Detecting intrusive activities from insiders in a wireless sensor network using game theory

  • Authors:
  • Ioanna Kantzavelou;Panagiotis F. Tzikopoulos;Sokratis K. Katsikas

  • Affiliations:
  • Institute of Athens, Athens, Greece;University of Piraeus, Pireaus, Greece;University of Piraeus, Pireaus, Greece

  • Venue:
  • Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Compromised nodes in a Wireless Sensor Network disrupt its specified normal operation. To identify and isolate such nodes is essential in pervasive computing environments where WSNs have numerous applications. We model a three player non-cooperative game, to study the interactions between an insider and the Intrusion Detection Systems used in a WSN. By solving the game, we locate the Nash equilibria to determine how players should play it. Examining these equilibria, useful suggestions for recommended strategies can be made. Properly selected strategies assist a compromised node's identification and its subsequent isolation.