|
|
Detecting suspicious node within one cluster in wireless sensor network
using game theoretic approach |
PAN Ju-long1,2, LI Shan-ping1, ZHANG Dao-yuan2 |
1. College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China;
2. Department of Computer Science and Technology, China Jiliang University, Hangzhou 310018, China |
|
|
Abstract A new method using game theoretic approach with multiple detecting nodes within one cluster was proposed after clusters were formed by using low-energy adaptive clustering hierarchy(LEACH)-C router protocol in order to detect and distinguish suspicious nodes in wireless sensor network. A suspicious node in a cluster is determined as malicious or normal one by the cluster-head using majority voting principle after all its neighbor’s decisions are collected. A symmetrical encryption algorithm is used to secure the neighbor’s result transmission. If the suspicious node is malicious, the final detecting result will be broadcasted to all nodes within this cluster and the suspicious one will be isolated in order to decrease the risk of invasion. The energy consume of both attacker and defender in the game is considered to fit the wireless sensor network environment. Experimental results show that the multiple detecting nodes scheme is feasible and effective to use game theoretic approach in wireless sensor network, and the detection precision is promoted.
|
Published: 22 February 2012
|
|
无线传感器网络簇内可疑节点的博弈检测方法
针对无线传感器网络内部可能存在行为异常的可疑节点问题,在分簇路由协议的基础上,采用博弈方法通过簇内多个邻居节点对某一可疑节点进行判定,邻居节点产生的检测结果传输至簇头进行汇总. 簇头节点统计结果并采用多数投票方式对可疑节点进行判定. 为了保证数据传输的安全性,采用对称加密算法对各检测节点判定结果进行加密.若可疑节点是恶意节点,则该判定结果将在簇内广播,以达到隔离可疑节点的目的. 为了更符合实际环境,在博弈模型判定时,考虑攻防双方节点的能量消耗.实验结果表明,该多检测节点方案能够较好地分析无线传感器网络中可疑入侵节点和检测系统之间的博弈关系,提高了对可疑节点判定的准确性.
|
|
[1] 李建中,高宏. 无线传感器网络的研究进展[J]. 计算机研究与发展, 2008,45(1): 1-15.
LI Jianzhong, GAO Hong. Survey on sensor network research [J]. Journal of Computer Research and Development, 2008, 45(1): 1-15.
[2] 汪洋, 林闯, 李泉林, 等. 基于非合作博弈的无线网络路由机制研究[J]. 计算机学报, 2009, 32(1): 54-68.
WANG Yang, LIN Chuang, LI Quanlin , et al. Noncooperative game based research on routing schemes for wireless networks [J]. Journal of Computer, 2009, 32(1): 54-68.
[3] 孙利民, 李建中, 陈渝, 等. 无线传感器网络[M]. 北京:清华大学出版社,2005: 1-100.
[4] AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y.A survey on sensor networks [J].IEEE Communications Magazine, 2002, 40(8): 102-114.
[5] KARLOF C, WAGNER D. Secure routing in wireless sensor networks: attacks and countermeasures [J]. Ad Hoc Networks, 2003, 1(2/3): 293-315.
[6] HU Fei, SHARMA N K. Security considerations in ad hoc sensor networks [J]. Ad Hoc Networks, 2005, 3(1): 69-89.
[7] ZHANG Y, LEE W, HUANG Y A. Intrusion detection techniques for mobile wireless networks [J]. Wireless Networks,2003, 9(5): 545-556.
[8] BUCHEGGER S, BOUDEC J Y L. Performance analysis of the CONFIDANT protocol [C]∥ Proceedings of the 3rd ACM International Symposium on Mobile ad hoc Networking and Computing: Lausanne, Switzerland: ACM,2002:226-236.
[9] AGAH A. A novel game theoretic framework for security in wireless sensor networks [D]. Arlington: The University of Texas at Arlington, 2005: 1-94.
[10] 杨峰. 无线传感器网络恶意节点防范技术研究[D]. 合肥:中国科技大学, 2009: 1-102.
YANG Feng. Research on the technique of countering malicious nodes in wireless sensor networks [D]. Hefei: University of Science and Technology of China, 2009: 1-102.
[11] 俞波, 杨珉, 王治, 等. 选择传递攻击中的异常丢包检测[J]. 计算机学报, 2006, 29(9): 1542-1552.
YU Bo, YANG Min, WANG Zhi, et al. Identify abnormal packet loss in selective forwarding attacks [J]. Journal of Computer, 2006, 29(9): 1542-1552.
[12] JARAMILLO J J, SRIKANT R. A game theory based reputation mechanism to incentivize cooperation in wireless ad hoc networks [J]. Ad Hoc Networks, 2010, 8(4):416-429.
[13] REDDY Y B. A game theory approach to detect malicious nodes in wireless sensor networks [C]∥3rd International Conference on Sensor Technologies and Applications. Athens/Glyfada, Greece: IEEE, 2009: 462-468.
[14] HEINZELMAN W B, CHANDRAKASAN A P, BALAKRISHNAN H. An applicationspecific protocol architecture for wireless microsensor networks [J]. IEEE Transactions on Wireless Communications, 2002, 1(4): 660-670.
[15] 王则柯, 李杰. 博弈论教程[M]. 北京:中国人民大学出版社,2004:1-230.
[16] YOUNIS O, FAHMY S. HEED: a hybrid, energyefficient, distributed clustering approach for ad hoc sensor networks [J]. IEEE Transactions on Mobile Computing, 2004, 3(4): 366-379.
[17] 潘巨龙, 李善平,张道远.无线医疗传感器网络中基于Feistel 加密算法研究[J]. 传感技术学报, 2010, 23(7): 1030-1036.
PAN Julong, LI Shanping, ZHANG Daoyuan. A study of two algorithms based on Feistel cipher in wireless medical sensor networks [J]. Chinese Journal of Sensors and Actuators, 2010, 23(7): 1030-1036.
[18] LIU Y, COMANICIU C, MAN H. A Bayesian game approach for intrusion detection in wireless ad hoc networks [C]∥ Proceeding from the 2006 Workshop on Game Theory for Communications and Networks. Pisa: ACM, 2006: 1-12.
[19] JING H, AIDA H. A cooperative game theoretic approach to clustering algorithms for wireless sensor networks [C]∥ Processing in Communications, Computers and Signal. [S.l.]: IEEE, 2009: 140-145.
[20] ABBASI A A, YOUNIS M. A survey on clustering algorithms for wireless sensor networks [J]. Computer Communications, 2007, 30(14/15): 2826-2841. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|