Research Article  Open Access
Rui Zhang, Hui Xia, Shushu Shao, Hang Ren, Shuai Xu, Xiangguo Cheng, "An Intrusion Detection Scheme Based on Repeated Game in Smart Home", Mobile Information Systems, vol. 2020, Article ID 8844116, 9 pages, 2020. https://doi.org/10.1155/2020/8844116
An Intrusion Detection Scheme Based on Repeated Game in Smart Home
Abstract
Smart Home brings a new peopleoriented home life experience. However, the edge devices in this system are facing severe threats such as data security and equipment safety. To solve the above problems, this paper proposes an intrusion detection scheme based on repeated game. We first use the KNearest Neighbors (KNN) algorithm to classify edge devices and equip the intrusion detection system to cluster heads. Secondly, we use the regret minimization algorithm to determine the mixed strategy Nash equilibrium of the oneorder game and then take a severe punishment strategy to domesticate malicious attackers. Thirdly, the intrusion detection system can detect malicious attackers by reduction of payoff. Finally, the detailed experimental results show that the proposed scheme can reduce the loss of attacked intrusion detection system and then achieve the purpose of defending against the attacker.
1. Introduction
Internet of things (IoT) is entering people’s lives and makes the production and life of human beings more intelligent and convenient. Smart Home is a typical application of the IoT [1]. Smart Home integrates integrated wiring technology and network communication technology and is an effective management system [2]. However, Smart Home is facing severe security threats such as data security and device security [3]. The distribution of edge devices is too scattered to apply security technologies in a Smart Home. Besides, some equipment uses outdated versions that are unable to remotely upgrade weaknesses and vulnerabilities, making Smart Home devices vulnerable to attacks. For instance, equipment such as cameras and smart thermostats collect information about people’s daily lives which can be traced directly or indirectly back to the person. Once the data of Smart Home devices is stolen, users’ private information will be disclosed. Therefore, it is urgent to design an effective security protection scheme to ensure user data security in the Smart Home.
Intrusion detection technology is a method to resist the attacker invasion, which can monitor, analyze, and deal with a variety of intrusions without affecting network performance as much as possible to improve the ability of networks to deal with external threats. According to the technology used, intrusion detection technology can be divided into three categories: anomaly detection, misuse intrusion detection, and hybrid intrusion detection. The abnormal detection technology can detect the new intrusion, but it is difficult to establish the attacker’s behavior model [4]. Misuse detection technology has high detection accuracy, but it is difficult to collect and update intrusion information [5]. Hybrid intrusion detection technology combines misuse detection and anomaly detection, inherits the advantages of both, improves the detection rate, and decreases false positive rate [6]. To sum up, the existing intrusion detection technologies mainly have the following shortcomings: the volume of data is too difficult to process and the data dimension is too high to be reduced.
Inspired by the above schemes, this paper models interactions between attackers and intrusion detection systems as the repeated game and proposes an intrusion detection scheme based on repeated game to protect the security of Smart Home. The main contributions are as follows:(1)To reduce the cost of equipping the intrusion detection system, this paper uses the KNearest Neighbors (KNN) algorithm to classify edge devices and equips the intrusion detection system for cluster heads to achieve the purpose of protecting Smart Home system.(2)To defend against attackers, we build interactions between attackers and intrusion detection systems as a repeated game model, use the regret minimization algorithm to determine the mixed strategy Nash equilibrium of this game, and set the severe punishment mechanism to force the attacker to take good action.(3)For the part of the simulation experiment, we compare the proposed scheme with Winner, ALLS, ALLP, and ALLR with three factors: the intrusion detection rate, the attacker’s payoff, and the intrusion detection system’s payoff. The experimental results show that the proposed scheme can resist attackers.
The remainder of this paper is organized as follows: Section 2 describes the representative achievements of intrusion detection technology. We propose an intrusion detection scheme based on repeated game in Smart Home in Section 3. Section 4 shows the performance of intrusion detection scheme based on repeated game. Finally, Section 5 summarizes the possible expansion and research directions in the future.
