Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2015, Article ID 179839, 10 pages
http://dx.doi.org/10.1155/2015/179839
Research Article

Quantal Response Equilibrium-Based Strategies for Intrusion Detection in WSNs

1Department of Computer Science and Engineering, Shaoxing University, Shaoxing 312000, China
2College of Mathematics, Physics and Information Engineering, Jiaxing University, Jiaxing 314001, China
3College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou 310014, China
4College of Computer Science and Technology, Donghua University, Shanghai 201620, China

Received 29 April 2015; Revised 18 July 2015; Accepted 21 July 2015

Academic Editor: Laurence T. Yang

Copyright © 2015 Shigen Shen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Computer Networks, vol. 52, no. 12, pp. 2292–2330, 2008. View at Publisher · View at Google Scholar · View at Scopus
  2. A. Ramos and R. H. Filho, “Sensor data security level estimation scheme for wireless sensor networks,” Sensors, vol. 15, no. 1, pp. 2104–2136, 2015. View at Publisher · View at Google Scholar · View at Scopus
  3. A. Derhab, A. Bouras, M. R. Senouci, and M. Imran, “Fortifying intrusion detection systems in dynamic Ad Hoc and wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2014, Article ID 608162, 15 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. R. Mitchell and I.-R. Chen, “A survey of intrusion detection in wireless network applications,” Computer Communications, vol. 42, pp. 1–23, 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. I. Butun, S. D. Morgera, and R. Sankar, “A survey of intrusion detection systems in wireless sensor networks,” IEEE Communications Surveys and Tutorials, vol. 16, no. 1, pp. 266–282, 2014. View at Publisher · View at Google Scholar · View at Scopus
  6. C.-F. Hsieh, R.-C. Chen, and Y.-F. Huang, “Applying an ontology to a patrol intrusion detection system for wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2014, Article ID 634748, 14 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. S.-H. Seo, J. Won, S. Sultana, and E. Bertino, “Effective key management in dynamic wireless sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 2, pp. 371–383, 2015. View at Publisher · View at Google Scholar · View at Scopus
  8. R. Soosahabi, M. Naraghi-Pour, D. Perkins, and M. A. Bayoumi, “Optimal probabilistic encryption for secure detection in wireless sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 3, pp. 375–385, 2014. View at Publisher · View at Google Scholar · View at Scopus
  9. A. Abduvaliyev, A.-S. K. Pathan, J. Zhou, R. Roman, and W.-C. Wong, “On the vital areas of intrusion detection systems in wireless sensor networks,” IEEE Communications Surveys and Tutorials, vol. 15, no. 3, pp. 1223–1237, 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. N. A. Alrajeh, S. Khan, and B. Shams, “Intrusion detection systems in wireless sensor networks: a review,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 167575, 7 pages, 2013. View at Publisher · View at Google Scholar
  11. M. H. Manshaei, Q. Zhu, T. Alpcan, T. Basar, and J.-P. Hubaux, “Game theory meets network security and privacy,” ACM Computing Surveys, vol. 45, no. 3, article 25, 39 pages, 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. S. Shen, G. Yue, Q. Cao, and F. Yu, “A survey of game theory in wireless sensor networks security,” Journal of Networks, vol. 6, no. 3, pp. 521–532, 2011. View at Publisher · View at Google Scholar · View at Scopus
  13. X. Liang and Y. Xiao, “Game theory for network security,” IEEE Communications Surveys and Tutorials, vol. 15, no. 1, pp. 472–486, 2013. View at Publisher · View at Google Scholar · View at Scopus
  14. H.-Y. Shi, W.-L. Wang, N.-M. Kwok, and S.-Y. Chen, “Game theory for wireless sensor networks: a survey,” Sensors, vol. 12, no. 7, pp. 9055–9097, 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. M. D. McCubbins, M. Turner, and N. Weller, “Testing the foundations of quantal response equilibrium,” in Social Computing, Behavioral-Cultural Modeling and Prediction, vol. 7812 of Lecture Notes in Computer Science, pp. 144–153, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar
  16. H. Al-Hamadi and I.-R. Chen, “Redundancy management of multipath routing for intrusion tolerance in heterogeneous wireless sensor networks,” IEEE Transactions on Network and Service Management, vol. 10, no. 2, pp. 189–203, 2013. View at Publisher · View at Google Scholar · View at Scopus
  17. H. Al-Hamadi and I. R. Chen, “Integrated intrusion detection and tolerance in homogeneous clustered sensor networks,” ACM Transactions on Sensor Networks, vol. 11, no. 3, article 47, 24 pages, 2015. View at Publisher · View at Google Scholar
