GUARD: an intrusion detection framework for routing protocols in multi-hop wireless networks

被引:4
作者
Thivakaran, T. K. [1 ]
Sakthivel, T. [2 ]
机构
[1] Sri Venkateshwara Coll Engn, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] Firstsoft Technol P Ltd, Chennai, Tamil Nadu, India
关键词
Multi-hop wireless networks; Intrusion detection system; Watchdogs; Routing attacks; Non-cooperative game theory; Fuzzy q-learning;
D O I
10.1007/s11276-017-1594-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Multihop Wireless Networks have received great attention in recent years, owing to the rapid proliferation of wireless devices. The wireless routing protocols assume that the nodes are cooperating and well-behaving. However, such networks are subject to several active routing attacks such as dropping, flooding, and modification. The primary intention of such attack is to thwart the objectives of routing protocols and cause network malfunction. This state of affairs motivates the recent research towards the development of a sophisticated security framework that works well against active routing attacks. This paper proposes GUARD, an intrusion detection framework that aims at detecting the active routing attacks efficiently with a considerable reduction in energy consumption. The GUARD incorporates three mechanisms such as a Restricted Directional Watchdog Selection, a Game Design, and an Incentive Estimation. Applying the Restricted Directional Watchdog Selection makes the GUARD a lightweight intrusion detection system (IDS) model, where only a limited number of nodes turn on IDS. The GUARD utilizes non-cooperative game design and exploits the advantage of Fuzzy q-learning to determine the malicious activity. The notion of Fuzzy q-learning determines the results of the player strategies of game design to measure the appropriate reward. The GUARD framework is incorporated into the popular protocols such as AODV and LEACH to validate the effectiveness of the defense mechanism. The simulation results show that these extended protocols outperform the existing protocols in terms of attack detection accuracy, throughput, delay, and network lifetime.
引用
收藏
页码:819 / 836
页数:18
相关论文
共 25 条
[1]   Intrusion detection in sensor networks: A non-cooperative game approach [J].
Agah, A ;
Das, SK ;
Basu, K ;
Asadi, M .
THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, :343-346
[2]   A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network [J].
Ahmed, Adnan ;
Abu Bakar, Kamalrulnizam ;
Channa, Muhammad Ibrahim ;
Khan, Abdul Waheed .
MOBILE NETWORKS & APPLICATIONS, 2016, 21 (02) :272-285
[3]  
[Anonymous], 2006, P WORKSH GAM THEOR C
[4]  
[Anonymous], LCAREPORT2006002
[5]   A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks [J].
Chen, Lin ;
Leneutre, Jean .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (02) :165-178
[6]  
Ghosal A., 2013, Wireless Networks and Security, P329, DOI DOI 10.1007/978-3-642-36169-2_10
[7]  
Gomez J., 2002, P 2002 IEEE WORKSH I, V6, P321
[8]  
Heiniger R. W., 2000, Proceedings of the 5th International Conference on Precision Agriculture, Bloomington, Minnesota, USA, 16-19 July, 2000, P1
[9]   A game theoretical approach to clustering of ad-hoc and sensor networks [J].
Koltsidas, Georgios ;
Pavlidou, Fotini-Niovi .
TELECOMMUNICATION SYSTEMS, 2011, 47 (1-2) :81-93
[10]   Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs [J].
Li, Feng ;
Yang, Yinying ;
Wu, Jie .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2010, 40 (03) :612-622