Title :
A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks
Author :
Reddy, Yenumula B.
Author_Institution :
Grambling State Univ., Grambling, LA, USA
Abstract :
Wireless sensor networks has grown a lot in recent years and offers excellent opportunities in defense related applications such as monitoring environment and collecting data related to antisocial activities. Currently, the needs of wireless sensors have become inevitable in daily life. With the continuous growth of wireless sensor networks in daily life, business, and defense applications, the security of transferring data from sensors to their destination has become an important research area. Due to the limitations of power, storage, and processing capabilities, current security mechanisms of wireless networks or wired networks can not apply directly to wireless sensor networks. So there is a need to develop new techniques or modify the current security mechanisms to transfer data from source (from the field) to base station (destination). In this paper, we discuss currently available intrusion detection techniques, attack models using game theory, and then propose a new framework to detect malicious nodes using zero sum game approach for nodes in the forward data path. The first part of research provides the game model with probability of energy required for transferring the data packets. The second part derives the model to detect the malicious nodes using probability of acknowledgement at source.
Keywords :
game theory; telecommunication security; wireless sensor networks; attack models; base station; energy requirement probability; environment monitoring; game theory approach; intrusion detection techniques; malicious node detection; security mechanisms; source acknowledgement probability; wired networks; wireless sensor networks; zero sum game approach; Authentication; Base stations; Communication system security; Data security; Game theory; Information security; Intrusion detection; Monitoring; Secure storage; Wireless sensor networks; Nash equilibrium; deployment; game theory; processing capability; security; wireless sensor networks;
Conference_Titel :
Sensor Technologies and Applications, 2009. SENSORCOMM '09. Third International Conference on
Conference_Location :
Athens, Glyfada
Print_ISBN :
978-0-7695-3669-9
DOI :
10.1109/SENSORCOMM.2009.76