Skip to main content

Intrusion Detection System for IoT Heterogeneous Perceptual Network Based on Game Theory

  • Conference paper
  • First Online:
Book cover Security and Privacy in New Computing Environments (SPNCE 2019)

Abstract

With the acceleration of the Internet of things (IoT) construction, the security and energy consumption of IoT will become an import factor restricting the overall development of the IoT. In order to reduce the energy consumption of the IoT heterogeneous perceptual network in the attack-defense process, the placement strategy of the intrusion detection system (IDS) described in this paper is to place the IDS on the cluster head nodes selected by the clustering algorithm called ULEACH, which we have proposed in this paper. Furthermore, by applying modified particle swarm optimization, the optimal defense strategy is obtained. Finally, the experiment results show that proposed strategy not only effectively detects multiple network attacks, but also reduces energy consumption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Castiglione, A., Palmieri, F., Fiore, U.: Modeling energy-efficient secure communications in multi-mode wireless mobile devices. Comput. Syst. Sci. 81, 1464–1478 (2015)

    Article  MathSciNet  Google Scholar 

  2. Bhunia, S.: Internet of things security: are we paranoid enough. In: 2018 IEEE International Conference on Consumer Electronics (ICCE), p. 1. IEEE (2018)

    Google Scholar 

  3. Caviglione, L., Merlo, A.: The energy impact of security mechanisms in modern mobile devices. Netw. Secur. 2012(2), 11–14 (2012)

    Article  Google Scholar 

  4. Hajisalem, V., Babaie, S.: A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Comput. Netw. 136, 37–50 (2018)

    Article  Google Scholar 

  5. Han, L., Zhou, M., Jia, W., Dalil, Z., Xu, X.: Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model. Inf. Sci. 476, 491–504 (2018)

    Article  Google Scholar 

  6. Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on IEEE, vol. 2, p. 10 (2000)

    Google Scholar 

  7. Henningsen, S., Dietzel, S., Scheuermann, B.: Misbehavior detection in industrial wireless networks: challenges and directions. Mobile Netw. Appl. 23(5), 1330–1336 (2018)

    Article  Google Scholar 

  8. Hossein, J.: Designing an agent-based intrusion detection system for heterogeneous wireless sensor networks: robust, fault tolerant and dynamic reconfigurable. Int. J. Commun. Netw. Syst. Sci. 4, 523–543 (2011)

    Google Scholar 

  9. Luo, J., Wu, D.: Optimal energy strategy for node selection and data relay in WSN-based IoT. Mobile Netw. Appl. 20(2), 169–180 (2015)

    Article  Google Scholar 

  10. Merlo, A., Migliardi, M., Caviglione, L.: A survey on energy-aware security mechanisms. Pervasive Mob. Comput. 24, 77–90 (2015). special Issue on Secure Ubiquitous Computing

    Article  Google Scholar 

  11. Michael Quick, T.R.D.: The deter project. https://www.isi.deterlab.net/index.php3

  12. Ozger, M., Cetinkaya, O., Akan, O.B.: Energy harvesting cognitive radio networking for IoT-enabled smart grid. Mobile Netw. Appl. 23(4), 956–966 (2018)

    Article  Google Scholar 

  13. Sadek, R.A.: Hybrid energy aware clustered protocol for IoT heterogeneous network. Future Comput. Inform. J. 3(2), 166–177 (2018)

    Article  Google Scholar 

  14. Sedjelmaci, H., Senouci, S.M., Taleb, T.: An accurate security game for low-resource IoT devices. IEEE Trans. Veh. Technol. 66(10), 9381–9393 (2017)

    Article  Google Scholar 

  15. Sedjelmaci, H., Senouci, S.M., Feham, M.: New framework for a hierarchical intrusion detection mechanism in cluster-based wireless sensor networks. Secur. Commun. Netw. (2011)

    Google Scholar 

  16. Shi, Y., Eberhart, R.: A modified particle swarm optimizer. In: Proceedings of the IEEE Conference on Evolutionary Computation, pp. 69–73 (1998)

    Google Scholar 

Download references

Acknowledgment

This paper is supported by National Natural Science Fund NSF: 61272033 & 61572222.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lansheng Han .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhou, M., Han, L., Lu, H., Fu, C. (2019). Intrusion Detection System for IoT Heterogeneous Perceptual Network Based on Game Theory. In: Li, J., Liu, Z., Peng, H. (eds) Security and Privacy in New Computing Environments. SPNCE 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 284. Springer, Cham. https://doi.org/10.1007/978-3-030-21373-2_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-21373-2_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-21372-5

  • Online ISBN: 978-3-030-21373-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics