Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks

Abstract Owing to the distributed nature of denial-of-service attacks, it is tremendously challenging to detect such malicious behavior using traditional intrusion detection systems in Wireless Sensor Networks (WSNs). In the current paper, a game theoretic method is introduced, namely cooperative Game-based Fuzzy Q-learning (G-FQL). G-FQL adopts a combination of both the game theoretic approach and the fuzzy Q-learning algorithm in WSNs. It is a three-player strategy game consisting of sink nodes, a base station, and an attacker. The game performs at any time a victim node in the network receives a flooding packet as a DDoS attack beyond a specific alarm event threshold in WSN. The proposed model implements cooperative defense counter-attack scenarios for the sink node and the base station to operate as rational decision-maker players through a game theory strategy. In order to evaluate the performance of the proposed model, the Low Energy Adaptive Clustering Hierarchy (LEACH) was simulated using NS-2 simulator. The model is subsequently compared against other existing soft computing methods, such as fuzzy logic controller, Q-learning, and fuzzy Q-learning, in terms of detection accuracy, counter-defense, network lifetime and energy consumption, to demonstrate its efficiency and viability. The proposed model׳s attack detection and defense accuracy yield a greater improvement than existing above-mentioned machine learning methods. In contrast to the Markovian game theoretic, the proposed model operates better in terms of successful defense rate.

[1]  John Zic,et al.  A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks , 2009, WiSec '09.

[2]  Subir Halder,et al.  Intrusion Detection in Wireless Sensor Networks: Issues, Challenges and Approaches , 2013, Wireless Networks and Security.

[3]  S. Selvakumar,et al.  Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems , 2013, Comput. Commun..

[4]  Ethem Alpaydin,et al.  Introduction to machine learning , 2004, Adaptive computation and machine learning.

[5]  Zhiwei Li,et al.  Node localization through physical layer network coding: Bootstrap, security, and accuracy , 2012, Ad Hoc Networks.

[6]  Yee Wei Law,et al.  Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.

[7]  Bülent Tavli,et al.  Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks , 2009, Comput. Stand. Interfaces.

[8]  Nauman Aslam,et al.  A multi-criterion optimization technique for energy efficient cluster formation in wireless sensor networks , 2011, Inf. Fusion.

[9]  B. K. Panigrahi,et al.  ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE , 2010 .

[10]  Ahmed Patel,et al.  BEE-C: A bio-inspired energy efficient cluster-based algorithm for data continuous dissemination in Wireless Sensor Networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).

[11]  Christopher Leckie,et al.  A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..

[12]  Yifeng Zeng,et al.  EXPERIMENTS WITH ONLINE REINFORCEMENT LEARNING IN REAL-TIME STRATEGY GAMES , 2009, Appl. Artif. Intell..

[13]  Levente Buttyán,et al.  Secure and reliable clustering in wireless sensor networks: A critical survey , 2012, Comput. Networks.

[14]  Yuanjie Li,et al.  Signaling game based strategy of intrusion detection in wireless sensor networks , 2011, Comput. Math. Appl..

[15]  Ahmed Patel,et al.  An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..

[16]  Salman Ahmad Khan,et al.  Fuzzy Logic-Based Decision Making for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks , 2010, 2010 Second International Conference on Future Networks.

[17]  Maria Papadaki,et al.  Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM) , 2013, Secur. Commun. Networks.

[18]  Kai Hwang,et al.  Collaborative detection and filtering of shrew DDoS attacks using spectral analysis , 2006, J. Parallel Distributed Comput..

[19]  Zubair A. Baig,et al.  GMDH-based networks for intelligent intrusion detection , 2013, Eng. Appl. Artif. Intell..

[20]  Chung-Horng Lung,et al.  Using Hierarchical Agglomerative Clustering in Wireless Sensor Networks: An Energy-Efficient and Flexible Approach , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[21]  Chung-Horng Lung,et al.  Using Hierarchical Agglomerative Clustering in Wireless Sensor Networks: An Energy-Efficient and Flexible Approach , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[22]  Yi Mu,et al.  Securing DSR against wormhole attacks in multirate ad hoc networks , 2013, J. Netw. Comput. Appl..

