Skip to main content

A Game Approach for an Efficient Intrusion Detection System in Mobile Ad Hoc Networks

  • Conference paper
  • First Online:
Foundations and Practice of Security (FPS 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8930))

Included in the following conference series:

Abstract

Intrusion Detection Systems (IDS) have become a necessary complement to any security infrastructure and are widely deployed as an additional line of defense to conventional security techniques. Intrusion detection techniques have been widely studied in the literature for the conventional networks. However, due to the specific characteristics of the mobile ad hoc networks (MANET), such as the lack of a fixed infrastructure and a centralized management, the implementation of an IDS presents several new challenges that must be addressed. In this paper, we present a game-based approach to implement an intrusion detection system in MANETs. We consider the selfish node behavior and discuss mechanisms that stimulate cooperation between nodes while reducing the consumption of energy due to deployment of the IDS. We also address the problem of increasing the effectiveness of security mechanism by developing a network packet sampling strategy, to effectively detect network intrusions with respect to a given total sampling budget, and find the right moment for notifying specific nodes to launch countermeasures. Finally, we evaluate the proposed approach via simulations where the results show the effectiveness of the proposed intrusion detection model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    MCH: represents the set of the cluster members with \(CH\) as cluster-head.

References

  1. Altman, E., Boulogne, T., Azouzi, R.-E., Jimenez, T., Wynter, L.: A survey on networking games in telecommunications. Comput. Oper. Res. 33, 286–311 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  2. Bhattacharya, P., Debbabi, M., Mohammed, N., Otrok, H., Wang, L.: Mechanism design-based secure leader election model for intrusion detection in MANET. IEEE Trans. Dependable Secure Comput. 8, 89–103 (2011)

    Article  Google Scholar 

  3. Da Silva, A-P-R., Martins, M-H-T., Rocha, B.P.S., Loureiro, A.A.F., Ruiz, L.B., Wong, H.C.: Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the \(1^{st}\) ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks, pp. 16–23(2005)

    Google Scholar 

  4. Kamhoua, C.-A., Makki, K., Pissinou, N.: Game theoretic modeling and evolution of trust in autonomous multi-hop networks application to network security and privacy, pp. 1–6. IEEE Communications Society (2011)

    Google Scholar 

  5. Kodialam, M., Lakshman, T.: Detecting network intrusions via sampling: a game theoretical approach. Bell Laboratories Lucent Technologies (2003)

    Google Scholar 

  6. Koltsidas, G., Pavlidou, F.-N.: A game theoretical approach to clustering of ad hoc and sensor networks. Telecommun. Syst. 47, 81–93 (2011)

    Article  Google Scholar 

  7. Komathy, K., Narayanasamy, P.: Study of cooperation among selfish neighbors in MANET under evolutionary game theoretic model. In: IEEE- ICSNC, pp. 133–138 (2007)

    Google Scholar 

  8. Li, F., Wu, J.: Hit and run: a Bayesian game between malicious and regular nodes in MANETs. In: IEEE SECON, pp. 432–440 (2008)

    Google Scholar 

  9. Mahrandish, M., Assi, C., Debbabi, M.: A game theoritic model to handle network intrusions over multiple packets. In: Proceedings of IEEE International Conference on Communications (ICC), Turkey (2006)

    Google Scholar 

  10. Osborne, M.-J.: An Introduction to Game Theory. Oxford University Press, New York (2000)

    Google Scholar 

  11. Otrok, H., Mohammed, N., Wang, L., Debbabi, M., Bhattacharya, P.: A moderate to robust game theoretical model for intrusion detection in MANETs. In: Wireless Communications and Networking Conference (WCNC), pp. 608–612 (2008)

    Google Scholar 

  12. Robert, J.-M., Otrok, H., Chriqi, A.: RBC-OLSR: reputation-based clustering OLSR protocol for wireless ad hoc networks. Comput. Commun. 35, 487–499 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Myria Bouhaddi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Bouhaddi, M., Radjef, M.S., Adi, K. (2015). A Game Approach for an Efficient Intrusion Detection System in Mobile Ad Hoc Networks. In: Cuppens, F., Garcia-Alfaro, J., Zincir Heywood, N., Fong, P. (eds) Foundations and Practice of Security. FPS 2014. Lecture Notes in Computer Science(), vol 8930. Springer, Cham. https://doi.org/10.1007/978-3-319-17040-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-17040-4_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-17039-8

  • Online ISBN: 978-3-319-17040-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics