An efficient intrusion detection in resource-constrained mobile ad-hoc networks

被引:14
作者
Bouhaddi, Myria [1 ,2 ]
Radjef, Mohammed Said [2 ]
Adi, Kamel [1 ]
机构
[1] Univ Quebec Outaouais, Comp Secur Res Lab, Gatineau, PQ, Canada
[2] Univ Bejaia, Res Unit LaMOS Modeling & Optimizat Syst, Bejaia, Algeria
关键词
MANETs; IDS; Network security; Bayesian game; Perfect Bayesian equilibrium; Belief management;
D O I
10.1016/j.cose.2018.02.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose an efficient intrusion detection scheme for Mobile Ad-hoc Networks (MANETs). The scheme allows the reinforcing of network security while preserving the resources of the network nodes (e.g. energy). More specifically, the proposed solution provides MANETs with a distributed intrusion detection system in which activation is made according to the estimated threat. Our approach is characterized by the use of game theory for modeling interactions between a defense coalition and a potentially malicious sender node. We study these interactions in Bayesian games by considering the uncertainty about the sender node's maliciousness. Both one-shot and repeated situations are studied in this work. Particularly, in the repeated Bayesian game formulation, the defense coalition is allowed to adapt its defense strategy by exploiting the revealed information from the observations of the sender node's past actions. Furthermore, we perform a thorough analysis of equilibria emerging from game models and their conditions of existence. Finally, a series of simulations are conducted to show the effectiveness of the proposed approach. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:156 / 177
页数:22
相关论文
共 38 条
[1]   SECURITY MODELING OF AN AD HOC NETWORK UNDER THE CONSTRAINT OF ENERGY BY AN APPROACH IN TWO STEPS: CLUSTERING-EVOLUTIONARY GAME [J].
Adel-Aissanou, Karima ;
Berri, Sara ;
Bouhaddi, Myria ;
Radjef, Mohammed Said .
RAIRO-OPERATIONS RESEARCH, 2016, 50 (02) :285-296
[2]  
Akbani R., 2012, RECENT ADV COMPUTER, P659, DOI [10.1007/978-3-642-25769-8_92, DOI 10.1007/978-3-642-25769-8_92]
[3]  
Alpcan T, 2003, 42ND IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-6, PROCEEDINGS, P2595
[4]  
[Anonymous], 2012, Game Theory in Wireless and Communication Networks: Theory, Models, and Applications
[5]  
Basagni S., 2004, MOBILE AD HOC NETWOR
[6]   Evolutionary Game-Based Defense Mechanism in the MANETs [J].
Bouhaddi, Myria ;
Adi, Kamel ;
Radjef, Mohammed Said .
SECURITY OF INFORMATION AND NETWORKS (SIN'16), 2016, :88-95
[7]   A Game Approach for an Efficient Intrusion Detection System in Mobile Ad Hoc Networks [J].
Bouhaddi, Myria ;
Radjef, Mohammed Said ;
Adi, Kamel .
FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 :131-146
[8]   WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks [J].
Mainak Chatterjee ;
Sajal K. Das ;
Damla Turgut .
Cluster Computing, 2002, 5 (2) :193-204
[9]   A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks [J].
Chen, Lin ;
Leneutre, Jean .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (02) :165-178
[10]  
Fudenberg D., 1991, GAME THEORY