A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks
Wireless sensor networks (WSNs) are new technologies, foreseen to be used increasingly in the near future, and security is an important issue for them. However because of the nodes resource limitations, other schemes proposed for securing general ad hoc networks, are not appropriate for WSNs. Usuall...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 511 |
---|---|
container_issue | |
container_start_page | 507 |
container_title | |
container_volume | 3 |
creator | Mohi, M. Movaghar, A. Zadeh, P.M. |
description | Wireless sensor networks (WSNs) are new technologies, foreseen to be used increasingly in the near future, and security is an important issue for them. However because of the nodes resource limitations, other schemes proposed for securing general ad hoc networks, are not appropriate for WSNs. Usually some nodes act maliciously and they are able to do different kinds of DoS attacks. In order to make the network more secure, malicious nodes should be isolated from the network. In this paper, we model the interaction of nodes in WSN and intrusion detection system (IDS) as a Bayesian game formulation and use this idea to make a secure routing protocol. By this approach nodes are motivated to act normally and gain reputation, and IDS can perform better by using the history of the game. As this game approaches to Nash equilibrium, it leads to a defense strategy for the network. |
doi_str_mv | 10.1109/CMC.2009.325 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4797305</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4797305</ieee_id><sourcerecordid>4797305</sourcerecordid><originalsourceid>FETCH-LOGICAL-c218t-dd23f7befd7cc752e9b33290882afc11cf1dc558c1d85b32d35dec632acd72553</originalsourceid><addsrcrecordid>eNotjE9LwzAcQAMyUGdv3rzkC3Tmz35NcqxVpzCdMMXjSJNfNG5rS1KUfXsHenqH93iEXHI245yZ6-apmQnGzEwKOCGFUZqpyoAExsWEnB-VNlLpOTslRc5fjDFuKgUKzsiqpjf2gDnaji7sHmk9DKm37pOGPtGXhN_YjbH7oLf9mtbjaN0209jR95hwhznTNXb5WD7j-NOnbb4gk2B3GYt_Tsnb_d1r81AuV4vHpl6WTnA9lt4LGVSLwSvnFAg0rZTCMK2FDY5zF7h3ANpxr6GVwkvw6CoprPNKAMgpufr7RkTcDCnubTps5sooyUD-AlMWTqE</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Mohi, M. ; Movaghar, A. ; Zadeh, P.M.</creator><creatorcontrib>Mohi, M. ; Movaghar, A. ; Zadeh, P.M.</creatorcontrib><description>Wireless sensor networks (WSNs) are new technologies, foreseen to be used increasingly in the near future, and security is an important issue for them. However because of the nodes resource limitations, other schemes proposed for securing general ad hoc networks, are not appropriate for WSNs. Usually some nodes act maliciously and they are able to do different kinds of DoS attacks. In order to make the network more secure, malicious nodes should be isolated from the network. In this paper, we model the interaction of nodes in WSN and intrusion detection system (IDS) as a Bayesian game formulation and use this idea to make a secure routing protocol. By this approach nodes are motivated to act normally and gain reputation, and IDS can perform better by using the history of the game. As this game approaches to Nash equilibrium, it leads to a defense strategy for the network.</description><identifier>ISBN: 9780769535012</identifier><identifier>ISBN: 0769535011</identifier><identifier>DOI: 10.1109/CMC.2009.325</identifier><identifier>LCCN: 2008937840</identifier><language>eng</language><publisher>IEEE</publisher><subject>Ad hoc networks ; Batteries ; Bayesian methods ; Computer crime ; Cryptography ; Intrusion detection ; Intrusion detection system ; Monitoring ; Protection ; Routing protocols ; Security ; Wireless sensor networks</subject><ispartof>2009 WRI International Conference on Communications and Mobile Computing, 2009, Vol.3, p.507-511</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c218t-dd23f7befd7cc752e9b33290882afc11cf1dc558c1d85b32d35dec632acd72553</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4797305$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2057,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4797305$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Mohi, M.</creatorcontrib><creatorcontrib>Movaghar, A.</creatorcontrib><creatorcontrib>Zadeh, P.M.</creatorcontrib><title>A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks</title><title>2009 WRI International Conference on Communications and Mobile Computing</title><addtitle>CMC</addtitle><description>Wireless sensor networks (WSNs) are new technologies, foreseen to be used increasingly in the near future, and security is an important issue for them. However because of the nodes resource limitations, other schemes proposed for securing general ad hoc networks, are not appropriate for WSNs. Usually some nodes act maliciously and they are able to do different kinds of DoS attacks. In order to make the network more secure, malicious nodes should be isolated from the network. In this paper, we model the interaction of nodes in WSN and intrusion detection system (IDS) as a Bayesian game formulation and use this idea to make a secure routing protocol. By this approach nodes are motivated to act normally and gain reputation, and IDS can perform better by using the history of the game. As this game approaches to Nash equilibrium, it leads to a defense strategy for the network.