Browse > Article
http://dx.doi.org/10.3837/tiis.2018.12.012

Bayesian Rules Based Optimal Defense Strategies for Clustered WSNs  

Zhou, Weiwei (Zhengzhou Institute of Information Science and Technology)
Yu, Bin (Zhengzhou Institute of Information Science and Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.12, no.12, 2018 , pp. 5819-5840 More about this Journal
Abstract
Considering the topology of hierarchical tree structure, each cluster in WSNs is faced with various attacks launched by malicious nodes, which include network eavesdropping, channel interference and data tampering. The existing intrusion detection algorithm does not take into consideration the resource constraints of cluster heads and sensor nodes. Due to application requirements, sensor nodes in WSNs are deployed with approximately uncorrelated security weights. In our study, a novel and versatile intrusion detection system (IDS) for the optimal defense strategy is primarily introduced. Given the flexibility that wireless communication provides, it is unreasonable to expect malicious nodes will demonstrate a fixed behavior over time. Instead, malicious nodes can dynamically update the attack strategy in response to the IDS in each game stage. Thus, a multi-stage intrusion detection game (MIDG) based on Bayesian rules is proposed. In order to formulate the solution of MIDG, an in-depth analysis on the Bayesian equilibrium is performed iteratively. Depending on the MIDG theoretical analysis, the optimal behaviors of rational attackers and defenders are derived and calculated accurately. The numerical experimental results validate the effectiveness and robustness of the proposed scheme.
Keywords
wireless sensor networks (WSNs); multi-stage intrusion detection game (MIDG); intrusion detection system (IDS); posterior probability; Bayesian equilibrium;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Y. Xue, X. M. Chang, S. M. Zhong and Y. Zhuang,"An efficient energy hole alleviating algorithm for wireless sensor networks," IEEE Transactions on Consumer Electronics, vol. 60, no. 3, pp. 347-355, Aug. 2014.   DOI
2 J. Ren, Y. X. Zhang, K. Zhang and X. M. Shen,"Lifetime and energy-hole evolution analysis in data-gathering wireless sensor networks," IEEE Transactions on industrial informatics, vol. 12, no. 2, pp. 788-800, Jan. 2015.   DOI
3 S. Misra and P. D. Thomasinous, "A simple least-time and energy-efficient routing protocol with one-level data aggregation for wireless sensor networks," The Journal of Systems and Software, vol. 83, no. 5, pp. 852-860, May. 2010.   DOI
4 J. H. Ho, H. C. Shih, B. Y. Liao and S. C. Chu, "A ladder diffusion algorithm using ant colony optimization for wireless sensor networks," Information Sciences, vol. 192, no. 6, pp. 204-212, Jun. 2012.   DOI
5 A. Proano, L. Lazos and M. Krunz, "Traffic decorrelation techniques for countering a global eavesdropper in WSNs," IEEE Transactions on Mobile Computing, vol. 38, no. 7, pp. 1-14, Jan. 2016.
6 J. Wu, K. Ota and M. Dong, "A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities," IEEE Access, vol. 4, no. 4, pp. 416-424, Jan. 2016.   DOI
7 L. Cheng, C. D. Wu and Y. Z. Zhang, "Indoor robot localization based on wireless sensor networks," IEEE Transactions on Consumer Electronics, vol. 57, no. 3, pp. 1099-1104, Aug. 2011.   DOI
8 O. M. Vazquez, Y. Shmaliy and M. O. Ibarra, "Distributed unbiased FIR filtering with average consensus on measurements for WSNs," IEEE Transactions on Industrial Informatics, vol. 15, no. 6, pp. 1-8, Jan. 2017.
