Securing MWSNs using Game Theory and Multiple Evidence Approach

Authors

  • Bindushree V. Department of Computer Science and Engineering, BGSIT, ACU, Mandya, India

Keywords:

Denial of Service Attack, Network Simulator, malicious, Mobile wireless sensor network, Game theoretic

Abstract

Mobile wireless sensor network can be distinct as a wireless sensor association in which the nodes are mobile. There are many applications which make use of wireless sensor network so protection of nodes in the network is very important. These nodes are limited in terms of their processing units and power. Each sensor node is vulnerable to malicious attacks, so ensuring proper network operation is essential to protect these nodes from the attacks. In MWSNs, denial of service attack is more damaging the network by sending unnecessary packets to the victim node to drain resources offered to the fatality node. Denial of service attack is exceedingly complicated to detect using traditional invasion recognition systems. The proposed method, adopts a combination of game theory and multiple evidence combination. Game theoretic approach is a diversion between the nodes, attacker and intrusion detection system. The game will be performed at any moment a target node encounters a packet at the same time as a DDoS assail after an unambiguous sill in mobile wireless sensor network. Multiple evidence combination finds out internal attacks, by collecting evidences from the neighbour nodes and detects misbehaving nodes and isolates it. In order to estimate the concert of anticipated form, the optimized link state routing protocol was replicated in NS-2 simulator. The proposed model attack`s detection yields greater packet delivery ratio and reduced average end to end delay and packet loss.

 

References

A. Agah and S. K. Das, “Preventing DoS attacks in wireless sensor networks: A repeated game theory approach,” International Journal of Network Security, vol.5, Sept. 2007, pp. 145–153.

M. Kodialam and T. V. Lakshman, “Detecting network intrusions via sampling: A game theoretic approach,” Proc. Annual Joint Conference of the IEEE Computer and Communications (INFOCOM 2003), vol. 3, 2003, pp. 1880-1889.

Thomas, R., Mark, B., Johnson, T., and Croall, J. (2003) NetBouncer: Clientlegitimacy- based highperformance DDoS filtering. Proceedings of the 3rd DARPA Information Survivability Conference and Exposition, Washington, DC, 22-24 April, pp. 111–113. IEEE CS, USA.

Downloads

Published

2019-12-31

How to Cite

[1]
B. V., “Securing MWSNs using Game Theory and Multiple Evidence Approach”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 7, no. 6, pp. 43–45, Dec. 2019.

Issue

Section

Research Article

Similar Articles

<< < 4 5 6 7 8 9 10 11 12 13 > >> 

You may also start an advanced similarity search for this article.