</description><subject>Ad hoc networks</subject><subject>Batteries</subject><subject>Bayesian methods</subject><subject>Computer crime</subject><subject>Cryptography</subject><subject>Intrusion detection</subject><subject>Intrusion detection system</subject><subject>Monitoring</subject><subject>Protection</subject><subject>Routing protocols</subject><subject>Security</subject><subject>Wireless sensor networks</subject><isbn>9780769535012</isbn><isbn>0769535011</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjE9LwzAcQAMyUGdv3rzkC3Tmz35NcqxVpzCdMMXjSJNfNG5rS1KUfXsHenqH93iEXHI245yZ6-apmQnGzEwKOCGFUZqpyoAExsWEnB-VNlLpOTslRc5fjDFuKgUKzsiqpjf2gDnaji7sHmk9DKm37pOGPtGXhN_YjbH7oLf9mtbjaN0209jR95hwhznTNXb5WD7j-NOnbb4gk2B3GYt_Tsnb_d1r81AuV4vHpl6WTnA9lt4LGVSLwSvnFAg0rZTCMK2FDY5zF7h3ANpxr6GVwkvw6CoprPNKAMgpufr7RkTcDCnubTps5sooyUD-AlMWTqE</recordid><startdate>200901</startdate><enddate>200901</enddate><creator>Mohi, M.</creator><creator>Movaghar, A.</creator><creator>Zadeh, P.M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200901</creationdate><title>A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks</title><author>Mohi, M. ; Movaghar, A. ; Zadeh, P.M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c218t-dd23f7befd7cc752e9b33290882afc11cf1dc558c1d85b32d35dec632acd72553</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Ad hoc networks</topic><topic>Batteries</topic><topic>Bayesian methods</topic><topic>Computer crime</topic><topic>Cryptography</topic><topic>Intrusion detection</topic><topic>Intrusion detection system</topic><topic>Monitoring</topic><topic>Protection</topic><topic>Routing protocols</topic><topic>Security</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Mohi, M.</creatorcontrib><creatorcontrib>Movaghar, A.</creatorcontrib><creatorcontrib>Zadeh, P.M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Mohi, M.</au><au>Movaghar, A.</au><au>Zadeh, P.M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks</atitle><btitle>2009 WRI International Conference on Communications and Mobile Computing</btitle><stitle>CMC</stitle><date>2009-01</date><risdate>2009</risdate><volume>3</volume><spage>507</spage><epage>511</epage><pages>507-511</pages><isbn>9780769535012</isbn><isbn>0769535011</isbn><abstract>Wireless sensor networks (WSNs) are new technologies, foreseen to be used increasingly in the near future, and security is an important issue for them. However because of the nodes resource limitations, other schemes proposed for securing general ad hoc networks, are not appropriate for WSNs. Usually some nodes act maliciously and they are able to do different kinds of DoS attacks. In order to make the network more secure, malicious nodes should be isolated from the network. In this paper, we model the interaction of nodes in WSN and intrusion detection system (IDS) as a Bayesian game formulation and use this idea to make a secure routing protocol. By this approach nodes are motivated to act normally and gain reputation, and IDS can perform better by using the history of the game. As this game approaches to Nash equilibrium, it leads to a defense strategy for the network.</abstract><pub>IEEE</pub><doi>10.1109/CMC.2009.325</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9780769535012 |
ispartof | 2009 WRI International Conference on Communications and Mobile Computing, 2009, Vol.3, p.507-511 |
issn | |
language | eng |
recordid | cdi_ieee_primary_4797305 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Ad hoc networks Batteries Bayesian methods Computer crime Cryptography Intrusion detection Intrusion detection system Monitoring Protection Routing protocols Security Wireless sensor networks |
title | A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T13%3A27%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20Bayesian%20Game%20Approach%20for%20Preventing%20DoS%20Attacks%20in%20Wireless%20Sensor%20Networks&rft.btitle=2009%20WRI%20International%20Conference%20on%20Communications%20and%20Mobile%20Computing&rft.au=Mohi,%20M.&rft.date=2009-01&rft.volume=3&rft.spage=507&rft.epage=511&rft.pages=507-511&rft.isbn=9780769535012&rft.isbn_list=0769535011&rft_id=info:doi/10.1109/CMC.2009.325&rft_dat=%3Cieee_6IE%3E4797305%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4797305&rfr_iscdi=true |