{"title":"无线传感器网络入侵检测的理论信令博弈模型","authors":"M. Estiri, A. Khademzadeh","doi":"10.1109/NETWKS.2010.5624961","DOIUrl":null,"url":null,"abstract":"In this paper, we address a method for an intrusion detection system (IDS) in wireless sensor networks (WSNs). The type of the attack that we address in this paper focuses on dropping packets attacks (DPA) in WSNs and we focus on the design of security enforcement mechanisms for preventing attacks as well. we present a signaling game-theoretic model to analyze intrusion detection in wireless sensor networks. We use a signaling game to model the interactions among nodes of a wireless sensor network. We view the interaction between an attacker and an individual node as a Bayesian game with incomplete information, and construct models for such a game. We prove the authenticity of the proposed model by reaching Nash equilibrium. And achieving Nash equilibrium leads to the defense strategy for the WSN.","PeriodicalId":202408,"journal":{"name":"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"A theoretical signaling game model for intrusion detection in wireless sensor networks\",\"authors\":\"M. Estiri, A. Khademzadeh\",\"doi\":\"10.1109/NETWKS.2010.5624961\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we address a method for an intrusion detection system (IDS) in wireless sensor networks (WSNs). The type of the attack that we address in this paper focuses on dropping packets attacks (DPA) in WSNs and we focus on the design of security enforcement mechanisms for preventing attacks as well. we present a signaling game-theoretic model to analyze intrusion detection in wireless sensor networks. We use a signaling game to model the interactions among nodes of a wireless sensor network. We view the interaction between an attacker and an individual node as a Bayesian game with incomplete information, and construct models for such a game. We prove the authenticity of the proposed model by reaching Nash equilibrium. And achieving Nash equilibrium leads to the defense strategy for the WSN.\",\"PeriodicalId\":202408,\"journal\":{\"name\":\"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-11-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NETWKS.2010.5624961\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NETWKS.2010.5624961","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A theoretical signaling game model for intrusion detection in wireless sensor networks
In this paper, we address a method for an intrusion detection system (IDS) in wireless sensor networks (WSNs). The type of the attack that we address in this paper focuses on dropping packets attacks (DPA) in WSNs and we focus on the design of security enforcement mechanisms for preventing attacks as well. we present a signaling game-theoretic model to analyze intrusion detection in wireless sensor networks. We use a signaling game to model the interactions among nodes of a wireless sensor network. We view the interaction between an attacker and an individual node as a Bayesian game with incomplete information, and construct models for such a game. We prove the authenticity of the proposed model by reaching Nash equilibrium. And achieving Nash equilibrium leads to the defense strategy for the WSN.