Volume 52 | Number 3 | Year 2017 | Article Id. IJMTT-V52P526 | DOI : https://doi.org/10.14445/22315373/IJMTT-V52P526
Wireless Sensor Network (WSN) is an auspicious technology that has tremendous potential for various futuristic applications. As WSN become wide spread, security becomes a cardinal affair. Wireless sensor networks has grown a lot in recent years and offers excellent opportunities in defense related applications such as monitoring environment and collecting data related to antisocial activities. Currently, the needs of wireless sensors have become inevitable in daily life. With the continuous growth of Wireless sensor networks in daily life, business, and defense applications, the security of transferring data from sensors to their destination has become an important research area. Due to the limitations of power, storage, and processing capabilities, current security mechanisms of wireless networks or wired networks can not apply directly to wireless sensor networks. So there is a need to develop new techniques or modify the current security mechanisms to transfer data from source (from the field) to base station (destination). In this paper, we discuss currently available intrusion detection techniques, attack models using game theory, and then propose a new framework to detect malicious nodes using zero sum game approach for nodes in the forward data path. The first part of research provides the game model with probability of energy required for transferring the data packets. The second part derives the model to detect the malicious nodes using probability of acknowledgement at source.
[1] Altman, A.; Bercovici-Boden, A.; and Tennenholtz, M. 2006. Learning in one-shot strategic form games. In ECML, 6–17.
[2] Camerer, C.; Ho, T.; and Chong, J. 2001. Behavioral game theory: Thinking, learning, and teaching. Nobel Symposium on Behavioral and Experimental Economics.
[3] Camerer, C.; Ho, T.; and Chong, J. 2004. A cognitive hierarchy model of games. QJE 119(3):861– 898. Camerer, C. F. 2003. Behavioral Game Theory: Experiments in Strategic Interaction. Princeton University Press.
[4] Chong, J.; Camerer, C.; and Ho, T. 2005. Cognitive hierarchy: A limited thinking theory in games. Experimental Business Research, Vol. III: Marketing, accounting and cognitive perspectives 203–228.
[4] Chris Karlof and David Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, First IEEE International Workshop on Sensor Network Protocols and Applications, 2003.
[5] Krontiris Ioannis, Tassos Dimitriou, and Felix C. Freiling, “Towards Intrusion Detection in Wireless Sensor Networks”, EuropeanWireless Conference, Paris, April 2007.
[6] kuldeep, K. Sharma, and M. K. Ghose, “Wireless Sensor Networks Security: A New Approach”, DCOM 2008, Dec14-17, 2008.
[7] Roman, R. Jianying Zhou Lopez, J., Applying intrusion detection systems to wireless sensor networks, 3rd IEEE Consumer Communications and Networking Conference, 2006. CCNC 2006.
[8] Vijay Bhuse, Ajay Gupta, “Anomaly intrusion detection in wireless sensor networks”, Journal of High Speed Networks, Volume 15, Issue 1, January 2006.
[9] Michael Krishnan, “Intrusion Detection in Wireless Sensor Networks”,walrandpc.eecs.berkeley.edu/228S06/Projects/KrishnanProject.pdf
[10] A. Agah, S. K. Das and K. Basu, “A game theory based approach for security in wireless sensor networks”, IEEE International Conference on Performance, Computing, and Communications, 2004.
[11] A. Agah, S. K. Das and K. Basu, “A Non-cooperative Game Approach for Intrusion Detection in Sensor Networks”, Vehicular Technology Conference (VTC2004), Fall 2004.
[12] A. Agah, K. Basu and S. K. Das, “Preventing DoS attack in Sensor Networks: A Game Theoretic Approach”, IEEE International Conference on Communications (ICC 2005), Volume 5, Issue , 16-20 May 2005
[13] Michael Brownfield, “Wireless Sensor Network Denial of Sleep Attack”, Proceedings of the 2005 IEEE Workshop on Information Assurance and Security”, United States Military Academy, West Point, NY.
[14] R. Negi and A. Perrig, “Jamming analysis of MAC protocols”, Carnegie Mellon Technical Memo, 2003.
[15] A. B. MacKenzie and L. A. DaSilva, “Game Theory for Wireless Engineers”, Synthesis Lectures on Communications, 2006. Morgan & Claypool Publishers.
[16] A. Agah, “A Novel Game Theoretic Framework for Security in Wireless Sensor Networks”, Ph. D Thesis, UT Austin, December 2005.
[17] T. Alpcan and T. Basar, “An intrusion detection game with limited observations,” in 12th Int. Symp. on Dynamic Games and Applications, Sophia Antipolis, France, July 2006.
[18] M. Kodialam, T.V. Lakshman, “Detecting network intrusions via sampling: a game theoretic approach”, Proceedings of Twenty Second IEEE INFOCOMM, 2003.
[19] S. Zhu, S. Setia, and S. Jajodia, “LEAP : efficient security mechanisms for large-scale distributed sensor networks”, Proceedings of the 10th ACM conference on Computer and Communication Security, Washington D.C., 2003.
[20] L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks”, Proceedings of the 9th ACM conference on Computer and Communications Security, Washington, DC, USA, 2002.
[21] J. R. Douceur, “The Sybil Attack”, First International Workshop on Peer-to-peer Systems, LNCS 2429, 2002.
[22] J.-H. Yun, I.-H. Kim, J.-H. Lim, and S.-W. Seo, “WODEM: Wormhole Attack Defense Mechanism in Wireless Sensor Networks”, Ubiquitous Convergence Technology, ICUCT, 2006.
[23] A. D. Wood and J. A. Stankovic, “Denial of service in sensor networks”, Computer, 35(10), 2002.
[24] M. Kim, I. Doh, and K. Chae, “Denial-of-Service(DoS) Detection through Practical Entropy Estimation on Hierarchical Sensor Networks”, The 8th International Conference Advanced Communication Technology, (ICACT 2006), 2006.
[25] A. Agah, S. K. Das, K. Basu, and M. Asadi, “Intrusion Detection in Sensor Networks: a Non-Cooperative Game Approach”, Proceedings of Third IEEE International Symposium on the Network Computing and Applications (NCA’04), IEEE Computer Society, 2004.
P. Hema, V. Vinoba, "Detection of False Node in WSN using Non Cooperative Non-Zero Sum Game Theory," International Journal of Mathematics Trends and Technology (IJMTT), vol. 52, no. 3, pp. 183-188, 2017. Crossref, https://doi.org/10.14445/22315373/IJMTT-V52P526