Using Stackelberg game to enhance node protection in WSNs

In this paper, we propose a game-theoretic protection model for Wireless Sensor Network (WSN) nodes within a cluster based on a Stackelberg game. The proposed game approach is developed for two different attack-defense scenarios. In the first scenario, the attacker selects to attack a group of nodes that have a protection degree below a specific threshold. In the second scenario, the attacker targets the nodes that have been reported to be least protected in the previous round. Simulation results indicate the improved performance of the proposed protection model as compared to the no-defense case.

[1]  Ling Shi,et al.  Jamming attack on Cyber-Physical Systems: A game-theoretic approach , 2013, 2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems.

[2]  Tansu Alpcan,et al.  Security Games with Incomplete Information , 2009, 2009 IEEE International Conference on Communications.

[3]  Sajal K. Das,et al.  Preventing DoS attack in sensor networks: a game theoretic approach , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[4]  Zhu Han,et al.  Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .

[5]  Sajal K. Das,et al.  Prevention of DoS Attack in Sensor Networks using Repeated Game Theory , 2006, ICWN.

[6]  Ming Liu,et al.  The last minute: Efficient Data Evacuation strategy for sensor networks in post-disaster applications , 2011, 2011 Proceedings IEEE INFOCOM.

[7]  Usvir Kaur,et al.  Review of Trust based Methodologies in WSNs , 2013 .

[8]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[9]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[10]  K. J. Ray Liu,et al.  Game theory for cognitive radio networks: An overview , 2010, Comput. Networks.

[12]  Wang-Chien Lee,et al.  Proceedings of the Seventh International Workshop on Data Management for Sensor Networks , 2010, DMSN 2010.

[13]  D. Puccinelli,et al.  Wireless sensor networks: applications and challenges of ubiquitous sensing , 2005, IEEE Circuits and Systems Magazine.

[14]  Elisa Bertino,et al.  Provenance-based trustworthiness assessment in sensor networks , 2010, DMSN '10.

[15]  Fei Yu,et al.  A Survey of Game Theory in Wireless Sensor Networks Security , 2011, J. Networks.

[16]  Elisa Bertino,et al.  A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks , 2012, 2012 IEEE 28th International Conference on Data Engineering.

[17]  Walid Saad,et al.  Game Theory in Wireless and Communication Networks: Applications of game theory in communications and networking , 2011 .

[18]  Zhu Han,et al.  Game Theory in Wireless and Communication Networks , 2008 .

[19]  Fadel F. Digham,et al.  A pricing-based cooperative spectrum sharing stackelberg game , 2013, 2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).

[20]  Dusit Niyato,et al.  Game Theory in Wireless and Communication Networks: Fundamentals of game theory , 2011 .