An efficient intrusion detection in resource-constrained mobile ad-hoc networks

被引:14
|
作者
Bouhaddi, Myria [1 ,2 ]
Radjef, Mohammed Said [2 ]
Adi, Kamel [1 ]
机构
[1] Univ Quebec Outaouais, Comp Secur Res Lab, Gatineau, PQ, Canada
[2] Univ Bejaia, Res Unit LaMOS Modeling & Optimizat Syst, Bejaia, Algeria
关键词
MANETs; IDS; Network security; Bayesian game; Perfect Bayesian equilibrium; Belief management;
D O I
10.1016/j.cose.2018.02.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose an efficient intrusion detection scheme for Mobile Ad-hoc Networks (MANETs). The scheme allows the reinforcing of network security while preserving the resources of the network nodes (e.g. energy). More specifically, the proposed solution provides MANETs with a distributed intrusion detection system in which activation is made according to the estimated threat. Our approach is characterized by the use of game theory for modeling interactions between a defense coalition and a potentially malicious sender node. We study these interactions in Bayesian games by considering the uncertainty about the sender node's maliciousness. Both one-shot and repeated situations are studied in this work. Particularly, in the repeated Bayesian game formulation, the defense coalition is allowed to adapt its defense strategy by exploiting the revealed information from the observations of the sender node's past actions. Furthermore, we perform a thorough analysis of equilibria emerging from game models and their conditions of existence. Finally, a series of simulations are conducted to show the effectiveness of the proposed approach. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:156 / 177
页数:22
相关论文
共 50 条
  • [1] A distributed intrusion detection system for resource-constrained devices in ad-hoc networks
    Lauf, Adrian P.
    Peters, Richard A.
    Robinson, William H.
    AD HOC NETWORKS, 2010, 8 (03) : 253 - 266
  • [2] Programming Ad-hoc Networks of mobile and resource-constrained devices
    Ni, Y
    Kremer, U
    Stere, A
    Iftode, L
    ACM SIGPLAN NOTICES, 2005, 40 (06) : 249 - 260
  • [3] A Novel Intrusion Detection Architecture for Energy-Constrained Mobile Ad-hoc Networks
    Ma, Chuan-xiang
    Fang, Ze-ming
    Wang, Lei-chun
    Li, Qing-hua
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 366 - +
  • [4] Intrusion detection in mobile ad-hoc networks: A mobile agent approach
    Kaur, Upinder
    Patel, R. B.
    ICIT 2006: 9TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2006, : 77 - +
  • [5] A Study on Intrusion Detection System of Mobile Ad-hoc Networks
    Sindhuja, S.
    Vadivel, R.
    SOFT COMPUTING FOR PROBLEM SOLVING, SOCPROS 2018, VOL 2, 2020, 1057 : 307 - 316
  • [6] Collaborative techniques for intrusion detection in mobile ad-hoc networks
    Marchang, Ningrinla
    Datta, Raja
    AD HOC NETWORKS, 2008, 6 (04) : 508 - 523
  • [7] Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks
    Vetrichelvi
    Rajaram
    Vanitha
    Mohankumar, G.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (09): : 215 - 219
  • [8] A Survey of Intrusion Detection Systems for Mobile Ad-Hoc Networks
    Alriyami, Qasim M.
    Asimakopoulou, Eleana
    Bessis, Nik
    2014 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2014, : 427 - 432
  • [9] Intrusion detection using mobile agent in ad-hoc networks
    Xia, Y
    Li, RF
    Li, KL
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 3383 - 3388
  • [10] An Energy Efficient Scheduling Scheme for Intrusion Detection System in Mobile Ad-hoc Networks
    Kisku, Bapi
    Datta, Raja
    2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 1 - 6