TY - GEN
T1 - Attack and defense game strategy of wireless sensor networks under multiple attacks
AU - Yang, Ziyi
N1 - Publisher Copyright:
© 2019 Technical Committee on Control Theory, Chinese Association of Automation.
PY - 2019/7
Y1 - 2019/7
N2 - Only one type of attack behavior is considered in the traditional attack and defense models of wireless sensor networks (WSNs). But in fact, malicious nodes often take multiple attacks and adjust the attack strategy flexibly according to the defense of the other side in order to improve the success rate of attacks. In view of this situation, the attack and defense games in WSNs under external attack, internal attack and hybrid attack are studied respectively in this paper. Game models under three types of attacks are established based on the incomplete information game theory. Through the analysis and solution of the game models, the optimal strategies of both offense and defense are obtained. The theoretical results are verified by numerical simulations. The research results have practical guiding significance for the design of Intrusion Detection System (IDS) in WSNs.
AB - Only one type of attack behavior is considered in the traditional attack and defense models of wireless sensor networks (WSNs). But in fact, malicious nodes often take multiple attacks and adjust the attack strategy flexibly according to the defense of the other side in order to improve the success rate of attacks. In view of this situation, the attack and defense games in WSNs under external attack, internal attack and hybrid attack are studied respectively in this paper. Game models under three types of attacks are established based on the incomplete information game theory. Through the analysis and solution of the game models, the optimal strategies of both offense and defense are obtained. The theoretical results are verified by numerical simulations. The research results have practical guiding significance for the design of Intrusion Detection System (IDS) in WSNs.
KW - Game theory
KW - Intrusion detection system
KW - Malicious attack
KW - Wireless sensor networks
UR - http://www.scopus.com/inward/record.url?scp=85074384565&partnerID=8YFLogxK
U2 - 10.23919/ChiCC.2019.8866329
DO - 10.23919/ChiCC.2019.8866329
M3 - Conference contribution
AN - SCOPUS:85074384565
T3 - Chinese Control Conference, CCC
SP - 6349
EP - 6356
BT - Proceedings of the 38th Chinese Control Conference, CCC 2019
A2 - Fu, Minyue
A2 - Sun, Jian
PB - IEEE Computer Society
T2 - 38th Chinese Control Conference, CCC 2019
Y2 - 27 July 2019 through 30 July 2019
ER -