WiFi Intrusion Detection and Prevention Systems Analyzing: A Game Theoretical Perspective

  • Hamidreza MahiniEmail author
  • Seyyedeh Mobarakeh Mousavirad


WiFi is the de-facto wireless standard which suffers from a significant security vulnerability. Indeed, the WiFi management frames are not sent via an encrypted channel. However, many studies have been conducted to face this issue, but, preparing a comprehensive model for assessing the performance of these systems under different conditions is a research gap. In this paper, we propose an Abstract WIDPS with a useful but straightforward response function in confronting management frames transferring in an insecure channel. Indeed, we model the interaction between the entities involved in the problem based on game theory and propose a performance evaluation method for WIDPS depending on the network application context and the importance of confidentiality, integrity, and availability as the three principles of information security. This model provides an innovative solution for WIDPS qualitative classification. Finally, we evaluate the proposed method in several different samples, which obtains efficient results for classification and tuning of WIDPSs.


IEEE 802.11x WiFi Intrusion Detection and Prevention System (IDPS) Game theory 



  1. 1.
    Cisco visual networking index. Forecast and methodology, 20162021—cisco. Accessed 19 Oct 2018.
  2. 2.
    I.C.S.L.M.S. Committee, et al., ANSI/IEEE Std. 802.11-1999, 1999.Google Scholar
  3. 3.
    T.D. Nguyen, D.H. Nguyen, B.N. Tran, H. Vu, and N. Mittal, In: 2008 Proceedings of 17th international conference on computer Communications and networks IEEE, New York, pp. 1–6, 2008.Google Scholar
  4. 4.
    H. Han, B. Sheng, C. C. Tan, Q. Li and S. Lu, A timing-based scheme for rogue AP detection, IEEE Transactions on parallel and distributed Systems, Vol. 22, No. 11, p. 1912, 2011.CrossRefGoogle Scholar
  5. 5.
    R. Mitchell and R. Chen, A survey of intrusion detection in wireless network applications, Computer Communications, Vol. 42, p. 1, 2014.CrossRefGoogle Scholar
  6. 6.
    K. Scarfone and P. Mell, Guide to Intrusion Detection and Prevention Systems (IDPS), NIST Special Publication, Vol. 800, No. 2007, p. 94, 2007.Google Scholar
  7. 7.
    R. Myerson, Game Theory. Harvard University Press, Cambridge, 2013.
  8. 8.
    Y. Narahari, Game Theory and Mechanism Design4 ed., World ScientificSingapore, 2014.CrossRefGoogle Scholar
  9. 9.
    S. Tadelis, Game Theory: An Introduction, Princeton University PressPrinceton, 2013.zbMATHGoogle Scholar
  10. 10.
    K. Leyton-Brown, and Y. Shoham, Essentials of Game Theory: A Concise, Multidisciplinary Introduction. Synthesis lectures on artificial intelligence and machine learning. Morgan & Claypool Publishers, 2008.
  11. 11.
    B. Aslam, M.H. Islam, and S.A. Khan, In Proceedings of the First Mobile Computing and Wireless Communication International Conference, 2006. MCWC 2006. IEEE, New York, pp. 221–226, 2006.Google Scholar
  12. 12.
    B. Aslam, M.H. Islam, and S.A. Khan, In Proceedings of the First Mobile Computing and Wireless Communication International Conference, 2006. MCWC 2006. IEEE, New York, pp. 215–220, 2006.Google Scholar
  13. 13.
    K. Bicakci and B. Tavli, Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks, Computer Standards & Interfaces, Vol. 31, No. 5, p. 931, 2009.CrossRefGoogle Scholar
  14. 14.
    M. Malekzadeh, A. A. A. Ghani, J. Desa and S. Subramaniam, An experimental evaluation of DoS attack and its impact on throughput of IEEE 802.11 wireless networks, IJCSNS, Vol. 8, No. 8, p. 1, 2008.Google Scholar
  15. 15.
    M. Bernaschi, F. Ferreri and L. Valcamonici, Access points vulnerabilities to DoS attacks in 802.11 networks, Wireless Networks, Vol. 14, No. 2, p. 159, 2008.CrossRefGoogle Scholar
  16. 16.
    H. Hwang, G. Jung, K. Sohn, and S. Park, In International Conference on Information Science and Security, 2008. ICISS. IEEE, New York, pp. 164–170, 2008.Google Scholar
  17. 17.
    K. Bauer, H. Gonzales, and D. McCoy, In IEEE International Performance, computing and communications conference, 2008. IPCCC 2008. IEEE, New York, pp. 513–516, 2008.Google Scholar
  18. 18.
    S. Bratus, C. Cornelius, D. Kotz, and D. Peebles, In Proceedings of the first ACM conference on Wireless network security. ACM, New York, pp. 56–61, 2008.Google Scholar
  19. 19.
    G. Chen, H. Yao, and Z. Wang, In Second International Conference on Future Networks, 2010. ICFN’10. IEEE, New York, pp. 168–172, 2010.Google Scholar
  20. 20.
    C. Yang, Y. Song and G. Gu, Active user-side evil twin access point detection using statistical techniques, IEEE Transactions on Information Forensics and Security, Vol. 7, No. 5, p. 1638, 2012.CrossRefGoogle Scholar
  21. 21.
    S. Y. Rashida, Hybrid architecture for distributed intrusion detection system in wireless network, International Journal of Network Security & Its Applications, Vol. 5, No. 3, p. 45, 2013.CrossRefGoogle Scholar
  22. 22.
    N. Sharma, P. N. Barwal and C. Noida, Study of DoS Attacks on IEEE 802. 11 WLAN and its prevention/detection techniques, International Journal of Engineering Science and Innovative Technology (IJESIT), Vol. 3, No. 3, p. 245, 2014.Google Scholar
  23. 23.
    P. Kavitha and M. Usha, Anomaly based intrusion detection in wlan using discrimination Algorithm combined with Naive Bayesian Classifier Naive Bayesian Classifier, Journal of Theoretical & Applied Information Technology, Vol. 62, p. 1, 2014.Google Scholar
  24. 24.
    S. M. Moosavirad, P. Kabiri and H. Mahini, Rashnu: a Wi-Fi intrusion response scheme, Security and Communication Networks, Vol. 8, No. 12, p. 2070, 2015.CrossRefGoogle Scholar
  25. 25.
    N. Baharudin, F.H.M. Ali, M.Y. Darus, and N. Awang, In 2015 5th International Conference on IT Convergence and Security (ICITCS). IEEE, New York, pp. 1–5, 2015.Google Scholar
  26. 26.
    C. Kolias, G. Kambourakis, A. Stavrou and S. Gritzalis, Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset, IEEE Communications Surveys & Tutorials, Vol. 18, No. 1, p. 184, 2016.CrossRefGoogle Scholar
  27. 27.
    A. Kumar, P. Paul, In 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT). IEEE, New York, pp. 176–181, 2016.Google Scholar
  28. 28.
    M.A.C. Aung, and K.P. Thant, In 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE, New York, pp. 173–178, 2017.Google Scholar
  29. 29.
    J. Kaur, Networking Communication and Data Knowledge Engineering, SpringerBerlin, 2018. pp. 15–24.CrossRefGoogle Scholar
  30. 30.
    J.F.M. Sánchez, O.J.S. Parra, and A.A. López, In International Conference on Future Data and Security Engineering. Springer, Berlin, pp. 66–73, 2018.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Computer Engineering, Gorgan BranchIslamic Azad UniversityGorganIran
  2. 2.School of Computer EngineeringIran University of Science and Technology (IUST)TehranIran

Personalised recommendations