple time shift scheme for beacon broadcasting based on cluster-tree ieee 802.15. 4 low-rate wpans. Wireless personal communications, 72(4):2837–2848, 2013.
[8]
Knut Ovsthus, Lars M Kristensen, et al. An industrial perspective on wireless sensor networksa survey of requirements, protocols, and challenges. IEEE communications surveys & tutorials, 16(3):1391– 1412, 2014.
[9]
Jamal N Al-Karaki and Ahmed E Kamal. Routing techniques in wireless sensor networks: a survey. IEEE wireless communications, 11(6):6–28, 2004.
[10]
Ian F Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci. Wireless sensor networks: a survey. Computer networks, 38(4):393–422, 2002.
[11]
Lansheng Han, Man Zhou, Wenjing Jia, Zakaria Dalil, and Xingbo Xu. Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model. Information Sciences, 2018.
[12]
Maryam Mohi, Ali Movaghar, and Pooya Moradian Zadeh. A bayesian game approach for preventing dos attacks in wireless sensor networks. In Proceedings of the 2009 WRI International Conference on Communications and Mobile Computing, pages 507–511, 2009.
[13]
Xue Tingmei and Shi Zhiqiang. Multi-agent based intrusion detection system for wireless sensor networks. system, 8:9, 2012.
[14]
Hasan Çam, Suat Ozdemir, Devasenapathy Muthuavinashiappan, and Prashant Nair. Energy efficient security protocol for wireless sensor networks. In Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th, volume 5, pages 2981–2984. IEEE, 2003.
[15]
Michael Krishnan. Intrusion detection in wireless sensor networks. walrandpc. eecs. berkeley. edu/228S06/Projects/KrishnanProject. pdf, 2006.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
EWSN '19: Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks
February 2019
436 pages
ISBN:9780994988638

Sponsors

  • EWSN: International Conference on Embedded Wireless Systems and Networks

In-Cooperation

Publisher

Junction Publishing

United States

Publication History

Published: 15 March 2019

Check for updates

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 81 of 195 submissions, 42%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Nov 2024

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media