  18. E. J. Cho, C. S. Hong, S. Lee, and S. Jeon, “A partially distributed intrusion detection system for wireless sensor networks,” Sensors, vol. 13, no. 12, pp. 15863–15879, 2013. View at Publisher · View at Google Scholar · View at Scopus
  19. A. H. Farooqi, F. A. Khan, J. Wang, and S. Lee, “A novel intrusion detection framework for wireless sensor networks,” Personal and Ubiquitous Computing, vol. 17, no. 5, pp. 907–919, 2013. View at Publisher · View at Google Scholar · View at Scopus
  20. I. Kim, D. Oh, M. K. Yoon, K. Yi, and W. W. Ro, “A distributed signature detection method for detecting intrusions in sensor systems,” Sensors, vol. 13, no. 4, pp. 3998–4016, 2013. View at Publisher · View at Google Scholar · View at Scopus
  21. B. Sun, X. Shan, K. Wu, and Y. Xiao, “Anomaly detection based secure in-network aggregation for wireless sensor networks,” IEEE Systems Journal, vol. 7, no. 1, pp. 13–25, 2013. View at Publisher · View at Google Scholar · View at Scopus
  22. S. Shamshirband, N. B. Anuar, M. L. M. Kiah et al., “Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks,” Journal of Network and Computer Applications, vol. 42, pp. 102–117, 2014. View at Publisher · View at Google Scholar · View at Scopus
  23. M. Riecker, S. Biedermann, R. El Bansarkhani, and M. Hollick, “Lightweight energy consumption-based intrusion detection system for wireless sensor networks,” International Journal of Information Security, vol. 14, no. 2, pp. 155–167, 2015. View at Google Scholar
  24. S. Shen, Y. Li, H. Xu, and Q. Cao, “Signaling game based strategy of intrusion detection in wireless sensor networks,” Computers & Mathematics with Applications, vol. 62, no. 6, pp. 2404–2416, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  25. J.-Y. Huang, I.-E. Liao, Y.-F. Chung, and K.-T. Chen, “Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining,” Information Sciences. An International Journal, vol. 231, pp. 32–44, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  26. H. Moosavi and F. M. Bui, “A game-theoretic framework for robust optimal intrusion detection in wireless sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 9, pp. 1367–1379, 2014. View at Publisher · View at Google Scholar · View at Scopus
  27. S. Shen, R. Han, L. Guo, W. Li, and Q. Cao, “Survivability evaluation towards attacked WSNs based on stochastic game and continuous-time Markov chain,” Applied Soft Computing, vol. 12, no. 5, pp. 1467–1476, 2012. View at Publisher · View at Google Scholar · View at Scopus
  28. S. Shen, H. Li, R. Han, A. V. Vasilakos, Y. Wang, and Q. Cao, “Differential game-based strategies for preventing malware propagation in wireless sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 11, pp. 1962–1973, 2014. View at Publisher · View at Google Scholar · View at Scopus
  29. S. Shamshirband, A. Patel, N. B. Anuar, M. L. M. Kiah, and A. Abraham, “Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks,” Engineering Applications of Artificial Intelligence, vol. 32, pp. 228–241, 2014. View at Publisher · View at Google Scholar · View at Scopus
  30. J. Liu, S. Shen, G. Yue, R. Han, and H. Li, “A stochastic evolutionary coalition game model of secure and dependable virtual service in Sensor-Cloud,” Applied Soft Computing, vol. 30, pp. 123–135, 2015. View at Publisher · View at Google Scholar · View at Scopus
  31. A. B. MacKenzie and L. A. DaSilva, Game Theory for Wireless Engineers, Morgan & Claypool Publishers, San Rafael, Calif, USA, 2006.
  32. A. Agah and S. K. Das, “Preventing DoS attacks in wireless sensor networks: a repeated game theory approach,” International Journal of Network Security, vol. 5, no. 2, pp. 145–153, 2007. View at Google Scholar · View at Scopus
  33. C. Pandana, Z. Han, and K. J. R. Liu, “Cooperation enforcement and learning for optimizing packet forwarding in autonomous wireless networks,” IEEE Transactions on Wireless Communications, vol. 7, no. 8, pp. 3150–3163, 2008. View at Publisher · View at Google Scholar · View at Scopus
  34. J. Chen, S. Lian, C. Fu, and R. Du, “A hybrid game model based on reputation for spectrum allocation in wireless networks,” Computer Communications, vol. 33, no. 14, pp. 1623–1631, 2010. View at Publisher · View at Google Scholar · View at Scopus
  35. Z. Kong and Y.-K. Kwok, “Efficient wireless packet scheduling in a non-cooperative environment: game theoretic analysis and algorithms,” Journal of Parallel and Distributed Computing, vol. 70, no. 8, pp. 790–799, 2010. View at Publisher · View at Google Scholar · View at Scopus
  36. B. Niu, H. V. Zhao, and H. Jiang, “A cooperation stimulation strategy in wireless multicast networks,” IEEE Transactions on Signal Processing, vol. 59, no. 5, pp. 2355–2369, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  37. R. Trestian, O. Ormond, and G.-M. Muntean, “Reputation-based network selection mechanism using game theory,” Physical Communication, vol. 4, no. 3, pp. 156–171, 2011. View at Publisher · View at Google Scholar · View at Scopus
