Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2015 (2015), Article ID 179839, 10 pages
Research Article

Quantal Response Equilibrium-Based Strategies for Intrusion Detection in WSNs

1Department of Computer Science and Engineering, Shaoxing University, Shaoxing 312000, China
2College of Mathematics, Physics and Information Engineering, Jiaxing University, Jiaxing 314001, China
3College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou 310014, China
4College of Computer Science and Technology, Donghua University, Shanghai 201620, China

Received 29 April 2015; Revised 18 July 2015; Accepted 21 July 2015

Academic Editor: Laurence T. Yang

Copyright © 2015 Shigen Shen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


This paper is to solve the problem stating that applying Intrusion Detection System (IDS) to guarantee security of Wireless Sensor Networks (WSNs) is computationally costly for sensor nodes due to their limited resources. For this aim, we obtain optimal strategies to save IDS agents’ power, through Quantal Response Equilibrium (QRE) that is more realistic than Nash Equilibrium. A stage Intrusion Detection Game (IDG) is formulated to describe interactions between the Attacker and IDS agents. The preference structures of different strategy profiles are analyzed. Upon these structures, the payoff matrix is obtained. As the Attacker and IDS agents interact continually, the stage IDG is extended to a repeated IDG and its payoffs are correspondingly defined. The optimal strategies based on QRE are then obtained. These optimal strategies considering bounded rationality make IDS agents not always be in Defend. Sensor nodes’ power consumed in performing intrusion analyses can thus be saved. Experiment results show that the probabilities of the actions adopted by the Attacker can be predicted and thus the IDS can respond correspondingly to protect WSNs.