A Game-theoretic Approach to Security and Power Conservation in Wireless Sensor Networks

In this paper, we investigate the impacts of applying game theory on the network throughput, network voltage loss and accuracy of malicious node detection to wireless sensor networks. We implement a protocol which the sensors use when deciding whether or not to forward packets they receive from other sensors in order to conserve power. Nodes in a wireless sensor network accomplish this by optimizing their decision making based on a framework using game theory. Deflning a suitable cost and proflt to routing and forwarding incoming packets and keeping a history of experiences with non-cooperating nodes drives malicious nodes out of the wireless sensor network.

[1]  Afrand Agah,et al.  Applying Game Theory in Securing Wireless Sensor Networks by Minimizing Battery Usage , 2014 .

[2]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[3]  Yang Yang,et al.  Battery recovery aware sensor networks , 2009, 2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.

[4]  Shamik Sengupta,et al.  A Game Theoretic Framework for Power Control in Wireless Sensor Networks , 2010, IEEE Transactions on Computers.

[5]  Sajal K. Das,et al.  Preventing DoS attack in sensor networks: a game theoretic approach , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[6]  Dave Levin Punishment in Selfish Wireless Networks : A Game Theoretic Analysis , 2006 .

[7]  Petteri Nurmi,et al.  Modeling energy constrained routing in selfish ad hoc networks , 2006, GameNets '06.

[8]  Stephan Eidenbenz,et al.  Equilibria in Topology Control Games for Ad Hoc Networks , 2006, Mob. Networks Appl..

[9]  Sajal K. Das,et al.  Prevention of DoS Attack in Sensor Networks using Repeated Game Theory , 2006, ICWN.

[10]  Paolo Santi,et al.  The COMMIT Protocol for Truthful and Cost-Efficient Routing in Ad Hoc Networks with Selfish Nodes , 2008, IEEE Transactions on Mobile Computing.

[11]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[12]  Anand Raghunathan,et al.  Battery discharge characteristics of wireless sensor nodes: an experimental analysis , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..

[13]  Chee-Yee Chong,et al.  Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.

[14]  Pietro Michiardi,et al.  Game theoretic analysis of security in mobile ad hoc networks , 2002 .

[15]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[16]  Subramaniam Shamala,et al.  Validating Reliability of OMNeT++ in Wireless Networks DoS Attacks: Simulation vs. Testbed , 2011, Int. J. Netw. Secur..

[17]  Edward J. Coyle,et al.  An energy efficient hierarchical clustering algorithm for wireless sensor networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[18]  Stephan Eidenbenz,et al.  Incentive-Compatible, Energy-Optimal, and Efficient Ad Hoc Networking in a Selfish Milieu , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[19]  Deborah Estrin,et al.  An energy-efficient MAC protocol for wireless sensor networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[20]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[21]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[22]  Alfredo García,et al.  A Game-Theoretic Approach to Efficient Power Management in Sensor Networks , 2008, Oper. Res..

[23]  Sirin Tekinay,et al.  A survey of game-theoretic approaches in wireless sensor networks , 2008, Comput. Networks.

[24]  Pietro Michiardi,et al.  Prevention of denial of service attacks and selfishness in mobile ad hoc networks , 2002 .

[25]  Chi Ma,et al.  Battery-Aware Routing for Streaming Data Transmissions in Wireless Sensor Networks , 2005, 2nd International Conference on Broadband Networks, 2005..

[26]  Levente Buttyán,et al.  Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - The Static Case , 2003, PWC.

[27]  Jean-Pierre Hubaux,et al.  Game Theory in Wireless Networks: A Tutorial , 2006 .

[28]  Niki Pissinou,et al.  Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks , 2011, Int. J. Netw. Secur..

[29]  Pietro Michiardi,et al.  Simulation-based analysis of security exposures in mobile ad hoc networks , 2002 .

[30]  Jean-Yves Le Boudec,et al.  Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.

[31]  Sajal K. Das,et al.  Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[32]  Yanbin Liu,et al.  Reputation propagation and agreement in mobile ad-hoc networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[33]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[34]  Stan Matwin,et al.  Privacy Preserving K-nearest Neighbor Classification , 2005, Int. J. Netw. Secur..