Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation

被引:41
作者
Subba, Basant [1 ]
Biswas, Santosh [1 ]
Karmakar, Sushanta [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Gauhati 781039, Assam, India
来源
ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH | 2016年 / 19卷 / 02期
关键词
Mobile Ad-hoc Network (MANET); Intrusion detection system (IDS); Game theory; Bayesian Nash equilibrium;
D O I
10.1016/j.jestch.2015.11.001
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Present Intrusion Detection Systems (IDSs) for MANETs require continuous monitoring which leads to rapid depletion of a node's battery life. To address this issue, we propose a new IDS scheme comprising a novel cluster leader election process and a hybrid IDS. The cluster leader election process uses the Vickrey-Clarke-Groves mechanism to elect the cluster leader which provides the intrusion detection service. The hybrid IDS comprises a threshold based lightweight module and a powerful anomaly based heavyweight module. Initially, only the lightweight module is activated. The decision to activate the heavyweight module is taken by modeling the intrusion detection process as an incomplete information noncooperative game between the elected leader node and the potential malicious node. Simulation results show that the proposed scheme significantly reduces the IDS traffic and overall power consumption in addition to maintaining a high detection rate and accuracy. (C) 2016, Karabuk University. Publishing services by Elsevier B.V.
引用
收藏
页码:782 / 799
页数:18
相关论文
共 49 条
[1]   Intrusion detection in sensor networks: A non-cooperative game approach [J].
Agah, A ;
Das, SK ;
Basu, K ;
Asadi, M .
THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, :343-346
[2]  
Agrawal R., 1994, P 20 INT C VERY LARG, DOI DOI 10.1007/BF02948845
[3]  
Alpcan T, 2003, 42ND IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-6, PROCEEDINGS, P2595
[4]  
Anantvalee T, 2007, SIGNALS COMMUN TECHN, P159, DOI 10.1007/978-0-387-33112-6_7
[5]  
Anjum F., 2006, INTRUSION DETECTION
[6]  
[Anonymous], [No title captured]
[7]  
[Anonymous], 2000, P 6 ANN INT C MOB CO
[8]  
Barford P, 2002, IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, P71, DOI 10.1145/637201.637210
[9]   Challenges in intrusion detection for wireless ad-hoc networks [J].
Brutch, P ;
Ko, C .
2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, :368-373
[10]   Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks [J].
Bu, Shengrong ;
Yu, F. Richard ;
Liu, Xiaoping P. ;
Mason, Peter ;
Tang, Helen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2011, 60 (03) :1025-1036