Abstract
In this work we present an Intrusion Detection (ID) and an Intrusion Prevention (IP) model for Wireless Sensor Networks (WSNs). The attacker’s goal is to compromise the deployment by causing nodes to report faulty sensory information. The defender, who is the WSN’s operator, aims to detect the presence of faulty sensor measurements (ID) and to subsequently recover compromised nodes (IP). In order to address the conflicting interests involved, we adopt a Game Theoretic approach that takes into consideration the strategies of both players and we attempt to identify the presence of Nash Equilibria in the two games. The results are then verified in two simulation contexts: Firstly, we evaluate the model in a middleware-based WSN which uses clustering over a bespoke network stack. Subsequently, we test the model in a simulated IPv6-based sensor deployment. According to the findings, the results of both simulation models confirm the results of the theoretic one.
The research leading to these results has received funding from the European Union’s Seventh Framework Programme (FP7/2007-2013) under grant agreement \(n^{o}\) 609094. This work has also been supported by Bristol’s Systems Centre and Fraser-Nash Consultancy.
Chapter PDF
References
Alrajeh, N.A., Khan, S., Shams, B.: Intrusion detection systems in wireless sensor networks: a review. International Journal of Distributed Sensor Networks 2013 (2013)
Reddy, Y.B.: A game theory approach to detect malicious nodes in wireless sensor networks. In: Third International Conference on Sensor Technologies and Applications, SENSORCOMM 2009, pp. 462–468. IEEE (2009)
Haghighi, M., Cliff, D.: Sensomax: An agent-based middleware for decentralized dynamic data-gathering in wireless sensor networks. In: 2013 International Conference on Collaboration Technologies and Systems (CTS), pp. 107–114, May 2013
Ilia, P., Oikonomou, G., Tryfonas, T.: Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks. In: Cavallaro, L., Gollmann, D. (eds.) WISTP 2013. LNCS, vol. 7886, pp. 34–49. Springer, Heidelberg (2013)
Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless sensor network security: A survey, in book chapter of security. In: Xiao, Y. (ed.) Distributed, Grid, and Pervasive Computing, pp. 0–849. CRC Press (2007)
Omic, J., Orda, A., Van Mieghem, P.: Protecting against network infections: A game theoretic perspective. In: INFOCOM 2009, pp. 1485–1493. IEEE (2009)
Spyridopoulos, T., Oikonomou, G., Tryfonas, T., Ge, M.: Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention. In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds.) SEC 2013. IFIP AICT, vol. 405, pp. 28–41. Springer, Heidelberg (2013)
Tambe, M., An, B.: Game theory for security: A real-world challenge problem for multiagent systems and beyond. In: AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health (2012)
Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A survey of game theory as applied to network security. In: 2010 43rd Hawaii International Conference on System Sciences (HICSS), pp. 1–10. IEEE (2010)
Spyridopoulos, T., Karanikas, G., Tryfonas, T., Oikonomou, G.: A game theoretic defence framework against dos/ddos cyber attacks. Computers & Security 38, 39–50 (2013)
Wu, Q., Shiva, S., Roy, S., Ellis, C., Datla, V.: On modeling and simulation of game theory-based defense mechanisms against dos and ddos attacks. In: Proceedings of the 2010 Spring Simulation Multiconference, Society for Computer Simulation International, 159 (2010)
Asadi, M., Zimmerman, C., Agah, A.: A game-theoretic approach to security and power conservation in wireless sensor networks. IJ Network Security 15(1), 50–58 (2013)
Chandrasekaran, B.: Survey of network traffic models. Waschington University in St. Louis CSE 567 (2009)
Bedi, H.S., Roy, S., Shiva, S.: Game theory-based defense mechanisms against ddos attacks on tcp/tcp-friendly flows. In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), pp. 129–136. IEEE (2011)
Haghighi, M.: An agent-based multi-model tool for simulating multiple concurrent applications in wsns. In: Journal of Advances in Computer Networks (JACN), 5th International Conference on Communication Software and Networks (2013)
Österlind, F.: A sensor network simulator for the contiki os. SICS Research Report (2006)
Montenegro, G., Kushalnagar, N., Hui, J., Culler, D.: Transmission of ipv6 packets over ieee 802.15. 4 networks. Internet proposed standard RFC 4944 (2007)
Winter, T.: Rpl: Ipv6 routing protocol for low-power and lossy networks (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 IFIP International Federation for Information Processing
About this paper
Cite this paper
Maraslis, K., Spyridopoulos, T., Oikonomou, G., Tryfonas, T., Haghighi, M. (2015). Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems. In: Federrath, H., Gollmann, D. (eds) ICT Systems Security and Privacy Protection. SEC 2015. IFIP Advances in Information and Communication Technology, vol 455. Springer, Cham. https://doi.org/10.1007/978-3-319-18467-8_40
Download citation
DOI: https://doi.org/10.1007/978-3-319-18467-8_40
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18466-1
Online ISBN: 978-3-319-18467-8
eBook Packages: Computer ScienceComputer Science (R0)