[23]  Wei Li,et al.  Survivability evaluation towards attacked WSNs based on stochastic game and continuous-time Markov chain , 2012, Appl. Soft Comput..

[24]  Xin Xu,et al.  Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies , 2010, Appl. Soft Comput..

[25]  Sudip Misra,et al.  Reputation-based role assignment for role-based access control in wireless sensor networks , 2011, Comput. Commun..

[26]  Yoav Shoham,et al.  Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .

[27]  Ravi Jain,et al.  D-SCIDS: Distributed soft computing intrusion detection system , 2007, J. Netw. Comput. Appl..

[28]  P. Venkata Krishna,et al.  LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks , 2009, Secur. Commun. Networks.

[29]  Abdul Hanan Abdullah,et al.  Overview of Data Routing Approaches for Wireless Sensor Networks , 2012, Sensors.

[30]  Manik Lal Das,et al.  Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[31]  Shahaboddin Shamshirb,et al.  Designing a smart multi-agent system based on fuzzy logic to improve the gas consumption pattern , 2010 .

[32]  Nirwan Ansari,et al.  Detecting DRDoS attacks by a simple response packet confirmation mechanism , 2008, Comput. Commun..

[33]  Eitan Altman,et al.  Non-cooperative spectrum access in cognitive radio networks: A game theoretical model , 2011, Comput. Networks.

[34]  Bai Li,et al.  Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks , 2009, J. Netw. Comput. Appl..

[35]  Issa M. Khalil,et al.  UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks , 2010, Ad Hoc Networks.

[36]  Jelena Mirkovic,et al.  D-WARD: a source-end defense against flooding denial-of-service attacks , 2005, IEEE Transactions on Dependable and Secure Computing.

[37]  P. Venkata Krishna,et al.  A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of Things , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[38]  Mohamed F. Younis,et al.  A survey on routing protocols for wireless sensor networks , 2005, Ad Hoc Networks.

[39]  Steve McGregory,et al.  Preparing for the next DDoS attack , 2013, Netw. Secur..

[40]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[41]  Nor Badrul Anuar,et al.  An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique , 2013, Eng. Appl. Artif. Intell..

[42]  Kemal Ertugrul Tepe,et al.  Game theoretic approach in routing protocol for wireless ad hoc networks , 2009, Ad Hoc Networks.

[43]  Xuxun Liu,et al.  A Survey on Clustering Routing Protocols in Wireless Sensor Networks , 2012, Sensors.

[44]  Marimuthu Palaniswami,et al.  Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2009, SASN '05.

[45]  Heejo Lee,et al.  APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks , 2013, Comput. Secur..

[46]  Ilker Bekmezci,et al.  Energy Efficient, Delay Sensitive, Fault Tolerant Wireless Sensor Network for Military Monitoring , 2008, 2008 IEEE Sensors Applications Symposium.

[47]  Jiang Li,et al.  Attacks and Countermeasures in Sensor Networks: A Survey , 2010 .

[48]  Yang Yang,et al.  A flow-based network monitoring framework for wireless mesh networks , 2007, IEEE Wireless Communications.

[49]  Kang G. Shin,et al.  Defense Against Spoofed IP Traffic Using Hop-Count Filtering , 2007, IEEE/ACM Transactions on Networking.

[50]  Zahir Tari,et al.  Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling , 2013, J. Parallel Distributed Comput..

[51]  Yu-Fang Chung,et al.  Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining , 2013, Inf. Sci..

[52]  Marília Curado,et al.  A reinforcement learning-based routing for delay tolerant networks , 2013, Eng. Appl. Artif. Intell..

[53]  Raquel Barco,et al.  Optimization of load balancing using fuzzy Q-Learning for next generation wireless networks , 2013, Expert Syst. Appl..

[54]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[55]  Yaowei Zhou,et al.  Key-insulated encryption based group key management for wireless sensor network , 2013 .

[56]  Yanheng Liu,et al.  Predictable Energy Aware Routing based on Dynamic Game Theory in Wireless Sensor Networks , 2013, Comput. Electr. Eng..

[57]  Ashraf Darwish,et al.  Wearable and Implantable Wireless Sensor Network Solutions for Healthcare Monitoring , 2011, Sensors.

[58]  Issa M. Khalil,et al.  CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks , 2012, Comput. Networks.