Detecting intrusive activities from insiders in a wireless sensor network using game theory

PETRA '13: Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments(2013)

引用 11|浏览0
暂无评分
摘要
Compromised nodes in a Wireless Sensor Network disrupt its specified normal operation. To identify and isolate such nodes is essential in pervasive computing environments where WSNs have numerous applications. We model a three player non-cooperative game, to study the interactions between an insider and the Intrusion Detection Systems used in a WSN. By solving the game, we locate the Nash equilibria to determine how players should play it. Examining these equilibria, useful suggestions for recommended strategies can be made. Properly selected strategies assist a compromised node's identification and its subsequent isolation.
更多
查看译文
关键词
wireless sensor network,numerous application,intrusive activity,player non-cooperative game,intrusion detection systems,subsequent isolation,nash equilibrium,specified normal operation,recommended strategy,compromised node,pervasive computing environment,game theory,sensor networks,intrusion detection,trust
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要