Share This Article:

Using Bayesian Game Model for Intrusion Detection in Wireless Ad Hoc Networks

Abstract Full-Text HTML Download Download as PDF (Size:932KB) PP. 602-607
DOI: 10.4236/ijcns.2010.37080    6,896 Downloads   11,250 Views   Citations
Author(s)    Leave a comment

ABSTRACT

Wireless ad ho network is becoming a new research fronter, in which security is an important issue. Usually some nodes act maliciously and they are able to do different kinds of Denial of Service (Dos). Because of the limited resource, intrusion detection system (IDS) runs all the time to detect intrusion of the attacker which is a costly overhead. In our model, we use game theory to model the interactions between the intrusion detection system and the attacker, and a realistic model is given by using Bayesian game. We solve the game by finding the Bayesian Nash equilibrium. The results of our analysis show that the IDS could work intermittently without compromising on its effectiveness. At the end of this paper, we provide an experiment to verify the rationality and effectiveness of the proposed model.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

H. Wei and H. Sun, "Using Bayesian Game Model for Intrusion Detection in Wireless Ad Hoc Networks," International Journal of Communications, Network and System Sciences, Vol. 3 No. 7, 2010, pp. 602-607. doi: 10.4236/ijcns.2010.37080.

References

[1] R. Ramanathan and J. Redi, “A Brief Overview of Ad Hoc Networks: Challenges and directions,” IEEE Communications Magzine, Vol. 40, No. 5, 2002, pp. 20-22.
[2] Y. G. Zhang and W. Lee, “Intrusion Detection in Wireless Ad-Hoc Networks,” Proceedings of the 6th Annual International Conference on Mobile Computing and Net- working, Boston, 2000, pp. 275-283.
[3] Y. B. Reddy, “A Game Theory Approach to Detection Mmalicious Nodes in Wireless Sensor Networks,” Proceedings of the 2009 Third International Conference on Sensor Technologies and Applications, June 18-23, 2009, pp. 462-468.
[4] H. Otrok, N. Mohammed, L. Y. Wang, M. Debbabi and P. Bhattacharya, “A Game-Theoretical Intrusion Detection Model for Mobile Ad Hoc Networks,” Computer Communications, Vol. 31, No. 4, 2008, pp. 708-721.
[5] Y. Liu, C. Comaniciu and H. Man, “A Bayesian Game Approach for Intrusion Detetion in Wireless Ad Hoc Networks,” Proceedings from the 2006 Workshop on Game Theory for Communications and Networks, Pisa, Italy, October 14, 2006, pp. 1-12.
[6] Y. Liu, H. Man and C. Comaniciu, “A Game Theoretic Approach to Efficient Mixed Strategies for Intrusion Detection,” IEEE International Conference on Communications, Istanbul, 2006, pp. 2201-2206.
[7] A. Agah, S. K. Das, K. Basu and M. Asadi, “Intrusion Detection in Sensor Networks: A Non-Cooperative Game Approach,” Proceedings of the Third IEEE International Symposium on Network Computing and Applications, Boston, August-September 2004, pp. 343-346.
[8] T. Alpcan and T. Basar, “A Game Theoretic Approach to Decision and Analysis in Network Intrusion Detection,” Proceedings of the 42nd IEEE Conference on Decision and Control, Maui, Hawaii, December 2003, pp. 2595- 2600.
[9] N. Marchang and R. Tripathi, “A Game Theoretical Approach for Efficient Deployment of Intrusion Detection System in Mobile Ad Hoc Networks,” Proceedings of the 15th International Conference on Advanced Computing and Communications, Guwahati, 2007, pp. 460-464.
[10] T. Poongothai and K. Jayara, “A Noncooperative Game Approach for Intrusion Detection in Mobile Ad Hoc Networks,” Proceedings of the 2008 International Conference on Computing Communication and Networking, St. Thomas, VI, December 18-20, 2008, pp. 1-4.
[11] A. Patcha and J.-M. Park, “A Game Theoretic Approach to Modeling Intrusion Detection in Mobile Ad Hoc Networks,” Proceedings of the 2004 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, June 10-11, 2004, pp. 30-34.
[12] M. Willem, “Minimax Theorem,” Birkhauser, Boston, 1996.

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.