A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks

Wireless sensor networks (WSNs) are new technologies, foreseen to be used increasingly in the near future, and security is an important issue for them. However because of the nodes resource limitations, other schemes proposed for securing general ad hoc networks, are not appropriate for WSNs. Usuall...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Mohi, M., Movaghar, A., Zadeh, P.M.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 511
container_issue
container_start_page 507
container_title
container_volume 3
creator Mohi, M.
Movaghar, A.
Zadeh, P.M.
description Wireless sensor networks (WSNs) are new technologies, foreseen to be used increasingly in the near future, and security is an important issue for them. However because of the nodes resource limitations, other schemes proposed for securing general ad hoc networks, are not appropriate for WSNs. Usually some nodes act maliciously and they are able to do different kinds of DoS attacks. In order to make the network more secure, malicious nodes should be isolated from the network. In this paper, we model the interaction of nodes in WSN and intrusion detection system (IDS) as a Bayesian game formulation and use this idea to make a secure routing protocol. By this approach nodes are motivated to act normally and gain reputation, and IDS can perform better by using the history of the game. As this game approaches to Nash equilibrium, it leads to a defense strategy for the network.
doi_str_mv 10.1109/CMC.2009.325
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4797305</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4797305</ieee_id><sourcerecordid>4797305</sourcerecordid><originalsourceid>FETCH-LOGICAL-c218t-dd23f7befd7cc752e9b33290882afc11cf1dc558c1d85b32d35dec632acd72553</originalsourceid><addsrcrecordid>eNotjE9LwzAcQAMyUGdv3rzkC3Tmz35NcqxVpzCdMMXjSJNfNG5rS1KUfXsHenqH93iEXHI245yZ6-apmQnGzEwKOCGFUZqpyoAExsWEnB-VNlLpOTslRc5fjDFuKgUKzsiqpjf2gDnaji7sHmk9DKm37pOGPtGXhN_YjbH7oLf9mtbjaN0209jR95hwhznTNXb5WD7j-NOnbb4gk2B3GYt_Tsnb_d1r81AuV4vHpl6WTnA9lt4LGVSLwSvnFAg0rZTCMK2FDY5zF7h3ANpxr6GVwkvw6CoprPNKAMgpufr7RkTcDCnubTps5sooyUD-AlMWTqE</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Mohi, M. ; Movaghar, A. ; Zadeh, P.M.</creator><creatorcontrib>Mohi, M. ; Movaghar, A. ; Zadeh, P.M.</creatorcontrib><description>Wireless sensor networks (WSNs) are new technologies, foreseen to be used increasingly in the near future, and security is an important issue for them. However because of the nodes resource limitations, other schemes proposed for securing general ad hoc networks, are not appropriate for WSNs. Usually some nodes act maliciously and they are able to do different kinds of DoS attacks. In order to make the network more secure, malicious nodes should be isolated from the network. In this paper, we model the interaction of nodes in WSN and intrusion detection system (IDS) as a Bayesian game formulation and use this idea to make a secure routing protocol. By this approach nodes are motivated to act normally and gain reputation, and IDS can perform better by using the history of the game. As this game approaches to Nash equilibrium, it leads to a defense strategy for the network.</description><identifier>ISBN: 9780769535012</identifier><identifier>ISBN: 0769535011</identifier><identifier>DOI: 10.1109/CMC.2009.325</identifier><identifier>LCCN: 2008937840</identifier><language>eng</language><publisher>IEEE</publisher><subject>Ad hoc networks ; Batteries ; Bayesian methods ; Computer crime ; Cryptography ; Intrusion detection ; Intrusion detection system ; Monitoring ; Protection ; Routing protocols ; Security ; Wireless sensor networks</subject><ispartof>2009 WRI International Conference on Communications and Mobile Computing, 2009, Vol.3, p.507-511</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c218t-dd23f7befd7cc752e9b33290882afc11cf1dc558c1d85b32d35dec632acd72553</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4797305$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2057,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4797305$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Mohi, M.</creatorcontrib><creatorcontrib>Movaghar, A.</creatorcontrib><creatorcontrib>Zadeh, P.M.