9 M. K. Watfa, H. Al-Hassanieh and S. Salmen, "A novel solution to the energy hole problem in sensor networks," Journal of Network and Computer Applications, vol. 36, no. 2, pp. 949-958, Mar. 2013.   DOI
10 I. Butun, S. D. Morgera and R. Sankar, "A survey of intrusion detection systems in wireless sensor networks," IEEE Communications Surveys and Tutorials, vol. 16, no. 1, pp. 266-282, Jan. 2014.   DOI
11 K. Lin, T. Xu and J. Song, "Node scheduling for all-directional intrusion detection in SDR-based 3D WSNs," IEEE Sensors Journal, vol. 16, no. 20, pp. 7332-7341, Jan. 2016.   DOI
12 S. Han, M. Xie and H. H. Chen, "Intrusion detection in cyber-physical systems: Techniques and challenges," IEEE Systems Journal, vol. 8, no. 4, pp. 1052-1062, Nov. 2014.   DOI
13 Z. M. Cheng, "A differential game between intrusion detection system and attackers for wireless sensor networks," Wireless Personal Communications, vol. 90, no. 3, pp. 1211-1219, Jun. 2016.   DOI
14 E. Y. Vasserman and N. Hopper, "Vampire attacks: Draining life from wireless Ad Hoc sensor networks," IEEE Transactions on Mobile Computing, vol. 12, no. 2, pp. 318-332, Feb. 2013.   DOI
15 L. Guo, J. Wu, Z. Xia and J. Li, "Proposed security mechanism for XMPP-based communications of ISO/IEC/IEEE 21451 sensor networks," IEEE Sensors Journal, vol. 15, no. 5, pp. 2577-2586, Mar. 2015.   DOI
16 C. Kolias, V. Kolias and G. Kambourakis, "TermID: A distributed swarm intelligence-based approach for wireless intrusion detection," International Journal of Information Security, no. 6, pp. 1-16, Jun. 2016.
17 Q. Yu, J. Lyu and L. Jiang, "Traffic anomaly detection algorithm for wireless sensor networks based on improved exploitation of the GM (1, 1) model," International Journal of Distributed Sensor Networks, vol. 12, no. 7, pp. 218-227, Jul. 2016.
18 A. Patel, H. Alhussian and J. M. Pedersen, "A nifty collaborative intrusion detection and prevention architecture for smart grid ecosystems," Computers & Security, vol. 64, no. 1, pp. 92-109, Jan. 2017.   DOI
19 K. Manandhar, X. Cao and F. Hu, "Detection of faults and attacks including false data injection attack in smart grid using kalman filter," IEEE transactions on control of network systems, vol. 1, no. 4, pp. 370-379, Apr. 2014.   DOI
20 G. Kalnoor, J. Agarkhed and S. R. Patil, "Agent-based QoS routing for intrusion detection of sinkhole attack in clustered wireless sensor networks," in Proc. of 6th Int. Conf. on Computational Intelligence and Informatics, pp. 571-583, May 28-30, 2017.
21 A. Forootaninia and M. B. Ghaznavi, "An improved watchdog technique based on power-aware hierarchical design for Ids in wireless sensor networks," International Journal of Network Security, vol. 4, no. 4, pp. 161-178, Jul. 2012.
22 Y. Wang, D. Wang and F. Chen, "Efficient event detection using self-learning threshold for wireless sensor networks," Wireless Networks, vol. 21, no. 6, pp. 1783-1799, Jun. 2015.   DOI
23 Z. H. Xiao, Z. G. Chen and X. H. Deng, "Anomaly detection based on a multi-class CUSUM Algorithm for WSN," Journal of Computers, vol. 5, no. 2, pp. 306-313, Feb. 2010.
24 W. Haider, J. Hu, Y. Xie, X. Yu and Q. Wu, "Detecting anomalous behavior in cloud servers by nested arc hidden SEMI-Markov model with state summarization," IEEE Transactions on Big Data, vol. PP, no. 99, pp. 1-1, August. 2017.
25 P. Jokarand and V. Leung, "Intrusion detection and prevention for ZigBee-based home area networks in smart grids," IEEE Transaction on Smart Grid, vol. 15, no. 3, pp. 1-12, Apr. 2016.
26 H. Moosavi and F. M. Bui, "A game-theoretic framework for robust optimal intrusion detection in wireless sensor networks," IEEE Transactions on Information Forensics and Security, vol. 9, no. 9, pp. 1367-1379, Sep. 2014.   DOI