2. Related Work
Intrusion detection technology [7] can be divided into three types: anomaly detection, misuse detection, and hybrid intrusion detection. This section mainly summarizes two kinds of techniques of anomaly detection and misuse detection.
The anomaly intrusion detection [8] takes the intrusion activity as a subset of the anomaly activity, which is divided into feature selectionbased anomaly detection, Bayesian inferencebased anomaly detection, and pattern predictionbased anomaly detection. The feature selectionbased anomaly detection is to accurately predict or classify detected intrusions by selecting a subset of metrics that can detect intrusions [9, 10]. However, the metric set cannot encompass all the various intrusion types; and the preidentified specific metric set may miss intrusions in a particular environment alone. The Bayesian inferencebased anomaly detection is to judge whether the system has an intrusion event by measuring the variable [11, 12]. However, this method requires correlation analysis of each variable for determining the relationship between each variable and the intrusion event. The pattern predictionbased anomaly detection considers the sequence of intrusion events and their correlation [13, 14], but the unrecognized behavior pattern is judged as an abnormal event in this method.
Misuse intrusion detection [15, 16] detects intrusion events by matching the defined intrusion pattern with the observed intrusion behavior, which can be divided into contingent probabilitybased misuse intrusion detection, state transition analysisbased misuse intrusion detection, and keyboard monitoringbased misuse intrusion detection. The contingent probabilitybased misuse intrusion detection maps the intrusion to an event sequence and then infers the intrusion occurrence by observing the event [17, 18]. However, in this method, the prior probability is hard to give, and the event independences are hard to be satisfied. The state transition analysisbased misuse intrusion detection regards an attack as a series of state transitions of monitored systems [19, 20]. However, the attack mode can only describe the sequence of events and is not suitable for describing complicated events. The keyboard monitoringbased misuse intrusion detection assumes that the intrusion corresponds to a specific keystroke sequence pattern and then monitors the user keystroke pattern and matches this pattern with the intrusion pattern to detect intrusion [21, 22]. But this approach, without operating system support, lacks a reliable way to capture users’ keystrokes, and users can easily cheat the technique by using alias commands.
To solve the above problems, we no longer detect the intrusion based on the characteristics of the attacker but consider intrusion detection system’s payoff; that is, the intrusion detection system detects the attacker invasion by observing its payoff decrease.
3. Intrusion Detection Scheme Based on Repeated Game
This section describes how the intrusion detection system detects the attacker’s malicious action and how to educate the malicious attackers to take good strategy. The notations definitions are shown in Table 1.

3.1. OneOrder Game
In Smart Home, due to a large number of edge devices and limited service capacity [23, 24], it is impossible to run the intrusion detection system on each edge device, so we need to design a strategy to allocate the intrusion detection system on the edge device. We first use the clustering algorithm to divide edge devices into multiple clusters and then configure intrusion detection system for each clusterhead node in Smart Home [25, 26]. Each cluster has a clusterhead node and several member nodes. The former is mainly responsible for information forwarding and executing the intrusion detection program within the cluster, and the latter is responsible for collecting information and passing the information to the clusterhead node [27, 28]. Suppose that there are N edge devices, which are divided into k clusters by KNN algorithm, . We assume that an attacker can attack one cluster head at a time and model interactions between the intrusion detection systems and attackers as a oneorder game model. That is,where P is the player in oneorder game, that is, the intrusion detection system and the attacker, . is the strategy space, , and U is the player’s payoff. The attacker has four strategies, . refers to the fact that attackers do not attack any cluster heads; refers to the fact that attackers attack the clusterhead node ; refers to the fact that attackers attack cluster heads after T times; refers to the fact that attackers attack the clusterhead node . Also, the intrusion detection system has four strategies, . refers to the fact that intrusion detection systems do not protect any cluster heads; refers to the fact that intrusion detection systems protect the cluster head ; refers to the fact that intrusion detection systems protect cluster heads after T times; refers to the fact that intrusion detection systems protect the cluster head . Therefore, the strategy profile of attacker and intrusion detection system can be defined as
