Abstract
Intrusion Detection Systems (IDS) have become a necessary complement to any security infrastructure and are widely deployed as an additional line of defense to conventional security techniques. Intrusion detection techniques have been widely studied in the literature for the conventional networks. However, due to the specific characteristics of the mobile ad hoc networks (MANET), such as the lack of a fixed infrastructure and a centralized management, the implementation of an IDS presents several new challenges that must be addressed. In this paper, we present a game-based approach to implement an intrusion detection system in MANETs. We consider the selfish node behavior and discuss mechanisms that stimulate cooperation between nodes while reducing the consumption of energy due to deployment of the IDS. We also address the problem of increasing the effectiveness of security mechanism by developing a network packet sampling strategy, to effectively detect network intrusions with respect to a given total sampling budget, and find the right moment for notifying specific nodes to launch countermeasures. Finally, we evaluate the proposed approach via simulations where the results show the effectiveness of the proposed intrusion detection model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
MCH: represents the set of the cluster members with \(CH\) as cluster-head.
References
Altman, E., Boulogne, T., Azouzi, R.-E., Jimenez, T., Wynter, L.: A survey on networking games in telecommunications. Comput. Oper. Res. 33, 286–311 (2006)
Bhattacharya, P., Debbabi, M., Mohammed, N., Otrok, H., Wang, L.: Mechanism design-based secure leader election model for intrusion detection in MANET. IEEE Trans. Dependable Secure Comput. 8, 89–103 (2011)
Da Silva, A-P-R., Martins, M-H-T., Rocha, B.P.S., Loureiro, A.A.F., Ruiz, L.B., Wong, H.C.: Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the \(1^{st}\) ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks, pp. 16–23(2005)
Kamhoua, C.-A., Makki, K., Pissinou, N.: Game theoretic modeling and evolution of trust in autonomous multi-hop networks application to network security and privacy, pp. 1–6. IEEE Communications Society (2011)
Kodialam, M., Lakshman, T.: Detecting network intrusions via sampling: a game theoretical approach. Bell Laboratories Lucent Technologies (2003)
Koltsidas, G., Pavlidou, F.-N.: A game theoretical approach to clustering of ad hoc and sensor networks. Telecommun. Syst. 47, 81–93 (2011)
Komathy, K., Narayanasamy, P.: Study of cooperation among selfish neighbors in MANET under evolutionary game theoretic model. In: IEEE- ICSNC, pp. 133–138 (2007)
Li, F., Wu, J.: Hit and run: a Bayesian game between malicious and regular nodes in MANETs. In: IEEE SECON, pp. 432–440 (2008)
Mahrandish, M., Assi, C., Debbabi, M.: A game theoritic model to handle network intrusions over multiple packets. In: Proceedings of IEEE International Conference on Communications (ICC), Turkey (2006)
Osborne, M.-J.: An Introduction to Game Theory. Oxford University Press, New York (2000)
Otrok, H., Mohammed, N., Wang, L., Debbabi, M., Bhattacharya, P.: A moderate to robust game theoretical model for intrusion detection in MANETs. In: Wireless Communications and Networking Conference (WCNC), pp. 608–612 (2008)
Robert, J.-M., Otrok, H., Chriqi, A.: RBC-OLSR: reputation-based clustering OLSR protocol for wireless ad hoc networks. Comput. Commun. 35, 487–499 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Bouhaddi, M., Radjef, M.S., Adi, K. (2015). A Game Approach for an Efficient Intrusion Detection System in Mobile Ad Hoc Networks. In: Cuppens, F., Garcia-Alfaro, J., Zincir Heywood, N., Fong, P. (eds) Foundations and Practice of Security. FPS 2014. Lecture Notes in Computer Science(), vol 8930. Springer, Cham. https://doi.org/10.1007/978-3-319-17040-4_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-17040-4_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-17039-8
Online ISBN: 978-3-319-17040-4
eBook Packages: Computer ScienceComputer Science (R0)