Intrusion Detection Model Based on Incomplete Information Game in Wireless Mesh Networks

被引:0
|
作者
Chen Jing [1 ]
Du Ruiying [1 ]
Yu Fajiang [1 ]
Zheng Minghui [2 ]
Zhang Huanguo [1 ]
机构
[1] Wuhan Univ, Comp Sch, Wuhan 430079, Peoples R China
[2] Hubei Univ Nationalities, Dept Comp Sci, Enshi 445000, Peoples R China
基金
中国国家自然科学基金;
关键词
pile theory; intrusion detection model; WMNs;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the security of wireless mesh networks is a precondition for practical use. Intrusion detection is pivotal for increasing network security. Considering the energy limitations in wireless mesh networks, we adopt two types of nodes: Heavy Intrusion Detection Node (HIDN) and Light Intrusion Detection Node (LIDN). To conserve energy, the LIDN detects abnormal behavior according to probability, while the HIDN, which has sufficient energy, is always operational. In practice, it is very difficult to acquire accurate information regarding attackers. We propose an intrusion detection model based on the incomplete information game (ID-IIG). The ID-IIG utilizes the Harsanyi transformation and Bayesian Nash equilibrium to select the best strategies of defenders, although the exact attack probability is unknown. Thus, it can effectively direct the deployment of defenders. Through experiments, we analyze the perfomiance of ID-IIG and verify the existence and attainability of the Bayesian Nash equilibrium.
引用
收藏
页码:23 / 32
页数:10
相关论文
共 50 条
  • [31] Intrusion Detection Model for Wireless Sensor Networks Based on FedAvg and XGBoost Algorithm
    Wu, Hongjiao
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2024, 2024
  • [32] Intrusion Detection Model for Wireless Sensor Networks Based on MC-GRU
    Zhou Jingjing
    Yang Tongyu
    Zhang Jilin
    Zhang Guohao
    Li Xuefeng
    Pan Xiang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [33] Intrusion Detection Approach Based on Clustering and Statistical Model for Wireless Sensor Networks
    Zhou, Yinghua
    Shen, Hui
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 1455 - 1460
  • [34] On the Attack-and-Fault Tolerance of Intrusion Detection Systems in Wireless Mesh Networks
    Hassanzadeh, Amin
    Stoleru, Radu
    AD-HOC, MOBILE, AND WIRELESS NETWORKS, ADHOC-NOW 2014, 2014, 8487 : 387 - 401
  • [35] Adaptive link-state routing and intrusion detection in wireless mesh networks
    Misra, S.
    Krishna, P. V.
    Abraham, K. I.
    IET INFORMATION SECURITY, 2010, 4 (04) : 374 - 389
  • [36] PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks
    Hassanzadeh, Amin
    Xu, Zhaoyan
    Stoleru, Radu
    Gu, Guofei
    Polychronakis, Michalis
    COMPUTERS & SECURITY, 2016, 62 : 114 - 132
  • [37] Admission Control in Wireless Mesh Networks based on Game Theory
    He, Rong
    Fang, Xuming
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1303 - 1308
  • [38] CORIDS: a cluster-oriented reward-based intrusion detection system for wireless mesh networks
    Deb, Novarun
    Chakraborty, Manali
    Chaki, Nabendu
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (03) : 532 - 543
  • [39] Signalprint-Based Intrusion Detection in Wireless Networks
    Mitchell, Rob
    Chen, Ing-Ray
    Eltoweissy, Mohamed
    SECURITY IN EMERGING WIRELESS COMMUNICATION AND NETWORKING SYSTEMS, 2010, 42 : 77 - +
  • [40] An Intrusion Detection Algorithm for Wireless Networks Based on ASDL
    Weijun Zhu
    Miaolei Deng
    Qinglei Zhou
    IEEE/CAAJournalofAutomaticaSinica, 2018, 5 (01) : 92 - 107