Computer Science ›› 2017, Vol. 44 ›› Issue (Z6): 326-332.doi: 10.11896/j.issn.1002-137X.2017.6A.075

Previous Articles     Next Articles

Research on Intrusion Detection of Wireless Sensor Networks Based on Game Theory

XIONG Zi-li, HAN Lan-sheng, XU Xing-bo, FU Cai and LIU Bu-yu   

  • Online:2017-12-01 Published:2018-12-01

Abstract: Wide application of wireless sensor networks extends people’s ability to obtain information,but its inherent network characteristics make it more vulnerable to cyber-attack.Current intrusion detection systems are against for specific attacks,but powerless for other attacks and consump a little high energy,thus reduce the lifetime of the network.The paper proposed an intrusion detection model based on game theory,in which the attack-defense process between intrusion detection system and attacker is looked as a non-cooperative game model.To deal with the problem of diversity network intruder attacks,game model has been improved and established a non-cooperative information static game model.By analyzing the model’s mixed Nash equilibrium,the optimal defense strategy is obtained.It can balance the detection efficiency and energy consumption of the system.The simulation results show that the intrusion detection system based on game theory not only can resist a variety of network attacks effectively,but also reduce the energy consumption and prolong the lifetime of the network.

Key words: Wireless sensor networks,Intrusion detection,Game theory

[1] PERRIG A,STANKOVIC J,WAGNER D.Security in wireless sensor networks[J].Communications of ACM,2004,47(6):53-57.
[2] 裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122.
[3] PING Y,HAO X J,YUE W,et al.Distributed intrusion detection for mobile ad hoc networks[J].Journal of Systems Engineering and Electronics,2008,19(4):851-859.
[4] LIAO H J,LIN C H R,LIN Y C,et al.Intrusion detection system:A comprehensive review[J].Journal of Network and Computer Applications,2013,36(1):16-24.
[5] KAVITHA T,SRIDHARAN D.Security vulnerabilities in wireless sensor networks:A survey[J].Journal of information Assurance and Security,2010,5(1):31-44.
[6] YAN K Q,WANG S C,LIU C W.A hybrid intrusion detection system of cluster based wireless sensor networks[C]∥Procee-ding of the International Multi Conference of Engineers and Computer Scientists.2009,1:18-20.
[7] ALRAJEH N A,KHAN S,SHAMS B.Intrusion detection systems in wireless sensor networks:a review[J].International Journal of Distributed Sensor Networks,2013,2013(1):113-120.
[8] GUTIERREZ J A,NAEVE M,CALLAWAY E,et al.IEEE802.15.4:a developing standard for low-power low-cost wireless personal area networks[J].Network,IEEE,2001,15(5):12-19.
[9] YICK J,MUKHERJEE B,GHOSAL D.Wireless sensor network survey[J].Computer Networks,2008,52(12):2292-2330.
[10] AKYILDIZ I F,SU W,S ANKARASUBRAMANIAM Y,et al.Wireless sensor networks:a survey[J].Computer Networks,2002,38(4):393-422.
[11] AL-KARAKI J N,KAMAL A E.Routing techniques in wireless sensor networks:a survey[J].Wireless communications,IEEE,2004,11(6):6-28.
[12] 李慧芳,姜胜明,韦刚.无线传感器网络中基于博弈论的路由建模[J].传感器技术学报,2007,20(9):1-3.

No related articles found!
Full text



No Suggested Reading articles found!