Please wait a minute...
J4  2012, Vol. 46 Issue (1): 72-78    DOI: 10.3785/j.issn.1008-973X.2012.01.12
    
Detecting suspicious node within one cluster in wireless sensor network
using game theoretic approach
PAN Ju-long1,2, LI Shan-ping1, ZHANG Dao-yuan2
1. College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China;
2. Department of Computer Science and Technology, China Jiliang University, Hangzhou 310018, China
Download:   PDF(0KB) HTML
Export: BibTeX | EndNote (RIS)      

Abstract  

A new method using game theoretic approach with multiple detecting nodes within one cluster was proposed after clusters were formed by using low-energy adaptive clustering hierarchy(LEACH)-C router protocol in order to detect and distinguish suspicious nodes in wireless sensor network. A suspicious node in a cluster is determined as malicious or normal one by the cluster-head using majority voting principle after all its neighbor’s decisions are collected. A symmetrical encryption algorithm is used to secure the neighbor’s result transmission. If the suspicious node is malicious, the final detecting result will be broadcasted to all nodes within this cluster and the suspicious one will be isolated in order to decrease the risk of invasion. The energy consume of both attacker and defender in the game is considered to fit the wireless sensor network environment. Experimental results show that the multiple detecting nodes scheme is feasible and effective to use game theoretic approach in wireless sensor network, and the detection precision is promoted.



Published: 22 February 2012
CLC:  TP 393  
Cite this article:

PAN Ju-long, LI Shan-ping, ZHANG Dao-yuan. Detecting suspicious node within one cluster in wireless sensor network
using game theoretic approach. J4, 2012, 46(1): 72-78.

URL:

http://www.zjujournals.com/eng/10.3785/j.issn.1008-973X.2012.01.12     OR     http://www.zjujournals.com/eng/Y2012/V46/I1/72


无线传感器网络簇内可疑节点的博弈检测方法

针对无线传感器网络内部可能存在行为异常的可疑节点问题,在分簇路由协议的基础上,采用博弈方法通过簇内多个邻居节点对某一可疑节点进行判定,邻居节点产生的检测结果传输至簇头进行汇总. 簇头节点统计结果并采用多数投票方式对可疑节点进行判定. 为了保证数据传输的安全性,采用对称加密算法对各检测节点判定结果进行加密.若可疑节点是恶意节点,则该判定结果将在簇内广播,以达到隔离可疑节点的目的. 为了更符合实际环境,在博弈模型判定时,考虑攻防双方节点的能量消耗.实验结果表明,该多检测节点方案能够较好地分析无线传感器网络中可疑入侵节点和检测系统之间的博弈关系,提高了对可疑节点判定的准确性.

[1] 李建中,高宏. 无线传感器网络的研究进展[J]. 计算机研究与发展, 2008,45(1): 1-15.
LI Jianzhong, GAO Hong. Survey on sensor network research [J]. Journal of Computer Research and Development, 2008, 45(1): 1-15.
[2] 汪洋, 林闯, 李泉林, 等. 基于非合作博弈的无线网络路由机制研究[J]. 计算机学报, 2009, 32(1): 54-68.
WANG Yang, LIN Chuang, LI Quanlin , et al. Noncooperative game based research on routing schemes for wireless networks [J]. Journal of Computer, 2009, 32(1): 54-68.
[3] 孙利民, 李建中, 陈渝, 等. 无线传感器网络[M]. 北京:清华大学出版社,2005: 1-100.
[4] AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y.A survey on sensor networks [J].IEEE Communications Magazine, 2002, 40(8): 102-114.
[5] KARLOF C, WAGNER D. Secure routing in wireless sensor networks: attacks and countermeasures [J]. Ad Hoc Networks, 2003, 1(2/3): 293-315.
[6] HU Fei, SHARMA N K. Security considerations in ad hoc sensor networks [J]. Ad Hoc Networks, 2005, 3(1): 69-89.
[7] ZHANG Y, LEE W, HUANG Y A. Intrusion detection techniques for mobile wireless networks [J]. Wireless Networks,2003, 9(5): 545-556.
[8] BUCHEGGER S, BOUDEC J Y L. Performance analysis of the CONFIDANT protocol [C]∥ Proceedings of the 3rd ACM International Symposium on Mobile ad hoc Networking and Computing:   Lausanne, Switzerland:  ACM,2002:226-236.
[9] AGAH A. A novel game theoretic framework for security in wireless sensor networks [D]. Arlington: The University of Texas at Arlington, 2005: 1-94.
[10] 杨峰. 无线传感器网络恶意节点防范技术研究[D]. 合肥:中国科技大学, 2009: 1-102.
YANG Feng. Research on the technique of countering malicious nodes in wireless sensor networks [D]. Hefei: University of Science and Technology of China, 2009: 1-102.
[11] 俞波, 杨珉, 王治, 等. 选择传递攻击中的异常丢包检测[J]. 计算机学报, 2006, 29(9): 1542-1552.
YU Bo, YANG Min, WANG Zhi, et al. Identify abnormal packet loss in selective forwarding attacks [J]. Journal of Computer, 2006, 29(9): 1542-1552.
[12] JARAMILLO J J, SRIKANT R. A game theory based reputation mechanism to incentivize cooperation in wireless ad hoc networks [J]. Ad Hoc Networks, 2010, 8(4):416-429.
[13] REDDY Y B. A game theory approach to detect malicious nodes in wireless sensor networks [C]∥3rd International Conference on Sensor Technologies and Applications. Athens/Glyfada, Greece: IEEE,  2009: 462-468.
[14] HEINZELMAN W B, CHANDRAKASAN A P, BALAKRISHNAN H. An applicationspecific protocol architecture for wireless microsensor networks [J]. IEEE Transactions on Wireless Communications, 2002, 1(4): 660-670.
[15] 王则柯, 李杰. 博弈论教程[M]. 北京:中国人民大学出版社,2004:1-230.
[16] YOUNIS O, FAHMY S. HEED: a hybrid, energyefficient, distributed clustering approach for ad hoc sensor networks [J]. IEEE Transactions on Mobile Computing, 2004, 3(4): 366-379.
[17] 潘巨龙, 李善平,张道远.无线医疗传感器网络中基于Feistel 加密算法研究[J]. 传感技术学报, 2010, 23(7): 1030-1036.
PAN Julong, LI Shanping, ZHANG Daoyuan. A study of two algorithms based on Feistel cipher in wireless medical sensor networks [J]. Chinese Journal of Sensors and Actuators, 2010, 23(7): 1030-1036.
[18] LIU Y, COMANICIU C, MAN H. A Bayesian game approach for intrusion detection in wireless ad hoc networks [C]∥ Proceeding from the 2006 Workshop on Game Theory for Communications and Networks. Pisa: ACM, 2006: 1-12.
[19] JING H, AIDA H. A cooperative game theoretic approach to clustering algorithms for wireless sensor networks [C]∥ Processing in Communications, Computers and Signal. [S.l.]: IEEE, 2009: 140-145.
[20] ABBASI A A, YOUNIS M. A survey on clustering algorithms for wireless sensor networks [J]. Computer Communications, 2007, 30(14/15): 2826-2841.

