An efficient intrusion detection in resource-constrained mobile ad-hoc networks

被引:14
作者
Bouhaddi, Myria [1 ,2 ]
Radjef, Mohammed Said [2 ]
Adi, Kamel [1 ]
机构
[1] Univ Quebec Outaouais, Comp Secur Res Lab, Gatineau, PQ, Canada
[2] Univ Bejaia, Res Unit LaMOS Modeling & Optimizat Syst, Bejaia, Algeria
关键词
MANETs; IDS; Network security; Bayesian game; Perfect Bayesian equilibrium; Belief management;
D O I
10.1016/j.cose.2018.02.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose an efficient intrusion detection scheme for Mobile Ad-hoc Networks (MANETs). The scheme allows the reinforcing of network security while preserving the resources of the network nodes (e.g. energy). More specifically, the proposed solution provides MANETs with a distributed intrusion detection system in which activation is made according to the estimated threat. Our approach is characterized by the use of game theory for modeling interactions between a defense coalition and a potentially malicious sender node. We study these interactions in Bayesian games by considering the uncertainty about the sender node's maliciousness. Both one-shot and repeated situations are studied in this work. Particularly, in the repeated Bayesian game formulation, the defense coalition is allowed to adapt its defense strategy by exploiting the revealed information from the observations of the sender node's past actions. Furthermore, we perform a thorough analysis of equilibria emerging from game models and their conditions of existence. Finally, a series of simulations are conducted to show the effectiveness of the proposed approach. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:156 / 177
页数:22
相关论文
共 38 条
[11]   Multicluster, mobile, multimedia radio network [J].
Gerla, Mario ;
Tsai, Jack Tzu-Chieh .
WIRELESS NETWORKS, 1995, 1 (03) :255-265
[12]  
Ghorbani M, EL ENG ICEE 2016 24
[13]  
Goyal P, INT J COMPUT ENG MAN
[14]  
Harsanyi JC, 1967, Management science, V14, P159, DOI [DOI 10.1287/MNSC.14.3.159, 10.1287/mnsc.14.3.159]
[15]   On the optimality of cooperative intrusion detection for resource constrained wireless networks [J].
Hassanzadeh, Amin ;
Stoleru, Radu .
COMPUTERS & SECURITY, 2013, 34 :16-35
[16]   Enhancing secure routing in Mobile Ad Hoc Networks using a Dynamic Bayesian Signalling Game model [J].
Kaliappan, M. ;
Paramasivan, B. .
COMPUTERS & ELECTRICAL ENGINEERING, 2015, 41 :301-313
[17]   A game-based intrusion detection mechanism to confront internal attackers [J].
Kantzavelou, Ioanna ;
Katsikas, Sokratis .
COMPUTERS & SECURITY, 2010, 29 (08) :859-874
[18]  
Kodialam M, 2003, IEEE INFOCOM SER, P1880
[19]   Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs [J].
Li, Feng ;
Yang, Yinying ;
Wu, Jie .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2010, 40 (03) :612-622
[20]   An acknowledgment-based approach for the detection of routing misbehavior in MANETs [J].
Liu, Kejun ;
Deng, Jing ;
Varshney, Pramod K. ;
Balakrishnan, Kashyap .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2007, 6 (05) :488-502