Article ID: | iaor20119208 |
Volume: | 62 |
Issue: | 6 |
Start Page Number: | 2404 |
End Page Number: | 2416 |
Publication Date: | Sep 2011 |
Journal: | Computers and Mathematics with Applications |
Authors: | Xu Hongyun, Shen Shigen, Li Yuanjie, Cao Qiying |
Keywords: | game theory, security |
As Wireless Sensor Networks (WSNs) become increasingly popular, it is necessary to require Intrusion Detection System (IDS) available to detect internal malicious sensor nodes. Because sensor nodes have limited capabilities in terms of their computation, communication, and energy, selecting the profitable detection strategy for lowering resources consumption determines whether the IDS can be used practically. In this paper, we adopt the distributed‐centralized network in which each sensor node has equipped an IDS agent, but only the IDS agent resided in the Cluster Head (CH) with sufficient energy will launch. Then, we apply the signaling game to construct an Intrusion Detection Game modeling the interactions between a malicious sensor node and a CH‐IDS agent, and seek its equilibriums for the optimal detection strategy. We illustrate the stage Intrusion Detection Game at an individual time slot in aspects of its player’s utilities, pure‐strategy Bayesian–Nash equilibrium (BNE) and mixed‐strategy BNE. Under these BNEs the CH‐IDS agent is not always on the