A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor Networks

A robust optimization model is considered for nonzero-sum discounted stochastic games with incomplete information in order to formally formulate and analyze the intrusion detection problem in wireless sensor networks (WSNs). Security requirements of WSNs are taken into account to characterize the game parameters and model the player objectives. To generalize the problem, the game data are assumed not to be fully known to the players, who take a robust optimization approach to address this data uncertainty. For assessing the validity and effectiveness of the framework, illustrative instances of the developed game model are generated. Equilibrium analysis reveals how the conflicting objectives of the intruder and intrusion detection system compel them to adopt different conservative stances toward data uncertainty. It is also shown, by numerical results, that the robust approach in the presence of uncertainty reduces the sensitivity of the solution with respect to data perturbations, and thus improves design stability.

[1]  A. M. Fink,et al.  Equilibrium in a stochastic $n$-person game , 1964 .

[2]  Murali S. Kodialam,et al.  Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[3]  Yu-Chee Tseng,et al.  Efficient in-network moving object tracking in wireless sensor networks , 2006, IEEE Transactions on Mobile Computing.

[4]  Nicolas Vieille,et al.  Stochastic Games with a Single Controller and Incomplete Information , 2002, SIAM J. Control. Optim..

[5]  Tansu Alpcan,et al.  Network Security , 2010 .

[6]  Arkadi Nemirovski,et al.  Robust Convex Optimization , 1998, Math. Oper. Res..

[7]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[8]  P. Jean-Jacques Herings,et al.  Stationary Equilibria in Stochastic Games: Structure, Selection and Computation , 2000 .

[9]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[10]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[11]  William Stallings,et al.  Cryptography and Network Security (4th Edition) , 2005 .

[12]  Cristina Comaniciu,et al.  A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.

[13]  Ronald Peeters,et al.  StochasticGameSolver: Computing Stationary Equilibria for Stochastic Games , 2004 .

[14]  Sirin Tekinay,et al.  A survey of game-theoretic approaches in wireless sensor networks , 2008, Comput. Networks.

[15]  Afrand Agah,et al.  Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..

[16]  Yang Xiao,et al.  Intrusion detection techniques in mobile ad hoc and wireless sensor networks , 2007, IEEE Wireless Communications.

[17]  Michael L. Littman,et al.  Markov Games as a Framework for Multi-Agent Reinforcement Learning , 1994, ICML.

[18]  Dharma P. Agrawal,et al.  Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks , 2008, IEEE Transactions on Mobile Computing.

[19]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[20]  Lin Chen,et al.  A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks , 2009, IEEE Transactions on Information Forensics and Security.

[21]  Jerzy A. Filar,et al.  Nonlinear programming and stationary equilibria in stochastic games , 1991, Math. Program..

[22]  R. Vanderbei LOQO:an interior point code for quadratic programming , 1999 .

[23]  Thomas F. La Porta,et al.  Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks , 2006, IEEE Transactions on Mobile Computing.

[24]  Garud Iyengar,et al.  Robust Dynamic Programming , 2005, Math. Oper. Res..

[25]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[26]  Randolph W. Hall,et al.  Discounted Robust Stochastic Games and an Application to Queueing Control , 2011, Oper. Res..

[27]  L. Shapley,et al.  Stochastic Games* , 1953, Proceedings of the National Academy of Sciences.

[28]  Brian W. Kernighan,et al.  AMPL: A Modeling Language for Mathematical Programming , 1993 .

[29]  Mi-Ching Tsai,et al.  Robust and Optimal Control , 2014 .

[30]  Xin Chen,et al.  Design and Analysis of Sensing Scheduling Algorithms under Partial Coverage for Object Detection in Sensor Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.

[31]  Jorge J. Moré,et al.  The NEOS Server , 1998 .

[32]  O. J. Vrieze Stochastic Games and Stationary Strategies , 2003 .

[33]  Elaine Shi,et al.  Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[34]  Quanyan Zhu,et al.  Distributed strategic learning with application to network security , 2011, Proceedings of the 2011 American Control Conference.

[35]  Rodrigo Roman,et al.  On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks , 2013, IEEE Communications Surveys & Tutorials.

[36]  M. J. Sobel Noncooperative Stochastic Games , 1971 .