The row represents the attacker’s strategy and the column represents the intrusion detection system’s strategy in M. Suppose that and are the payoffs of attackers and intrusion detection systems, respectively. Thus,where a refers to the attacker and d refers to the intrusion detection system. The strategy profile refers to the fact that the attacker does not attack the cluster head, whereas the intrusion detection system protects the cluster head. At this time, the attacker gains the payoff 0 at the cost of , , and the intrusion detection system at the cost of to gain the payoff , . Similarly, we can get the payoff matrix of attackers and intrusion detection systems, as shown in X and Y:where is the cost of attacking cluster heads , is the cost of attacking cluster heads after T times, is the cost of persistently protecting cluster heads , is the cost of protecting cluster heads after T times, is the payoff of attacking cluster heads , and is the payoff of intrusion detection systems against attacks. It can be seen from the payoff matrix that there is no pure strategy Nash equilibrium in this game, and the intrusion detection system can observe malicious attackers according to its payoff decrease. Besides, the intrusion detection system always tries to determine the cluster head attacked by the attacker and then protect it to maximize its payoff. Therefore, we use the regret minimization algorithm that determines the selection method of that future action according to the degree of regret to determine the players’ mixed strategy Nash equilibrium. Thus, the probability of playing strategy in round T is defined as follows:where is the intrusion detection system’s strategy set, is the regret value of playing strategy , and is the cumulative regret value for all strategies.
3.2. Repeated Game
During the process of interaction between the attacker and intrusion detection system, the intrusion detection system can detect attackers’ invasion by observing the changes of their payoff. However, the attacker does not have the effect of his current strategy on the future payoff, that is, he only considers the payoff of one interaction; therefore, it is difficult to prevent the attacker in the oneorder game. But if the intrusion detection system punishes the attacker, the attacker will have to consider the cost of the penalty brought by the intrusion detection system in the repeated game; and if the punishment cost of attacking exceeds the payoff of attacking, the attacker will be forced to take a nonattack strategy. Thus, the intrusion detection system does not need to implement supervision and then achieve the purpose of maintaining the normal order of the entire network.
In the repeated game, assuming that is the strategy adopted by player e in the tth round, the strategy set of player e in the previous T round is . The total payoff of player e can be expressed aswhere is the discount factor, . The bigger is, the more e pays attention to longterm payoff; and the smaller is, the more player e pays attention to current payoff. Since the intrusion detection system cannot detect the attacker for the first time, we assume that the detection rate of the intrusion detection system to the attacker is less than 1, . The probability of an attacker being discovered by an intrusion detection system after k times of attack is . The total payoff of the attacker is
In previous researches on network security protection, once an attacker is captured by the intrusion detection system, the network will delete this node. However, it will affect the whole network and will have no containment effect on the attacker’s action. Therefore, this paper designs a severe punishment mechanism to educate captured attackers into regular players. When the attacker is found to be uncooperative at the time slot k, within T penalty cycles, that is, , the attacker’s payoff can be defined as
If the node is detected during the second attack, the node will be punished with a period of 2T, and the total payoff of the attacker in the penalty cycle is
The loss of attacker in penalty cycle is
We regard the loss of the attacker in the penalty cycle as an additional reward to the intrusion detection system. Therefore, the intrusion detection system’s payoff can be defined aswhere is the loss of attackers in the penalty cycle.
By comparing the attacker’s payoffs over the two penalty cycles, it can be seen that the attacker’s payoffs decrease with increasing the number of betrayals. Besides, if the number of defections by an attacker exceeds the threshold of the intrusion detection system, the attacker will be eliminated; and the clusterhead node will no longer interact with the attacker.
