A Game Approach for an Efficient Intrusion Detection System in Mobile Ad Hoc Networks

被引:2
作者
Bouhaddi, Myria [1 ]
Radjef, Mohammed Said [1 ]
Adi, Kamel [2 ]
机构
[1] Univ Bejaia, Fac Exact Sci, Res Unit LaMOS, Dept Operat Res, Bejaia, Algeria
[2] Univ Quebec Outaouais, Dept Comp Sci & Engn, Quebec City, PQ, Canada
来源
FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014) | 2015年 / 8930卷
关键词
MANETs; IDS; Clustering; Selfish nodes; Game theory; Nash equilibrium;
D O I
10.1007/978-3-319-17040-4_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion Detection Systems (IDS) have become a necessary complement to any security infrastructure and are widely deployed as an additional line of defense to conventional security techniques. Intrusion detection techniques have been widely studied in the literature for the conventional networks. However, due to the specific characteristics of the mobile ad hoc networks (MANET), such as the lack of a fixed infrastructure and a centralized management, the implementation of an IDS presents several new challenges that must be addressed. In this paper, we present a game-based approach to implement an intrusion detection system in MANETs. We consider the selfish node behavior and discuss mechanisms that stimulate cooperation between nodes while reducing the consumption of energy due to deployment of the IDS. We also address the problem of increasing the effectiveness of security mechanism by developing a network packet sampling strategy, to effectively detect network intrusions with respect to a given total sampling budget, and find the right moment for notifying specific nodes to launch countermeasures. Finally, we evaluate the proposed approach via simulations where the results show the effectiveness of the proposed intrusion detection model.
引用
收藏
页码:131 / 146
页数:16
相关论文
共 12 条
[1]   A survey on networking games in telecommunications [J].
Altman, E ;
Boulogne, T ;
El-Azouzi, R ;
Jiménez, T ;
Wynter, L .
COMPUTERS & OPERATIONS RESEARCH, 2006, 33 (02) :286-311
[2]  
[Anonymous], INT C SIGN PROC COMM
[3]  
[Anonymous], 2005, Proceedings 1st ACM International Workshop on Quality of service Security in Wireless and Mobile Networks
[4]  
Kamhoua C., 2011, PROC IEEE INT C COMM, P1
[5]  
Kodialam M.S., 2003, Detecting network intrusions via sampling: A game theoretic approach
[6]   A game theoretical approach to clustering of ad-hoc and sensor networks [J].
Koltsidas, Georgios ;
Pavlidou, Fotini-Niovi .
TELECOMMUNICATION SYSTEMS, 2011, 47 (1-2) :81-93
[7]  
Li F., 2008, 2008 5th annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks, P432
[8]  
Mahrandish M., 2006, P IEEE INT C COMM IC
[9]   Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET [J].
Mohammed, Noman ;
Otrok, Hadi ;
Wang, Lingyu ;
Debbabi, Mourad ;
Bhattacharya, Prabir .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (01) :89-103
[10]  
Osborne M.J., 2000, An Introduction to Game Theory