</creatorcontrib><title>A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks</title><title>2009 WRI International Conference on Communications and Mobile Computing</title><addtitle>CMC</addtitle><description>Wireless sensor networks (WSNs) are new technologies, foreseen to be used increasingly in the near future, and security is an important issue for them. However because of the nodes resource limitations, other schemes proposed for securing general ad hoc networks, are not appropriate for WSNs. Usually some nodes act maliciously and they are able to do different kinds of DoS attacks. In order to make the network more secure, malicious nodes should be isolated from the network. In this paper, we model the interaction of nodes in WSN and intrusion detection system (IDS) as a Bayesian game formulation and use this idea to make a secure routing protocol. By this approach nodes are motivated to act normally and gain reputation, and IDS can perform better by using the history of the game. As this game approaches to Nash equilibrium, it leads to a defense strategy for the network.</description><subject>Ad hoc networks</subject><subject>Batteries</subject><subject>Bayesian methods</subject><subject>Computer crime</subject><subject>Cryptography</subject><subject>Intrusion detection</subject><subject>Intrusion detection system</subject><subject>Monitoring</subject><subject>Protection</subject><subject>Routing protocols</subject><subject>Security</subject><subject>Wireless sensor networks</subject><isbn>9780769535012</isbn><isbn>0769535011</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjE9LwzAcQAMyUGdv3rzkC3Tmz35NcqxVpzCdMMXjSJNfNG5rS1KUfXsHenqH93iEXHI245yZ6-apmQnGzEwKOCGFUZqpyoAExsWEnB-VNlLpOTslRc5fjDFuKgUKzsiqpjf2gDnaji7sHmk9DKm37pOGPtGXhN_YjbH7oLf9mtbjaN0209jR95hwhznTNXb5WD7j-NOnbb4gk2B3GYt_Tsnb_d1r81AuV4vHpl6WTnA9lt4LGVSLwSvnFAg0rZTCMK2FDY5zF7h3ANpxr6GVwkvw6CoprPNKAMgpufr7RkTcDCnubTps5sooyUD-AlMWTqE</recordid><startdate>200901</startdate><enddate>200901</enddate><creator>Mohi, M.</creator><creator>Movaghar, A.</creator><creator>Zadeh, P.M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200901</creationdate><title>A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks</title><author>Mohi, M. ; Movaghar, A. ; Zadeh, P.M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c218t-dd23f7befd7cc752e9b33290882afc11cf1dc558c1d85b32d35dec632acd72553</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Ad hoc networks</topic><topic>Batteries</topic><topic>Bayesian methods</topic><topic>Computer crime</topic><topic>Cryptography</topic><topic>Intrusion detection</topic><topic>Intrusion detection system</topic><topic>Monitoring</topic><topic>Protection</topic><topic>Routing protocols</topic><topic>Security</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Mohi, M.</creatorcontrib><creatorcontrib>Movaghar, A.</creatorcontrib><creatorcontrib>Zadeh, P.M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Mohi, M.</au><au>Movaghar, A.</au><au>Zadeh, P.M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks</atitle><btitle>2009 WRI International Conference on Communications and Mobile Computing</btitle><stitle>CMC</stitle><date>2009-01</date><risdate>2009</risdate><volume>3</volume><spage>507</spage><epage>511</epage><pages>507-511</pages><isbn>9780769535012</isbn><isbn>0769535011</isbn><abstract>Wireless sensor networks (WSNs) are new technologies, foreseen to be used increasingly in the near future, and security is an important issue for them. However because of the nodes resource limitations, other schemes proposed for securing general ad hoc networks, are not appropriate for WSNs. Usually some nodes act maliciously and they are able to do different kinds of DoS attacks. In order to make the network more secure, malicious nodes should be isolated from the network. In this paper, we model the interaction of nodes in WSN and intrusion detection system (IDS) as a Bayesian game formulation and use this idea to make a secure routing protocol. By this approach nodes are motivated to act normally and gain reputation, and IDS can perform better by using the history of the game. As this game approaches to Nash equilibrium, it leads to a defense strategy for the network.</abstract><pub>IEEE</pub><doi>10.1109/CMC.2009.325</doi><tpages>5</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9780769535012
ispartof 2009 WRI International Conference on Communications and Mobile Computing, 2009, Vol.3, p.507-511
issn
language eng
recordid cdi_ieee_primary_4797305
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Ad hoc networks
Batteries
Bayesian methods
Computer crime
Cryptography
Intrusion detection
Intrusion detection system
Monitoring
Protection
Routing protocols
Security
Wireless sensor networks
title A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T13%3A27%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20Bayesian%20Game%20Approach%20for%20Preventing%20DoS%20Attacks%20in%20Wireless%20Sensor%20Networks&rft.btitle=2009%20WRI%20International%20Conference%20on%20Communications%20and%20Mobile%20Computing&rft.au=Mohi,%20M.&rft.date=2009-01&rft.volume=3&rft.spage=507&rft.epage=511&rft.pages=507-511&rft.isbn=9780769535012&rft.isbn_list=0769535011&rft_id=info:doi/10.1109/CMC.2009.325&rft_dat=%3Cieee_6IE%3E4797305%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4797305&rfr_iscdi=true