Skip to main content
Log in

A Differential Game Model Between Intrusion Detection System and Attackers for Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The objective of this study is to find an optimal defensive strategy for an intrusion detection system (IDS) with respect to threats launched by the malicious attackers for wireless sensor networks (WSNs), and allows the IDS to choose its optimal control strategies over time. Meanwhile, we obtain the optimal control strategies of the IDS and the attackers to optimize their objectives, respectively. Theoretical analysis and simulation results demonstrate that our security model can effectively decrease the number of attackers in WSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Shen, S., Li, Y., Xu, H., & Cao, Q. (2011). Signaling game based strategy of intrusion detection in wireless sensor networks. Computers & Mathematics with Applications, 62, 2404–2416.

    Article  MathSciNet  MATH  Google Scholar 

  2. Mohi, M., Movaghar, A., & Zadeh, P. M. (2009). A Bayesian game approach for preventing DoS attacks in wireless sensor networks, 2009 international conference on communications and mobile computing (pp. 507–511).

  3. Ahmed, M. R., Huang, X., & Cui, H. (2013). Markov chain Monte Carlo based internal attack evaluation for wireless sensor network. International Journal of Computer Science and Network Security, 13(3), 23–31.

    Google Scholar 

  4. Agah, A., Das, S. K., & Basu, K. (2004). A non-cooperative game approach for intrusion detection in sensor networks. In Proceedings of 2004 IEEE 60th vehicular technology conference. VTC2004-Fall, Los Angeles, CA, USA, 26–29 September 2004.

  5. McCune, J. M., Shi, E., Perrig, A., & Reiter, M. K. (2005). Detection of denial-of-message attacks on sensor network broadcasts. In Proceedings of 2005 IEEE symposium on security and privacy, Oakland, CA, USA, 8–11 May 2005.

  6. Reddy, Y. B. (2009). A game theory approach to detect malicious nodes in wireless sensor networks. In Proceedings of 2009 3rd international conference on sensor technologies and applications, Athens, Greece, 18–23 June 2009.

  7. Yeung, D. W. K., & Petrosyan, L. A. (2006). Cooperative stochastic differential games. New York: Springer.

    MATH  Google Scholar 

  8. Ding, Y., Zhou, X., & Cheng, Z. (2013). A security differential game model for sensor networks in context of the internet of things. Wireless Personal Commutations, 72(1), 375–388.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhi-mi Cheng.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cheng, Zm. A Differential Game Model Between Intrusion Detection System and Attackers for Wireless Sensor Networks. Wireless Pers Commun 90, 1211–1219 (2016). https://doi.org/10.1007/s11277-016-3386-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3386-6

Keywords

Navigation