Intrusion detection for wireless sensor networks: A multi-criteria game approach

In view of the compelling applications in both military and civilian fields, wireless sensor networks (WSNs) have attracted an unprecedented focus on their easy configuration and low cost. Due to the openness of wireless media and constrained resources of WSNs, it is of paramount importance to timely discern the malicious intrusion and unauthorized manipulation. In this paper, we engage in providing an intrusion detection mechanism relying on a novel multi-criteria game. In our model, the interaction between potential attackers and defenders is formulated as a two-player non-zero-sum multi-criteria game, where multiple objectives, i.e. the information security, reputation and energy consumption, are considered when searching for the Pareto equilibrium. Moreover, a light weighting strategy is proposed in order to construct the payoff vector. Finally, simulation results and theoretical analysis show the effectiveness and feasibility of our proposed mechanism.

[1]  L. Shapley,et al.  Equilibrium points in games with vector payoffs , 1959 .

[2]  M. Zeleny Games with multiple payoffs , 1975 .

[3]  Cristina Comaniciu,et al.  A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.

[4]  K. J. Ray Liu,et al.  Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks , 2007, IEEE Transactions on Mobile Computing.

[5]  I. Nishizaki,et al.  Nondominated Equilibrium Solutions of a Multiobjective Two-Person Nonzero-Sum Game and Corresponding Mathematical Programming Problem , 2007 .

[6]  Lin Chen,et al.  A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks , 2009, IEEE Transactions on Information Forensics and Security.

[7]  Chunyan Miao,et al.  A Survey of Trust and Reputation Management Systems in Wireless Communications , 2010, Proceedings of the IEEE.

[8]  Yang Xiao,et al.  Game Theory for Network Security , 2013, IEEE Communications Surveys & Tutorials.

[9]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[10]  K. J. Ray Liu,et al.  Joint Spectrum Sensing and Access Evolutionary Game in Cognitive Radio Networks , 2013, IEEE Transactions on Wireless Communications.

[11]  K. J. Ray Liu,et al.  Graphical Evolutionary Game for Information Diffusion Over Social Networks , 2013, IEEE Journal of Selected Topics in Signal Processing.

[12]  Xiaorong Li,et al.  Multi-Objective Game Theoretic Schedulingof Bag-of-Tasks Workflows on Hybrid Clouds , 2014, IEEE Transactions on Cloud Computing.

[13]  K. J. Ray Liu,et al.  Multi-Channel Sensing and Access Game: Bayesian Social Learning with Negative Network Externality , 2014, IEEE Transactions on Wireless Communications.

[14]  Peng Ning,et al.  Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty , 2014, GLOBECOM 2014.

[15]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[16]  Luc Vandendorpe,et al.  Energy efficiency-rate multiobjective Game: Tradeoffs, scalarisation techniques and distributed implementation , 2016, 2016 IEEE International Conference on Communications (ICC).

[17]  Erella Eisenstadt,et al.  Novel Solution Approach for Multi-Objective Attack-Defense Cyber Games With Unknown Utilities of the Opponent , 2017, IEEE Transactions on Emerging Topics in Computational Intelligence.

[18]  Zhu Han,et al.  Private Information Diffusion Control in Cyber Physical Systems: A Game Theory Perspective , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).