4. Simulation Experiment
This paper uses Anaconda integrated development tool to verify the intrusion detection scheme based on repeated game. Firstly, we simulate the classification process of KNN algorithm and set four newly added nodes to prove its effectiveness. Secondly, we compare the payoffs of attackers and the intrusion detection systems in penalty cycles and regular interaction cycles to verify the effectiveness of the penalty mechanism. Thirdly, we determine the optimal strategy for each round of interaction between the attacker and intrusion detection system by using the regret minimization algorithm. Finally, we compare the proposed scheme with four interaction strategies, Winner (take the strategy of the winner), ALLS (remain strategy Scissor), ALLP (remain strategy Paper), and ALLR (remain strategy Rock), to prove that the proposed scheme can improve the player’s payoff. The experimental parameters are shown in Table 2.

4.1. The Classification Results of KNN
Figure 1 depicts the classification results of the KNN algorithm. Figure 1(a) shows the original distribution of edge device nodes. Figure 1(b) shows the classification results of the KNN algorithm, with each symbol representing a class of edge devices.
(a)
(b)
Figure 2 analyzes the results of the classification of the newly added nodes, with the newly added nodes marked in blue. For example, in Figure 2(a), the blue node (the newly added node) is classified as a first class.
(a)
(b)
(c)
(d)
4.2. The Comparison of the Attacker’s Payoff and Intrusion Detection System’s Payoff
Figure 3 compares the attackers’ payoffs in regular interaction cycles and penalty cycles. As you can see in Figure 3(a), the attacker’s payoff does not change during regular interaction cycles, because the intrusion detection system does not play the defensive strategy. Figure 3(b) shows that the attacker’s payoff gradually decreased with increasing the number of interactions. In the 4th interaction, the attacker’s payoff tends to zero. Besides, the longer the penalty cycle is, the faster the attacker’s payoffs will go to zero, and the larger the losses will be. This happened due to the punishment mechanism in this paper. Therefore, for a rational attacker, it must normally interact with the intrusion detection system to maximize its payoff.
(a)
(b)
Figure 4 compares the intrusion detection system’s payoffs in the regular interaction cycle and the penalty cycle. It can be seen from Figure 4(a) that the intrusion detection system’s payoff is −3 during the regular interaction cycle. This is because the attacked intrusion detection system does not play any defective strategy. Figure 4(b) shows that the loss of the intrusion detection system decreases with increasing the number of penalty cycles; and the payoff of the intrusion detection system is the lowest when the penalty period is 5. To sum up, the proposed scheme can reduce the loss of intrusion detection systems when attackers launch attacks.
(a)
(b)
4.3. Application of Regret Minimization Algorithm in RockPaperScissors Game
Table 3 defines the payoff matrix of two players in the rockpaperscissors game. In this table, the rows represent the strategy of player A, the columns represent the strategy of player B, the first element in the tuple (0, 0) represents the payoff of player A, and the second element represents the payoff of player B.

Table 4 analyzes how player A determines its optimal strategy based on the regret minimization algorithm. For example, in the first round, player A and player B choose Rock and Paper, respectively, and then player A’s regret values when playing Scissor, Rock, and Paper are 0, 2, and 1, respectively; thus the probabilities of player playing Rock, Scissor, and Paper are 0, 2/3, and 1/3, respectively. Similarly, we can obtain the optimal strategy of player A in each round.

4.4. The Payoff Comparison between Player A and Player B
Table 5 compares the payoffs of player A and player B when player A adopts five strategies: regret minimization strategy (Regret), ALLR, ALLP, ALLS, and Winner, while player B adopts a regret minimization strategy. As can be seen from Table 5, when and only if player A adopts ALLP, player B adopts Regret to obtain a lower payoff than player A, but the difference in payoff between player A and player B is small. However, under several other strategies, player B obtains the highest payoff by taking Regret. This is because player B maximizes the probability of the strategy with the maximum regret value. The payoff change curves of players A and B are shown in Figure 5. In this figure, the sharp increase and decrease in the payoffs of player A and player B are due to the adjustment of both players’ strategies.

(a)
(b)
5. Conclusion
Designing an efficient and safe protection scheme is the key to promoting the application of the system. This paper proposes a security protection scheme based on repeated game. In this scheme, the intrusion detection system detects the malicious attackers by observing its payoff change and punishes the attackers who adopt malicious strategy severely to educate the attackers to take good action. The experimental results show that the proposed scheme can effectively defend against the attackers.
