On Energy-Security Tradeoffs and Cooperation for Wireless Ad Hoc Networks

Authors

  • Cristina Comaniciu Stevens Institute of Technologies, Castle Point on Hudson, Hoboken New Jersey 07030-5991, USA

DOI:

https://doi.org/10.13052/jcsm2245-1439.114

Keywords:

energy security tradeoff, ad hoc networks, intrusion detection, game theory

Abstract

In this paper we discuss the inherent security-energy tradeoffs that exist in wireless ad hoc networks. We propose a closed form cost computation approximation formula to determine the energy cost of monitoring for an intrusion detection algorithm based on its computational complexity and data size. Based on energy and security costs, we formulate a game theoretic distributed monitoring algorithm that enforces cooperative behavior for individual nodes by means of reward functions. Various energy-security tradeoffs operating points for the network intrusion detection can be achieved by tuning the rewards parameter.

Downloads

Download data is not yet available.

Author Biography

Cristina Comaniciu, Stevens Institute of Technologies, Castle Point on Hudson, Hoboken New Jersey 07030-5991, USA

Cristina Comaniciu received the M.S. degree in Electronics and Telecommunications from the Polytechnic University of Bucharest in 1993, and the Ph.D. degree in Electrical and Computer Engineering from Rutgers University in 2002. From 2002 to 2003 she was a postdoctoral fellow with the Electrical Engineering Department at Princeton University. Since 2003, she is with Stevens Institute of Technology, where she is currently an Associate Professor and Graduate Program Director. She served as an Associate Editor for IEEE Communication letters from 2006–2011.
Cristina is a co-recipient of the 2007 IEEE Marconi Best Paper Prize Award in Wireless Communications, and co-author of the book “Multiuser Detection in Cross-Layer Design”, Springer 2005. Cristina was also recently awarded the Rutgers School of Engineering Medal of Excellence Award for the Distinguished Young Alumnus.
Her research interests include cooperative protocols for spectrum sharing and interference mitigation, cross-layer design, game theoretic approaches for energy aware wireless networks, radio resource management for cellular and ad hoc networks and security tradeoffs for wireless networks.

References

S. Mehmet Futaci, K. Jaffres Runser, and C. Comaniciu. On modeling energy security trade-offs for distributed monitoring in wireless ad hoc networks, MILCOM, November 2008, pp. 1–7.

Y. Li, H. Man, and C. Comaniciu. A game theoretic approach to efficient mixed strategies for intrusion detection. Proceedings of IEEE International Conference on Communications (ICC 2006).

Y. Liu, C. Comaniciu, and H. Man. Modeling misbehavior in ad hoc networks: A game theoretic approach for intrusion detection. International Journal of Security and Networks (IJSN), 2006.

Y. Liu, C. Comaniciu, and H. Man. A bayesian game approach for intrusion detection in wireless ad hoc networks. In Proceedings of GameNets (Workshop on Game Theory for Networks), October 2006, Pisa, Italy.

H. Otrok, N. Mohammed, L. Wang, M. Debbabi, and P. Bhattacharya. A moderate to robust game theoretical model for intrusion detection in MANETs, International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB), October 2008, pp. 608–612.

A. Hodjat and I. Andverbauwhede. The energy cost of secrets in ad-hoc networks. IEEE Circuits and Systems Workshop on Wireless Communications and Networking, 2002.

N. Potlapally, N. Ravi, S. Raghunathan, and N. Jha. Analyzing the energy consumption of security protocols. International Symposium on Low Power Electronics and Design, 30–35, 2003.

R. Chandramouli, S. Bapatla, K.P. Subbalakshmi, and R.N. Uma. Battery power-aware encryption. ACM Trans. on Information and Systems Security (TISSEC), 2006.

C. Chich-Chun, S. Muftic, and D.J. Nagel. Measurement of energy costs of security in wireless sensor nodes. IEEE 18th International Conference on Computer Communications and Networks, August 2007, pp. 95–102.

Y. Bidi, C. Huifang, Z.Wendao, and Q. Peiliang. An energy-aware random pairwise keys scheme in wireless sensor networks. IEEE Sixth World Congress on Intelligent Control and Automation (WCICA), 2006, pp. 114–118.

B.-C.C. Lai, D.D. Hwang, S.P. Kim, and I. Verbauwhede. Reducing radio energy consumption of key management protocols for wireless sensor networks. IEEE International Symposium on Low Power Electronics and Design, ISLPED, August 2004, pp. 351–356.

P. Trakadas, T. Zahariadis, H.C. Leligou, S. Voliotis, and K. Papadopoulos. Analyzing energy and time overhead of security mechanisms in wireless sensor networks. IEEE International Conference on Systems, Signals and Image Processing (IWSSIP), June 2008, pp. 137–140.

Y. Lei and L. Jianzhong. SpyMon: Hidden network monitoring for security in wireless sensor networks. IEEE International Conference Mobile Ad Hoc and Sensor Systems (MASS), October 2008, pp. 328–333.

D. Jain and V.M. Vokkrane. Energy-efficient target monitoring in wireless sensor networks. IEEE Conference on Technologies for Homeland Security, 2008.

R. Chandramouli, S. Bapatla, K.P. Subbalakshmi, and R.N. Uma. Battery power-aware encryption. ACM Trans. on Information and Systems Security (TISSEC), 2006.

P. Inverardi, L. Mostarda, and A. Navarra. Distributed IDSs for enhancing security in mobile wireless sensor networks. IEEE International Conference on Advanced Information Networking and Applications, April 2006, pp. 116–120.

P. Techateerawat and A. Jennings. Energy efficiency of intrusion detection systems in wireless sensor networks. IEEE/WIC/ACMInternational Conference onWeb Intelligence and Intelligent Agent Technology Workshops, December 2006, pp. 227–230.

Y. Huang and W. Lee. A cooperative intrusion detection system for ad hoc networks. In Proceeding of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 135–147, October 2003.

O. Kachirski and R. Guha. Intrusion detection using mobile agents in wireless ad hoc networks. In Proceedings of the IEEE Workshop on Knowledge Media Networking, pp. 153–158, July 2002.

D. Fudenberg and D. Levine. The Theory of Learning in Games. MIT Press, 1998.

A. Sinha and P.A. Chandrakasan. JouleTrack — a web based tool for software energy profiling. ACM Design Automation Conference, June 2001.

Seminar notes. ZigBee technical training seminar. Freescale Semiconductor and EBV Electronics, Istanbul, Turkey, February 2005.

Q. Shi and C. Comaniciu. Efficient cooperative detection in wireless sentinel networks. In Proceedings of CISS, March 2010, Princeton, NJ.

Downloads

Published

2012-01-10

How to Cite

1.
Comaniciu C. On Energy-Security Tradeoffs and Cooperation for Wireless Ad Hoc Networks. JCSANDM [Internet]. 2012 Jan. 10 [cited 2024 Apr. 25];1(1):53-64. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/6067

Issue

Section

Articles