Attack and defense game strategy of wireless sensor networks under multiple attacks

Ziyi Yang*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

Only one type of attack behavior is considered in the traditional attack and defense models of wireless sensor networks (WSNs). But in fact, malicious nodes often take multiple attacks and adjust the attack strategy flexibly according to the defense of the other side in order to improve the success rate of attacks. In view of this situation, the attack and defense games in WSNs under external attack, internal attack and hybrid attack are studied respectively in this paper. Game models under three types of attacks are established based on the incomplete information game theory. Through the analysis and solution of the game models, the optimal strategies of both offense and defense are obtained. The theoretical results are verified by numerical simulations. The research results have practical guiding significance for the design of Intrusion Detection System (IDS) in WSNs.

Original languageEnglish
Title of host publicationProceedings of the 38th Chinese Control Conference, CCC 2019
EditorsMinyue Fu, Jian Sun
PublisherIEEE Computer Society
Pages6349-6356
Number of pages8
ISBN (Electronic)9789881563972
DOIs
Publication statusPublished - Jul 2019
Externally publishedYes
Event38th Chinese Control Conference, CCC 2019 - Guangzhou, China
Duration: 27 Jul 201930 Jul 2019

Publication series

NameChinese Control Conference, CCC
Volume2019-July
ISSN (Print)1934-1768
ISSN (Electronic)2161-2927

Conference

Conference38th Chinese Control Conference, CCC 2019
Country/TerritoryChina
CityGuangzhou
Period27/07/1930/07/19

Keywords

  • Game theory
  • Intrusion detection system
  • Malicious attack
  • Wireless sensor networks

Fingerprint

Dive into the research topics of 'Attack and defense game strategy of wireless sensor networks under multiple attacks'. Together they form a unique fingerprint.

Cite this