期刊文献+

Intrusion Detection Model Based on Incomplete Information Ga me in Wireless Mesh Networks 被引量:1

Intrusion Detection Model Based on Incomplete Information Ga me in Wireless Mesh Networks
在线阅读 下载PDF
导出
摘要 Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the security of wireless mesh networks is a precondition for practical use. Intrusion detection is pivotal for increasing network security. Considering the energy limitations in wireless mesh networks, we adopt two types of nodes: Heavy Intrusion Detection Node (HIDN) and Light Intrusion Detection Node (LIDN). To conserve energy, the LIDN detects abnorrml behavior according to probability, while the HIDN, which has sufficient energy, is always operational. In practice, it is very difficult to acquire accurate information regarding attackers. We propose an intrusion detection model based on the incomplete inforrmtion game (ID-IIG). The ID-IIG utilizes the Harsanyi transformation and Bayesian Nash equilibrium to select the best strategies of defenders, although the exact attack probability is unknown. Thus, it can effectively direct the deployment of defenders. Through experiments, we analyze the perforrmnce of ID-IIG and verify the existence and attainability of the Bayesian Nash equilibrium. Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the security of wireless mesh networks is a precondition for practical use. Intrusion detection is pivotal for increasing network security. Considering the energy limitations in wireless mesh networks, we adopt two types of nodes: Heavy Intrusion Detection Node (HIDN) and Light Intrusion Detection Node (LIDN). To conserve energy, the LIDN detects abnormal behavior according to probability, while the HIDN, which has sufficient energy, is always operational. In practice, it is very difficult to acquire accurate information regarding attackers. We propose an intrusion detection model based on the incomplete information game (ID-IIG). The ID-IIG utilizes the Harsanyi transformation and Bayesian Nash equilibrium to select the best strategies of defenders, although the exact attack probability is unknown. Thus, it can effectively direct the deployment of defenders. Through experiments, we analyze the performance of ID-IIG and verify the existence and attainability of the Bayesian Nash equilibrium.
出处 《China Communications》 SCIE CSCD 2012年第10期23-32,共10页 中国通信(英文版)
基金 This work was partially supported by the National Natural Science Foundation of China under Cxants No. 61272451, No. 61103220, No. 61173154, No. 61173175 the National Critical Patented Projects in the next generation broadband wireless mobile communication network under Grant No. 2010ZX03006-001-01.
关键词 game theory intrusion detection model WMNS 无线Mesh网络 入侵检测模型 不完全信息 贝叶斯纳什均衡 网状网络 节约能源 无线网状网 公共场所
作者简介 Chen .Frog, received his Ph.D. degree from Huazhong University of Science and Technology, Wuhan, China. He is an associate professor at Wuhan University, China. His research interests include network security and wireless network.Du Ruiying, received his Ph.D. degree from Wuhan University, China. She is a professor at Wu- hart University. Her research interests include network security and wireless network.Yu Fajiang, received his Ph.D. degree from Wuhan University, China. He is a lecturer at Wuhan University. HIS research interests include information security and trust corrputing. The corresponding author. Email: qshxyu@126.comZheng Minghui, received his Ph.D. degree from Huazhong University of Science and Technology, Wuhan, China. He is a professor at Hubei University for Nationalities, China. His research interests include network security.Zhang Huanguo, is a professor at Wuhan University, China. His research interests include information security and trust computing.
  • 相关文献