  38. S. Kandeepan, S. K. Jayaweera, and R. Fedrizzi, “Power-trading in wireless communications: a cooperative networking business model,” IEEE Transactions on Wireless Communications, vol. 11, no. 5, pp. 1872–1880, 2012. View at Publisher · View at Google Scholar · View at Scopus
  39. Y. E. Sagduyu, R. A. Berry, and A. Ephremides, “Jamming games in wireless networks with incomplete information,” IEEE Communications Magazine, vol. 49, no. 8, pp. 112–118, 2011. View at Publisher · View at Google Scholar · View at Scopus
  40. D. Hao, X. Liao, A. Adhikari, K. Sakurai, and M. Yokoo, “A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks,” Computer Communications, vol. 35, no. 17, pp. 2125–2137, 2012. View at Publisher · View at Google Scholar · View at Scopus
  41. P. Zhou, Y. Chang, and J. A. Copeland, “Reinforcement learning for repeated power control game in cognitive radio networks,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 1, pp. 54–69, 2012. View at Publisher · View at Google Scholar · View at Scopus
  42. M. Zhu and S. Martínez, “Distributed coverage games for energy-aware mobile sensor networks,” SIAM Journal on Control and Optimization, vol. 51, no. 1, pp. 1–27, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  43. Y. Luo, F. Szidarovszky, Y. Al-Nashif, and S. Hariri, “A fictitious play-based response strategy for multistage intrusion defense systems,” Security and Communication Networks, vol. 7, no. 3, pp. 473–491, 2014. View at Publisher · View at Google Scholar · View at Scopus
  44. Y. Sun, Y. Guo, Y. Ge, S. Lu, J. Zhou, and E. Dutkiewicz, “Improving the transmission efficiency by considering non-cooperation in ad hoc networks,” Computer Journal, vol. 56, no. 8, pp. 1034–1042, 2013. View at Publisher · View at Google Scholar · View at Scopus
  45. D. B. Smith, M. Portmann, W. L. Tan, and W. Tushar, “Multi-source-destination distributed wireless networks: pareto-efficient dynamic power control game with rapid convergence,” IEEE Transactions on Vehicular Technology, vol. 63, no. 6, pp. 2744–2754, 2014. View at Publisher · View at Google Scholar · View at Scopus
  46. A. A. Daoud, G. Kesidis, and J. Liebeherr, “Zero-determinant strategies: a game-theoretic approach for sharing licensed spectrum bands,” IEEE Journal on Selected Areas in Communications, vol. 32, no. 11, pp. 2297–2308, 2014. View at Publisher · View at Google Scholar · View at Scopus
  47. D. Hao, Z.-H. Rong, and T. Zhou, “Zero-determinant strategy: an underway revolution in game theory,” Chinese Physics B, vol. 23, no. 7, Article ID 078905, 2014. View at Publisher · View at Google Scholar · View at Scopus
  48. A. Farraj, E. Hammad, A. Al Daoud, and D. Kundur, “A game-theoretic analysis of cyber switching attacks and mitigation in smart grid systems,” IEEE Transactions on Smart Grid, 2015. View at Publisher · View at Google Scholar
  49. H. Zhang, N. Dusit, L. Song, T. Jiang, and Z. Han, “Zero-determinant strategy in cheating management of wireless cooperation,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM '14), pp. 4382–4386, Austin, Tex, USA, December 2014. View at Publisher · View at Google Scholar
  50. D. Hao, Z. Rong, and T. Zhou, “Extortion under uncertainty: zero-determinant strategies in noisy games,” Physical Review E—Statistical, Nonlinear, and Soft Matter Physics, vol. 91, no. 5, Article ID 052803, 8 pages, 2015. View at Google Scholar
  51. R. Yang, C. Kiekintveld, F. Ordóñez, M. Tambe, and R. John, “Improving resource allocation strategies against human adversaries in security games: an extended study,” Artificial Intelligence, vol. 195, pp. 440–469, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  52. I. Kantzavelou and S. Katsikas, “A game-based intrusion detection mechanism to confront internal attackers,” Computers & Security, vol. 29, no. 8, pp. 859–874, 2010. View at Publisher · View at Google Scholar · View at Scopus
  53. A. H. Farooqi and F. A. Khan, “A survey of intrusion detection systems for wireless sensor networks,” International Journal of Ad Hoc and Ubiquitous Computing, vol. 9, no. 2, pp. 69–83, 2012. View at Publisher · View at Google Scholar · View at Scopus
  54. K. Binmore, Playing for Real : A Text on Game Theory, Oxford University Press, New York, NY, USA, 2007. View at Publisher · View at Google Scholar · View at MathSciNet
  55. R. D. McKelvey and T. R. Palfrey, “Quantal response equilibria for extensive form games,” Experimental Economics, vol. 1, no. 1, pp. 9–41, 1998. View at Publisher · View at Google Scholar
  56. R. D. McKelvey, A. M. McLennan, and T. L. Turocy, “Gambit: Software Tools for Game Theory,” Version 14.1.0, 2014, http://www.gambit-project.org/.