Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model

被引:59
作者
Han, Lansheng [1 ]
Zhou, Man [1 ]
Jia, Wenjing [2 ]
Dalil, Zakaria [3 ]
Xu, Xingbo [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan, Hubei, Peoples R China
[2] Univ Technol Sydney, Fac Engn & Informat Technol, Sydney, NSW, Australia
[3] Huazhong Univ Sci & Technol, Wuhan, Hubei, Peoples R China
关键词
Wireless sensor network; Intrusion detection system; Optimal defense strategy; Energy consumption; ROUTING TECHNIQUES; ENERGY-EFFICIENT; DETECTION SYSTEM;
D O I
10.1016/j.ins.2018.06.017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An effective security strategy for Wireless Sensor Networks (WSNs) is imperative to counteract security threats. Meanwhile, energy consumption directly affects the network lifetime of a wireless sensor. Thus, an attempt to exploit a low-consumption Intrusion Detection System (IDS) to detect malicious attacks makes a lot of sense. Existing Intrusion Detection Systems can only detect specific attacks and their network lifetime is short due to their high energy consumption. For the purpose of reducing energy consumption and ensuring high efficiency, this paper proposes an intrusion detection model based on game theory and an autoregressive model. The paper not only improves the autoregressive theory model into a non-cooperative, complete-information, static game model, but also predicts attack pattern reliably. The proposed approach improves on previous approaches in two main ways: (1) it takes energy consumption of the intrusion detection process into account, and (2) it obtains the optimal defense strategy that balances the system's detection efficiency and energy consumption by analyzing the model's mixed Nash equilibrium solution. In the simulation experiment, the running time of the process is regarded as the main indicator of energy consumption of the system. The simulation results show that our proposed IDS not only effectively predicts the attack time and the next targeted cluster based on the game theory, but also reduces energy consumption. (C) 2018 Elsevier Inc. All rights reserved.
引用
收藏
页码:491 / 504
页数:14
相关论文
共 38 条
[1]   Numerical solution of systems of second-order boundary value problems using continuous genetic algorithm [J].
Abu Arqub, Omar ;
Abo-Hammour, Zaer .
INFORMATION SCIENCES, 2014, 279 :396-415
[2]   Routing techniques in wireless sensor networks: A survey [J].
Al-Karaki, JN ;
Kamal, AE .
IEEE WIRELESS COMMUNICATIONS, 2004, 11 (06) :6-28
[3]   Dynamic relocation of mobile base station in wireless sensor networks using a cluster-based harmony search algorithm [J].
Alia, Osama Moh'd .
INFORMATION SCIENCES, 2017, 385 :76-95
[4]   A collaborative framework for intrusion detection in mobile networks [J].
Andreolini, Mauro ;
Colajanni, Michele ;
Marchetti, Mirco .
INFORMATION SCIENCES, 2015, 321 :179-192
[5]   A multi-step outlier-based anomaly detection approach to network-wide traffic [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
INFORMATION SCIENCES, 2016, 348 :243-271
[6]   Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures [J].
Bicakci, Kemal ;
Bagci, Ibrahim Ethem ;
Tavli, Bulent .
INFORMATION SCIENCES, 2012, 188 :44-63
[7]  
Castiglione Arcangelo, 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems, P157, DOI 10.1109/INCoS.2013.32
[8]  
Castiglione A., 2015, FUTURE GENER COMPUT, V74, P313
[9]   Modeling energy-efficient secure communications in multi-mode wireless mobile devices [J].
Castiglione, Arcangelo ;
Palmieri, Francesco ;
Fiore, Ugo ;
Castiglione, Aniello ;
De Santis, Alfredo .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2015, 81 (08) :1464-1478
[10]   Energy-efficient node scheduling algorithms for wireless sensor networks using Markov Random Field model [J].
Cheng, Hongju ;
Su, Zhihuang ;
Xiong, Naixue ;
Xiao, Yang .
INFORMATION SCIENCES, 2016, 329 :461-477