• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Bayesian Rules Based Optimal Defense Strategies for Clustered WSNs


Abstract

Considering the topology of hierarchical tree structure, each cluster in WSNs is faced with various attacks launched by malicious nodes, which include network eavesdropping, channel interference and data tampering. The existing intrusion detection algorithm does not take into consideration the resource constraints of cluster heads and sensor nodes. Due to application requirements, sensor nodes in WSNs are deployed with approximately uncorrelated security weights. In our study, a novel and versatile intrusion detection system (IDS) for the optimal defense strategy is primarily introduced. Given the flexibility that wireless communication provides, it is unreasonable to expect malicious nodes will demonstrate a fixed behavior over time. Instead, malicious nodes can dynamically update the attack strategy in response to the IDS in each game stage. Thus, a multi-stage intrusion detection game (MIDG) based on Bayesian rules is proposed. In order to formulate the solution of MIDG, an in-depth analysis on the Bayesian equilibrium is performed iteratively. Depending on the MIDG theoretical analysis, the optimal behaviors of rational attackers and defenders are derived and calculated accurately. The numerical experimental results validate the effectiveness and robustness of the proposed scheme.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
Weiwei Zhou and Bin Yu, "Bayesian Rules Based Optimal Defense Strategies for Clustered WSNs," KSII Transactions on Internet and Information Systems, vol. 12, no. 12, pp. 5819-5840, 2018. DOI: 10.3837/tiis.2018.12.012

[ACM Style]
Zhou, W. and Yu, B. 2018. Bayesian Rules Based Optimal Defense Strategies for Clustered WSNs. KSII Transactions on Internet and Information Systems, 12, 12, (2018), 5819-5840. DOI: 10.3837/tiis.2018.12.012