In future research studies, we will continue to explore new methods to determine the player’s optimal strategy in the finite model.
Data Availability
The data used to support the findings of this study are included within the article.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
Acknowledgments
This research was supported by the National Natural Science Foundation of China (NSFC) under Grant no. 61872205, the Shandong Provincial Natural Science Foundation under Grant no. ZR2019MF018, and the Source Innovation Program of Qingdao under Grant no. 182256jch.
References
 N. Chen, T. Qiu, X. Zhou, K. Li, and M. Atiquzzaman, “An intelligent robust networking mechanism for the internet of things,” IEEE Communications Magazine, vol. 57, no. 11, pp. 91–95, 2019. View at: Publisher Site  Google Scholar
 X. Zheng, Z. Cai, and Y. Li, “Data linkage in smart internet of things systems: a consideration from a privacy perspective,” IEEE Communications Magazine, vol. 56, no. 9, pp. 55–61, 2018. View at: Publisher Site  Google Scholar
 H. Xia, L. Li, X. Cheng, C. Liu, and T. Qiu, “A dynamic virus propagation model based on social attributes in city IoTs,” IEEE Internet of Things Journal, 2020. View at: Publisher Site  Google Scholar
 M. A. Hatef, V. Shaker, M. Reza Jabbarpour, J. Jung, and H. Zarrabi, “HIDCC: a hybrid intrusion detection approach in cloud computing,” Concurrency and Computation: Practice and Experience, vol. 30, no. 3, p. e4171, 2018. View at: Publisher Site  Google Scholar
 S. Venkatraman and B. Surendiran, “Adaptive hybrid intrusion detection system for crowd sourced multimedia internet of things systems,” Multimedia Tools and Applications, vol. 79, no. 56, pp. 3993–4010, 2020. View at: Publisher Site  Google Scholar
 K. K. R. Amrita, “A hybrid intrusion detection system: integrating hybrid feature selection approach with heterogeneous ensemble of intelligent classifiers,” International Journal of Network Security, vol. 20, no. 1, pp. 41–55, 2018. View at: Google Scholar
 T. Qiu, J. Liu, W. Si, and D. O. Wu, “Robustness optimization scheme with multipopulation Coevolution for scalefree wireless sensor networks,” IEEE/ACM Transactions on Networking, vol. 27, no. 3, pp. 1028–1042, 2019. View at: Publisher Site  Google Scholar
 H. Xia, L. Li, X. Cheng, X. Cheng, and T. Qiu, “Modeling and analysis botnet propagation in social internet of things,” IEEE Internet of Things Journal, vol. 7, no. 8, 2020. View at: Publisher Site  Google Scholar
 M. Ahmed, A. Naser Mahmood, and J. Hu, “A survey of network anomaly detection techniques,” Journal of Network and Computer Applications, vol. 60, pp. 19–31, 2016. View at: Publisher Site  Google Scholar
 R. Chalapathy and S. Chawla, “Deep learning for anomaly detection: a survey,” 2019, https://arxiv.org/abs/1901.03407. View at: Google Scholar
 W. Sultani, C. Chen, and M. Shah, “Realworld anomaly detection in surveillance videos,” in Proceedings of the 31st IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 6479–6488, Salt Lake City, UT, USA, June 2018. View at: Publisher Site  Google Scholar
 D. Kwon, H. Kim, and K. J. Kim, “A survey of deep learningbased network anomaly detection,” Cluster Computing, vol. 22, pp. 1–13, 2017. View at: Publisher Site  Google Scholar
 A. H. Hamamoto, L. F. Carvalho, L. D. H. Sampaio, T. Abrão, and M. L. Proença, “Network anomaly detection system using genetic algorithm and fuzzy logic,” Expert Systems with Applications, vol. 92, pp. 390–402, 2018. View at: Publisher Site  Google Scholar
