计算机科学 ›› 2017, Vol. 44 ›› Issue (Z6): 326-332.doi: 10.11896/j.issn.1002-137X.2017.6A.075

• 信息安全 • 上一篇    下一篇

基于博弈的无线传感器网络入侵检测模型

熊自立,韩兰胜,徐行波,付才,刘布雨   

  1. 华中科技大学计算机科学与技术学院 武汉430074,华中科技大学计算机科学与技术学院 武汉430074,华中科技大学计算机科学与技术学院 武汉430074,华中科技大学计算机科学与技术学院 武汉430074,华中科技大学计算机科学与技术学院 武汉430074
  • 出版日期:2017-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金项目:基于任务的木马关联任务识别研究(61272033),国家自然科学基金项目:移动网络行为的多态聚类及其演化研究(61270335),国家自然科学基金项目:恶意代码的多态图谱及隐式空间研究(61572222)资助

Research on Intrusion Detection of Wireless Sensor Networks Based on Game Theory

XIONG Zi-li, HAN Lan-sheng, XU Xing-bo, FU Cai and LIU Bu-yu   

  • Online:2017-12-01 Published:2018-12-01

摘要: 无线传感器网络的广泛应用扩展了人们获取信息的能力,但是其固有的网络特点使得其更容易遭受网络攻击。现有的入侵检测系统通常只针对特定的攻击方式,对其他的攻击则无能为力。另外增加的能量消耗降低了网络的使用寿命。由此,以博弈论为理论基础,对无线传感器网络中的攻防过程进行分析,通过分析模型均衡解来论证执行入侵检测系统的必要性。针对网络入侵者攻击手段的多样性问题,对博弈模型进行深化改进,建立非合作完全信息静态博弈模型,通过分析模型的混合纳什均衡解,得出入侵检测系统的最佳防守策略,平衡了系统的能量消耗和检测效率。仿真实验结果表明,基于博弈的无线传感器网络入侵检测系统不仅能够有效地抵御多种网络攻击,而且降低了入侵检测系统所引起的能量消耗,延长了网络的使用寿命。

关键词: 无线传感器网络,入侵检测,博弈理论

Abstract: Wide application of wireless sensor networks extends people’s ability to obtain information,but its inherent network characteristics make it more vulnerable to cyber-attack.Current intrusion detection systems are against for specific attacks,but powerless for other attacks and consump a little high energy,thus reduce the lifetime of the network.The paper proposed an intrusion detection model based on game theory,in which the attack-defense process between intrusion detection system and attacker is looked as a non-cooperative game model.To deal with the problem of diversity network intruder attacks,game model has been improved and established a non-cooperative information static game model.By analyzing the model’s mixed Nash equilibrium,the optimal defense strategy is obtained.It can balance the detection efficiency and energy consumption of the system.The simulation results show that the intrusion detection system based on game theory not only can resist a variety of network attacks effectively,but also reduce the energy consumption and prolong the lifetime of the network.

Key words: Wireless sensor networks,Intrusion detection,Game theory

[1] PERRIG A,STANKOVIC J,WAGNER D.Security in wireless sensor networks[J].Communications of ACM,2004,47(6):53-57.
[2] 裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122.
[3] PING Y,HAO X J,YUE W,et al.Distributed intrusion detection for mobile ad hoc networks[J].Journal of Systems Engineering and Electronics,2008,19(4):851-859.
[4] LIAO H J,LIN C H R,LIN Y C,et al.Intrusion detection system:A comprehensive review[J].Journal of Network and Computer Applications,2013,36(1):16-24.
[5] KAVITHA T,SRIDHARAN D.Security vulnerabilities in wireless sensor networks:A survey[J].Journal of information Assurance and Security,2010,5(1):31-44.
[6] YAN K Q,WANG S C,LIU C W.A hybrid intrusion detection system of cluster based wireless sensor networks[C]∥Procee-ding of the International Multi Conference of Engineers and Computer Scientists.2009,1:18-20.
[7] ALRAJEH N A,KHAN S,SHAMS B.Intrusion detection systems in wireless sensor networks:a review[J].International Journal of Distributed Sensor Networks,2013,2013(1):113-120.
[8] GUTIERREZ J A,NAEVE M,CALLAWAY E,et al.IEEE802.15.4:a developing standard for low-power low-cost wireless personal area networks[J].Network,IEEE,2001,15(5):12-19.
[9] YICK J,MUKHERJEE B,GHOSAL D.Wireless sensor network survey[J].Computer Networks,2008,52(12):2292-2330.
[10] AKYILDIZ I F,SU W,S ANKARASUBRAMANIAM Y,et al.Wireless sensor networks:a survey[J].Computer Networks,2002,38(4):393-422.
[11] AL-KARAKI J N,KAMAL A E.Routing techniques in wireless sensor networks:a survey[J].Wireless communications,IEEE,2004,11(6):6-28.
[12] 李慧芳,姜胜明,韦刚.无线传感器网络中基于博弈论的路由建模[J].传感器技术学报,2007,20(9):1-3.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!