Skip to main content

2019 | OriginalPaper | Buchkapitel

Intrusion Detection System for IoT Heterogeneous Perceptual Network Based on Game Theory

verfasst von : Man Zhou, Lansheng Han, Hongwei Lu, Cai Fu

Erschienen in: Security and Privacy in New Computing Environments

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the acceleration of the Internet of things (IoT) construction, the security and energy consumption of IoT will become an import factor restricting the overall development of the IoT. In order to reduce the energy consumption of the IoT heterogeneous perceptual network in the attack-defense process, the placement strategy of the intrusion detection system (IDS) described in this paper is to place the IDS on the cluster head nodes selected by the clustering algorithm called ULEACH, which we have proposed in this paper. Furthermore, by applying modified particle swarm optimization, the optimal defense strategy is obtained. Finally, the experiment results show that proposed strategy not only effectively detects multiple network attacks, but also reduces energy consumption.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Castiglione, A., Palmieri, F., Fiore, U.: Modeling energy-efficient secure communications in multi-mode wireless mobile devices. Comput. Syst. Sci. 81, 1464–1478 (2015)MathSciNetCrossRef Castiglione, A., Palmieri, F., Fiore, U.: Modeling energy-efficient secure communications in multi-mode wireless mobile devices. Comput. Syst. Sci. 81, 1464–1478 (2015)MathSciNetCrossRef
2.
Zurück zum Zitat Bhunia, S.: Internet of things security: are we paranoid enough. In: 2018 IEEE International Conference on Consumer Electronics (ICCE), p. 1. IEEE (2018) Bhunia, S.: Internet of things security: are we paranoid enough. In: 2018 IEEE International Conference on Consumer Electronics (ICCE), p. 1. IEEE (2018)
3.
Zurück zum Zitat Caviglione, L., Merlo, A.: The energy impact of security mechanisms in modern mobile devices. Netw. Secur. 2012(2), 11–14 (2012)CrossRef Caviglione, L., Merlo, A.: The energy impact of security mechanisms in modern mobile devices. Netw. Secur. 2012(2), 11–14 (2012)CrossRef
4.
Zurück zum Zitat Hajisalem, V., Babaie, S.: A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Comput. Netw. 136, 37–50 (2018)CrossRef Hajisalem, V., Babaie, S.: A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Comput. Netw. 136, 37–50 (2018)CrossRef
5.
Zurück zum Zitat Han, L., Zhou, M., Jia, W., Dalil, Z., Xu, X.: Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model. Inf. Sci. 476, 491–504 (2018)CrossRef Han, L., Zhou, M., Jia, W., Dalil, Z., Xu, X.: Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model. Inf. Sci. 476, 491–504 (2018)CrossRef
6.
Zurück zum Zitat Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on IEEE, vol. 2, p. 10 (2000) Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on IEEE, vol. 2, p. 10 (2000)
7.
Zurück zum Zitat Henningsen, S., Dietzel, S., Scheuermann, B.: Misbehavior detection in industrial wireless networks: challenges and directions. Mobile Netw. Appl. 23(5), 1330–1336 (2018)CrossRef Henningsen, S., Dietzel, S., Scheuermann, B.: Misbehavior detection in industrial wireless networks: challenges and directions. Mobile Netw. Appl. 23(5), 1330–1336 (2018)CrossRef
8.
Zurück zum Zitat Hossein, J.: Designing an agent-based intrusion detection system for heterogeneous wireless sensor networks: robust, fault tolerant and dynamic reconfigurable. Int. J. Commun. Netw. Syst. Sci. 4, 523–543 (2011) Hossein, J.: Designing an agent-based intrusion detection system for heterogeneous wireless sensor networks: robust, fault tolerant and dynamic reconfigurable. Int. J. Commun. Netw. Syst. Sci. 4, 523–543 (2011)
9.
Zurück zum Zitat Luo, J., Wu, D.: Optimal energy strategy for node selection and data relay in WSN-based IoT. Mobile Netw. Appl. 20(2), 169–180 (2015)CrossRef Luo, J., Wu, D.: Optimal energy strategy for node selection and data relay in WSN-based IoT. Mobile Netw. Appl. 20(2), 169–180 (2015)CrossRef
10.
Zurück zum Zitat Merlo, A., Migliardi, M., Caviglione, L.: A survey on energy-aware security mechanisms. Pervasive Mob. Comput. 24, 77–90 (2015). special Issue on Secure Ubiquitous ComputingCrossRef Merlo, A., Migliardi, M., Caviglione, L.: A survey on energy-aware security mechanisms. Pervasive Mob. Comput. 24, 77–90 (2015). special Issue on Secure Ubiquitous ComputingCrossRef
12.
Zurück zum Zitat Ozger, M., Cetinkaya, O., Akan, O.B.: Energy harvesting cognitive radio networking for IoT-enabled smart grid. Mobile Netw. Appl. 23(4), 956–966 (2018)CrossRef Ozger, M., Cetinkaya, O., Akan, O.B.: Energy harvesting cognitive radio networking for IoT-enabled smart grid. Mobile Netw. Appl. 23(4), 956–966 (2018)CrossRef
13.
Zurück zum Zitat Sadek, R.A.: Hybrid energy aware clustered protocol for IoT heterogeneous network. Future Comput. Inform. J. 3(2), 166–177 (2018)CrossRef Sadek, R.A.: Hybrid energy aware clustered protocol for IoT heterogeneous network. Future Comput. Inform. J. 3(2), 166–177 (2018)CrossRef
14.
Zurück zum Zitat Sedjelmaci, H., Senouci, S.M., Taleb, T.: An accurate security game for low-resource IoT devices. IEEE Trans. Veh. Technol. 66(10), 9381–9393 (2017)CrossRef Sedjelmaci, H., Senouci, S.M., Taleb, T.: An accurate security game for low-resource IoT devices. IEEE Trans. Veh. Technol. 66(10), 9381–9393 (2017)CrossRef
15.
Zurück zum Zitat Sedjelmaci, H., Senouci, S.M., Feham, M.: New framework for a hierarchical intrusion detection mechanism in cluster-based wireless sensor networks. Secur. Commun. Netw. (2011) Sedjelmaci, H., Senouci, S.M., Feham, M.: New framework for a hierarchical intrusion detection mechanism in cluster-based wireless sensor networks. Secur. Commun. Netw. (2011)
16.
Zurück zum Zitat Shi, Y., Eberhart, R.: A modified particle swarm optimizer. In: Proceedings of the IEEE Conference on Evolutionary Computation, pp. 69–73 (1998) Shi, Y., Eberhart, R.: A modified particle swarm optimizer. In: Proceedings of the IEEE Conference on Evolutionary Computation, pp. 69–73 (1998)
Metadaten
Titel
Intrusion Detection System for IoT Heterogeneous Perceptual Network Based on Game Theory
verfasst von
Man Zhou
Lansheng Han
Hongwei Lu
Cai Fu
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-21373-2_37