参考文献12

  • 1AKYILDIZ F, WANG Xudong. A Survey on Wireless Mesh Networks[J]. IEEE Communications Magazine, 2005, 43: S23-S30.
  • 2陈晶,李彤,杜瑞颖,傅建明,刘建伟.Efficient Reliable Opportunistic Network Coding Based on Hybrid Flow in Wireless Network[J].China Communications,2011,8(4):125-131. 被引量:5
  • 3ESTIRI M, KHADEMZADEH A. A Game-Theoretical Model for Intrusion Detection in Wireless Sensor Networks [C]// Proceedings of the 23rd Canadian Conference on Electrical and Computer Engineering: May 2-5, 2010, Calgary, AB. IEEE Press, 2010: 1-5.
  • 4CHEN Lin, LENEUTRE J. A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks [J]. IEEE Transactions on Information Forensics and Security, 2009, 4 (2): 165-178.
  • 5LIU Yu, MAN Hong, COMANICIU C. A Game Theoretic Approach to Efficient Mixed Strategies for Intrusion Detection[C]// Proceedings of IEEE International Conference on Communications: June 2006, Istanbul. IEEE Press, 2006, 5 2201-2206.
  • 6DONG Rongsheng, LIU Lianglong, LIU Jianming, et al. Intrusion Detection System Based on Payoff Matrix for Wireless Sensor Networks [C]// Proceedings of the 3rd Intemational Conference on Genetic and Evolutionary Computing: October 14-17, 2009, Guilin China. IEEE Press, 2009: 3-6.
  • 7CHEN Y, WU D, WU C. A Came Theoretic Approach for Deploying Intrusion Detection Agent [J]. Lecture Notes in Computer Science, 2009, 5044 LNAI: 446-451.
  • 8IAU Yu, COMANICIU C, MAN Hong. A Bayesian Game Approach for Intrusion Detection in Wireless Ad Hoc Networks [C]// Proceedings of 2006 Workshop on Game Theory for Communications and Networks. ACM Press, 2006: Article No. 4.
  • 9AWWAD O, AL-FUQAHA A, KHAN, B, et al. Bayesian-Based Game Theoretic Model to Guarantee Cooperativeness in Hybrid RF/FSO Mesh Networks [C]// Proceedings of the 28th IEEE Conference on Global Telecommunications: November 30-December 4, 2009, Honolulu, HI. IEEE Press, 2009: 6547-6553.
  • 10WANG Susheng, KONG Zhaokun, XIE C, et al. Bayesian Nash Equilibrium Analysis of Medical Market under Asymmetry Information [C]//Proceedings of the 4th International Conference on Wireless Communications, Networking and Mobile Computing: October 12-14, 2008, Dalian China. IEEE Press, 2008: 1-4.

二级参考文献23

  • 1ZHANG Y, LEE W. Intrusion detection in wireless ad hoc networks[A]. Proc MobiCom 2000[C]. 2000. 275-283.
  • 2JOHAR.I R, TSITSIKLIS J N. Routing and peering in a competitive Intemet[A]. Conference on Decision and Control[C]. 2004.
  • 3HIJAZI A, NASSER N. Using mobile agents for intrusion detection in wireless ad-hoc networks[A]. Proc of Second IFIP International Conference on Wireless and Optical Communications Networks (WOCN 2005)[C]. 2005.362-366.
  • 4HASSWA A, ZULKERNINE M, HASSANEIN H, Routeguard: an intrusion detection and response system for mobile ad-hoc networks[A]. Proc of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob'2005) vol 3[C]. 2005. 336-343.
  • 5JIANHUA S, FAN H, YAJUN G. A distributed monitoring mechanism for mobile ad-hoc networks[A]. Proc of the 8th International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN'05)[C]. 2005.236-240.
  • 6KETAN N, AMITABH M, A novel intrusion detection approach for wireless ad hoc networks[A]. Wireless Communications and Networking Conference[C]. 2004.831-836.
  • 7HUBAUX P, GROSS T, LE Y, et al. Towards self-organizing mobile ad-hoc networks: the Terminodes project[J]. IEEE Communication Magazine, 2001, 39(1): 118-124.
  • 8MISHRA A, NADKARNI K, PATCHA A. Intrusion detection in wireless ad hoc networks[A]. Proc of IEEE Wireless Communications[C].2004.48-60.
  • 9The network simulator ns-2[EB/OL], http://www.isi.edu/nsnam/ns/. 2009.
  • 10CHRISTINA F,DINA K,ATHINA M.Wireless Network Coding: Opportunities & Challenges. Proceedings of the 2007 Military Communications Conference . 2007

共引文献14

同被引文献1

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部