Dynamics stability in wireless sensor networks active defense model. (English) Zbl 1405.68016

Summary: Wireless sensor networks, which are widely used in military, industrial and transportation fields, are vulnerable to various kinds of attacks, since they are mostly deployed in a relatively open environment. Based on the evolutionary game theory, this paper proposes a proactive defense model for wireless sensor networks, in which we emphasize that the node has a limited ability to learn the evolution of rationality from different attack strategies of the attacker, and can dynamically adjust their strategies to achieve the most effective defense. Following this approach, the cost (e.g., energy consumption and wastage of machinery) has been greatly saved and the life cycle of the nodes has been extended as well. By employing the proposed model, the whole wireless sensor network can be implemented in an effective way.


68M10 Network design and communication in computer systems
91A22 Evolutionary games
91A80 Applications of game theory
Full Text: DOI


[1] Hill, J.; Szewczyk, R.; Woo, A.; Hollar, S.; Culler, D.; Pister, K., System architecture directions for networked sensors, (ASPLOS, (November 2000))
[2] J.S. Wilson, Wireless sensor networks: principles and applications (Chapter 22).
[3] John A. Stankovic, Wireless sensor networks, University of Virginia, Charlottesville, VA, 22904.
[4] Naeem, Tahir; Loo, Kok-Keong, Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks, Internat. J. Digital Content Technol. Appl., 3, 1, 89-90, (2009)
[5] Luk, Mark; Mezzour, Ghita; Perrig, Adrian; Gligor, Virgil, Minisec: a secure sensor network communication architecture, (Proceedings of the Sixth International Conference on Information Processing in Sensor Networks, IPSN 2007, (2007))
[6] Perrig, A.; Stankovic, J.; Wagner, D., Security in wireless sensor networks, Commun. ACM, 47, 6, (2004)
[7] Khan Pathan, Al-Sakib; Lee, Hyung-Woo; Hong, Choong Seon, Security in wireless sensor networks: issues and challenges, (International Conference on Advanced Computing Technologies, (2006)), 1043-1045
[8] Newsome, J.; Shi, E.; Song, D.; Perrig, A., The sybil attack in sensor networks: analysis and defenses, (IPSN ’04, Berkeley, CA, (2004))
[9] Zhu, S.; Setia, S.; Jajodia, S.; Ning, P., An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks, (IEEE Symposium on Security and Privacy, Berkeley, CA, (2004))
[10] Wood, A.; Stankovic, J., Denial of service in sensor networks, 54-62, (September 2002), IEEE Computer Society
[11] Sami S. Al-Wakeel, Saad A. Al-Swailem, PRSA: a path redundancy based security algorithm for wireless sensor networks, in: WCNC 2007 Proceedings, pp. 4159-4163.
[12] Wood, A. D.; Stankovic, J. A.; Zhou, G., DEEJAM: defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks, (Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON, San Diego, CA, (2007))
[13] von Neumann, J.; Morgenstern, O., Theory of games and economic behavior, 36-39, (1994), Princeton University Press Princeton, NJ
[14] Hofbauer, J.; Sigmund, K., Evolutionary game dynamics, Bull. Am. Math. Soc., 40, 4, 479-519, (2003) · Zbl 1049.91025
[15] Samuelson, L., Evolutionary games and equilibrium selection, (1997), MIT Press · Zbl 0953.91500
[16] Fudenberg, D.; Levned, K., The theory of learning in games, 167-169, (1998), Mass MIT Press Cambridge
[17] Qiu, Yihui; Chen, Zhide; Xu, Li, Active defense model of wireless sensor networks based on evolutionary game theory, (6th International Conference on Wireless Communications Networking and Mobile Computing, WiCOM, (2010)), 1-4
[18] He, Wei; Xia, Chunhe; Wang, Haiquan; Zhang, Cheng, A game theoretical attack-defense model oriented to network security risk assessment, (2008 International Conference on Computer Science and Software Engineering, (2008)), 498-504
[19] Wei, Jiang; Xing, Fangbin, Evaluating network security and optimal active defense based on attack-defense game theory, Chin. J. Comput., 32, 4, (2009)
[20] Agah, A.; Das, S. K.; Basu, K., Preventing DoS attack in sensor and actor networks: a game theoretic approach, (IEEE International Conference on Communications, ICC, Seoul, Korea, (2005)), 3218-3222
[21] Agah, A.; Das, S. K.; Basu, K., Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling, (Proceedings of 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, MASS, Washington, DC, (2005))
[22] Sun, Wei; Kong, Xiangwei; He, Dequan, Information security game analysis with penalty parameter, Internat. Symp. Elect. Commerce Sec., 8, 453-456, (2008)
[23] Weibull, J. W., Evolutionary game theory, (1995), MIT Press · Zbl 0879.90206
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.