An Optimal Decision Method for Intrusion Detection System in Wireless Sensor Networks With Enhanced Cooperation Mechanism

  title={An Optimal Decision Method for Intrusion Detection System in Wireless Sensor Networks With Enhanced Cooperation Mechanism},
  author={Yongwen Du and Jinzong Xia and Ji Ma and Wenxian Zhang},
  journal={IEEE Access},
When it comes to selecting an optimal defense strategy for an intrusion detection system of a wireless sensor network, such challenges as those brought about by the diversification of the attack methods and the expanded database of the attack patterns have to be dealt with. To overcome those challenges, this paper combines realistic bounded rationality with the incomplete information of the attack-defense players by employing evolutionary game theory as a tool. Firstly, an attack-defense… Expand


Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model
The paper not only improves the autoregressive theory model into a non-cooperative, complete-information, static game model, but also predicts attack pattern reliably and reduces energy consumption. Expand
Intrusion Detection in Wireless Sensor Networks with an Improved NSA Based on Space Division
Theoretical analysis and experimental results show that the proposed negative selection algorithm has better time efficiency and quality of detectors, saves sensor node resources and reduces the energy consumption, and is an effective algorithm for wireless sensor network intrusion detection. Expand
Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey
The significant role of evolutionary games for WSNs security against intelligent attacks is identified and several prospect applications of game theory are listed to enhance the data trustworthiness and node cooperation in different W SNs. Expand
A Machine Learning Based Intrusion Detection System for Mobile Internet of Things
The detection characterization is presented for different extreme scenarios in the network, pertaining to the power level and node velocity for two different mobility models: Random way point (RWP), and Gauss Markov (GM). Expand
On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks
A comprehensive classification of various IDS approaches according to their employed detection techniques is presented, and the three main categories explored in this paper are anomaly detection, misuse detection, and specification-based detection protocols. Expand
Decentralized intrusion detection in wireless sensor networks
This work proposes an IDS that fits the demands and restrictions of WSNs and results reveal that the proposed IDS is efficient and accurate in detecting different kinds of simulated attacks. Expand
Attack-Defense Differential Game Model for Network Defense Strategy Selection
The attack-defense differential game model was constructed by introducing the differential game theory, and the algorithm of optimal defense strategies selection in the real-time confrontation was designed, which is more targeted and has greater timeliness. Expand
Optimal Network Defense Strategy Selection Based on Incomplete Information Evolutionary Game
The Bayesian attack–defense evolutionary game model combining with incomplete information game scenario is built and the evolutionary stable equilibrium is calculated, giving the algorithm of selecting optimal defense strategy and depicting the evolutionary track of this strategy selected by the defender with time going by. Expand
PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks
Spoofing detection schemes based on Q-learning and Dyna-Q are proposed, which achieve the optimal test threshold in the spoofing detection via reinforcement learning and are implemented over universal software radio peripherals and evaluated via experiments in indoor environments. Expand
Pareto-Optimal Adversarial Defense of Enterprise Systems
This article captures the vulnerabilities in an enterprise as a Vulnerability Dependency Graph (VDG) and shows that attacks graphs can be expressed in them and proposes an algorithm that finds a Pareto-optimal solution for the defender that allows him to simultaneously maximize productivity and minimize the cost of patching products on the enterprise network. Expand