[1] GUO Tong,LIN Feng. Bayesian network structure learning based on hybrid genetic
and fish swarm algorithm
[J]. J4, 2014, 48(1): 130-135.
[2] I De-jun,WANG Gang,YANG Can-jun,JIN Bo,CHEN Yan-hu. NTP/IEEE1588-based time synchronization system in seafloor observatory network[J]. J4, 2014, 48(1): 1-7.
[3] DU Rui-zhong, TIAN Jun-feng, ZHANG Huan-guo. Cloud service selection model based on trust and personality preferences[J]. J4, 2013, 47(1): 53-61.
[4] ZHANG Shuai, SUN Jian-ling, XU Bin, HUANG Chao, KAVS Aleksander J.. RBAC based access control model for services compositions
cross multiple enterprises
[J]. J4, 2012, 46(11): 2035-2043.
[5] Chen Sui-sheng,Lu Jian-gang,Lou Xiao-chun. Localization algorithm for wireless sensor networks
based on MDS-MAP and nonlinear filtering
[J]. J4, 2012, 46(5): 866-872.
[6] GAO Qing,LI Shan-ping,YANG Zhao-hui. Virtual force-field based energy efficient geo-routing in
wireless sensor network
[J]. J4, 2012, 46(1): 98-104.
[7] YANG Zhao-hui, LI Shan-ping, LIN Xin. Quality optimizing real-time scheduling for incremental context services[J]. J4, 2012, 46(1): 90-97.
[8] QIAN Jian-feng, YIN Jian-wei, DONG Jin-xiang. Load balancing algorithms of semantic publish/subscribe system
over structured P2P networks
[J]. J4, 2011, 45(10): 1710-1719.
[9] YANG Zhao-hui, LI Shan-ping, LIN Xin. Anonymity level adaptation algorithm to meet resource constraint
of K-anonymity service in LBS
[J]. J4, 2011, 45(7): 1154-1160.
[10] PAN Gang, LI Shi-jian, CHEN Yun-xing. ScudContext: large-scale environmental context services infrastructure
towards cyber-physical space integration
[J]. J4, 2011, 45(6): 991-998.
[11] CHE Jian-hua, HE Qin-ming, CHEN Jian-hai, WANG Bei. Software simulation-based fault injection tool of
virtual machine system
[J]. J4, 2011, 45(4): 614-620.
[12] LI Jian-ting, JIN Xin-yu, TANG Jun, ZHANG Yu. Target localization method based on wireless multimedia sensor network[J]. J4, 2011, 45(1): 45-49.
[13] ZHANG Li-ping, PAN Gang, ZHENG Neng-gan, YANG Guo-qing, LI Hong, ZHAO Min-de. Consistent bidirectional generation method and  development
platform based on SmartC models and codes
[J]. J4, 2011, 45(1): 20-29.
[14] SHU Ting, SUN Shou-qian, WANG Hai-ning, XU Wei-qiang. Adaptive generation algorithm for executable state identification
sequences in EFSM model
[J]. J4, 2010, 44(11): 2183-2187.
[15] CHEN You-Rong, SHU Li, DONG Ji-Fen, HONG Zhen. Power control in wireless sensor network based on
nearestneighbor algorithm
[J]. J4, 2010, 44(7): 1321-1326.