 X. Kong, X. Song, F. Xia, H. Guo, J. Wang, and A. Tolba, “LoTAD: longterm traffic anomaly detection based on crowdsourced bus trajectory data,” World Wide Web, vol. 21, no. 3, pp. 825–847, 2018. View at: Publisher Site  Google Scholar
 H. Xia, S.S. Zhang, Y. Li, Z.K. Pan, X. Peng, and X.Z. Cheng, “An attackresistant trust inference model for securing routing in vehicular ad hoc networks,” IEEE Transactions on Vehicular Technology, vol. 68, no. 7, pp. 7108–7120, 2019. View at: Publisher Site  Google Scholar
 X. Zheng, Z. Cai, J. Yu, C. Wang, and Y. Li, “Follow but no track: privacy preserved profile publishing in cyberphysical social systems,” IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1868–1878, 2017. View at: Publisher Site  Google Scholar
 X. Jin, J. Sun, R. Zhang, Y. Zhang, and C. Zhang, “Specguard: spectrum misuse detection in dynamic spectrum access systems,” IEEE Transactions on Mobile Computing, vol. 17, no. 12, pp. 2925–2938, 2018. View at: Publisher Site  Google Scholar
 H. A. Seven, H. A. Nguyen, S. Nadi, T. N. Nguyen, and M. Mezini, “Investigating next steps in static APImisuse detection,” in Proceedings of the 16th International Conference on Mining Software Repositories, pp. 265–275, Montreal, Canada, May 2019. View at: Publisher Site  Google Scholar
 S. Amann, H. A. Nguyen, S. Nadi, T. N. Nguyen, and M. Mezini, “A systematic evaluation of static APImisuse detectors,” IEEE Transactions on Software Engineering, vol. 45, no. 12, pp. 1170–1188, 2018. View at: Google Scholar
 T. Qiu, B. Li, X. Zhou, H. Song, I. Lee, and J. Lloret, “A novel shortcut addition algorithm with particle swarm for multisink internet of things,” IEEE Transactions on Industrial Informatics, vol. 16, no. 5, pp. 3566–3577, 2020. View at: Publisher Site  Google Scholar
 V. Hajisalem and S. Babaie, “A hybrid intrusion detection system based on ABCAFS algorithm for misuse and anomaly detection,” Computer Networks, vol. 136, pp. 37–50, 2018. View at: Publisher Site  Google Scholar
 H. Li, K. Ota, and M. Dong, “Deep reinforcement scheduling for mobile crowdsensing in fog computing,” ACM Transactions on Internet Technology, vol. 19, no. 2, pp. 1–18, 2019. View at: Publisher Site  Google Scholar
 H. Zhang, J. Yu, C. Tian et al., “Efficient and secure outsourcing scheme for RSA decryption in internet of things,” IEEE Internet of Things Journal, vol. 7, no. 8, pp. 6868–6881, 2020. View at: Publisher Site  Google Scholar
 H. Zhang, J. Yu, C. Tian, G. Xu, P. Gao, and J. Lin, “Practical and secure outsourcing algorithms for solving quadratic congruences in internet of things,” IEEE Internet of Things Journal, vol. 7, no. 4, pp. 2968–2981, 2020. View at: Publisher Site  Google Scholar
 Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu, and W. Lv, “Edge computing security: state of the art and challenges,” Proceedings of the IEEE, vol. 107, no. 8, pp. 1608–1631, 2019. View at: Publisher Site  Google Scholar
 D. Yu, Y. Zou, J. Yu et al., “Implementing abstract MAC layer in dynamic networks,” IEEE Transactions on Mobile Computing, 2020. View at: Publisher Site  Google Scholar
 D. Yu, Y. Zou, J. Yu et al., “Stable local broadcast in multihop wireless networks under SINR,” IEEE/ACM Transactions on Networking, vol. 26, no. 3, pp. 1278–1291, 2018. View at: Publisher Site  Google Scholar
 F. Li, D. Yu, H. Yang, J. Yu, H. Karl, and X. Cheng, “Multiarmedbanditbased spectrum scheduling algorithms in wireless networks: a survey,” IEEE Wireless Communications, vol. 27, no. 1, pp. 24–30, 2020. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2020 Rui Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.