Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2010
DOI: 10.4236/ijcns.2010.37080
|View full text |Cite
|
Sign up to set email alerts
|

Using Bayesian Game Model for Intrusion Detection in Wireless Ad Hoc Networks

Abstract: Wireless ad ho network is becoming a new research fronter, in which security is an important issue. Usually some nodes act maliciously and they are able to do different kinds of Denial of Service (Dos). Because of the limited resource, intrusion detection system (IDS) runs all the time to detect intrusion of the attacker which is a costly overhead. In our model, we use game theory to model the interactions between the intrusion detection system and the attacker, and a realistic model is given by using Bayesian… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…In [4], authors want to incorporate a practical scheme with decision and control developed with game-theoretic tools. Previous works also proposed to establish belief between nodes using bayesian games [15]. But this technique can create overhead in the network.…”
Section: A Intrusion Detection Trust Management and Game Theorymentioning
confidence: 98%
See 1 more Smart Citation
“…In [4], authors want to incorporate a practical scheme with decision and control developed with game-theoretic tools. Previous works also proposed to establish belief between nodes using bayesian games [15]. But this technique can create overhead in the network.…”
Section: A Intrusion Detection Trust Management and Game Theorymentioning
confidence: 98%
“…Contributions(+) Limitations (-) Dynamic non cooperative game [10] Maximize the effective payoff by minimizing No consideration about selfish node activity the cost due to false alarms and missed attacks No consideration about malicious node coalitions Bayesian game [14] To detect the intrusion based on the belief Does not consider the scenario when updated by the regular node about its neighbor attackers come in a group Non cooperative game [10] Increase its monitoring probability by Resource consumption reducing the utility of the malicious coalition Stackelberg game [15] defender's strategy can be viewed Complicate equilibrium as a function of attacker's strategy. Bayesian Stackelberg game the leader is uncertain heuristic methods to solve about the types of adversary it may face Advantages The attacker as leader…”
Section: Game Solutionsmentioning
confidence: 99%
“…In , Wei and Sun used the Bayesian game theory to model the interactions between the IDS and attacker as a one‐stage game, and this game has two Bayesian Nash equilibrium states. Then, they extended this game as a multi‐stage game, where the lifetime of the network is divided into intervals and one‐stage game is used as a repeated game over these intervals.…”
Section: Intrusion Detection Techniquesmentioning
confidence: 99%
“…This scheme utilizes the abnormal path attractions to construct the routing table for the nodes in the communication range. The Bayesian game theory based IDS model [9] takes into account the interactions between the players. However, the main drawback in WARP is that it has to maintain the detection accuracy under the dynamic nature of MANETs.…”
Section: Related Workmentioning
confidence: 99%