Intrusion detection in sensor networks: a non-cooperative game approach

Insufficiency of memory and battery power of sensors makes the security of sensor networks a hard task to do. This insufficiency also makes applying the existing methods of securing other type of networks on the sensor networks unsuitable. We propose a game theoretic framework for defensing nodes in a sensor network. We apply three different schemes for defense. Our main concern in all three schemes is finding the most vulnerable node in a sensor network and protecting it. In the first scheme we formulate attack-defense problem as a two-player, nonzero-sum, non-cooperative game between an attacker and a sensor network. We show that this game achieves Nash equilibrium and thus leading to a defense strategy for the network. In the second scheme we use Markov decision process to predict the most vulnerable sensor node. In the third scheme we use an intuitive metric (node's traffic) and protect the node with the highest value of this metric. We evaluate the performance of each of these three schemes, and show that the proposed game framework significantly increases the chance of success in defense strategy for sensor network.

[1]  Brad Karp,et al.  GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.

[2]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[3]  Srdjan Capkun,et al.  A formal analysis of Syverson's rational exchange protocol , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.

[4]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[5]  K. Basu,et al.  A non-cooperative game approach for intrusion detection in sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[6]  Levente Buttyán,et al.  Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - The Static Case , 2003, PWC.

[7]  Vikram Srinivasan,et al.  Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[8]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[9]  Sajal K. Das,et al.  WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks , 2002, Cluster Computing.

[10]  Jean-Yves Le Boudec,et al.  Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks , 2002 .

[11]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[12]  Robert A. Scholtz,et al.  Performance Analysis of , 1998 .

[13]  Adrian Perrig,et al.  Secure Broadcast Communication , 2003, Springer US.

[14]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[15]  Sean R Eddy,et al.  What is dynamic programming? , 2004, Nature Biotechnology.

[16]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[17]  Deborah Estrin,et al.  Scalable Coordination for Wireless Sensor Networks: Self-Configuring Localization Systems , 2001 .

[18]  Sheldon M. Ross,et al.  Introduction to probability models , 1975 .

[19]  Nathan Ickes,et al.  Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks , 2001, MobiCom '01.

[20]  Peter Norvig,et al.  Artificial Intelligence: A Modern Approach , 1995 .

[21]  Pietro Michiardi,et al.  A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks , 2003 .

[22]  Murali S. Kodialam,et al.  Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[23]  Adrian Perrig,et al.  Secure broadcast communication in wired and wireless networks , 2002 .