On Energy-Security Tradeoffs and Cooperation for Wireless Ad Hoc Networks
DOI:
https://doi.org/10.13052/jcsm2245-1439.114Keywords:
energy security tradeoff, ad hoc networks, intrusion detection, game theoryAbstract
In this paper we discuss the inherent security-energy tradeoffs that exist in wireless ad hoc networks. We propose a closed form cost computation approximation formula to determine the energy cost of monitoring for an intrusion detection algorithm based on its computational complexity and data size. Based on energy and security costs, we formulate a game theoretic distributed monitoring algorithm that enforces cooperative behavior for individual nodes by means of reward functions. Various energy-security tradeoffs operating points for the network intrusion detection can be achieved by tuning the rewards parameter.
Downloads
References
S. Mehmet Futaci, K. Jaffres Runser, and C. Comaniciu. On modeling energy security trade-offs for distributed monitoring in wireless ad hoc networks, MILCOM, November 2008, pp. 1–7.
Y. Li, H. Man, and C. Comaniciu. A game theoretic approach to efficient mixed strategies for intrusion detection. Proceedings of IEEE International Conference on Communications (ICC 2006).
Y. Liu, C. Comaniciu, and H. Man. Modeling misbehavior in ad hoc networks: A game theoretic approach for intrusion detection. International Journal of Security and Networks (IJSN), 2006.
Y. Liu, C. Comaniciu, and H. Man. A bayesian game approach for intrusion detection in wireless ad hoc networks. In Proceedings of GameNets (Workshop on Game Theory for Networks), October 2006, Pisa, Italy.
H. Otrok, N. Mohammed, L. Wang, M. Debbabi, and P. Bhattacharya. A moderate to robust game theoretical model for intrusion detection in MANETs, International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB), October 2008, pp. 608–612.
A. Hodjat and I. Andverbauwhede. The energy cost of secrets in ad-hoc networks. IEEE Circuits and Systems Workshop on Wireless Communications and Networking, 2002.
N. Potlapally, N. Ravi, S. Raghunathan, and N. Jha. Analyzing the energy consumption of security protocols. International Symposium on Low Power Electronics and Design, 30–35, 2003.
R. Chandramouli, S. Bapatla, K.P. Subbalakshmi, and R.N. Uma. Battery power-aware encryption. ACM Trans. on Information and Systems Security (TISSEC), 2006.
C. Chich-Chun, S. Muftic, and D.J. Nagel. Measurement of energy costs of security in wireless sensor nodes. IEEE 18th International Conference on Computer Communications and Networks, August 2007, pp. 95–102.
Y. Bidi, C. Huifang, Z.Wendao, and Q. Peiliang. An energy-aware random pairwise keys scheme in wireless sensor networks. IEEE Sixth World Congress on Intelligent Control and Automation (WCICA), 2006, pp. 114–118.
B.-C.C. Lai, D.D. Hwang, S.P. Kim, and I. Verbauwhede. Reducing radio energy consumption of key management protocols for wireless sensor networks. IEEE International Symposium on Low Power Electronics and Design, ISLPED, August 2004, pp. 351–356.
P. Trakadas, T. Zahariadis, H.C. Leligou, S. Voliotis, and K. Papadopoulos. Analyzing energy and time overhead of security mechanisms in wireless sensor networks. IEEE International Conference on Systems, Signals and Image Processing (IWSSIP), June 2008, pp. 137–140.
Y. Lei and L. Jianzhong. SpyMon: Hidden network monitoring for security in wireless sensor networks. IEEE International Conference Mobile Ad Hoc and Sensor Systems (MASS), October 2008, pp. 328–333.
D. Jain and V.M. Vokkrane. Energy-efficient target monitoring in wireless sensor networks. IEEE Conference on Technologies for Homeland Security, 2008.
R. Chandramouli, S. Bapatla, K.P. Subbalakshmi, and R.N. Uma. Battery power-aware encryption. ACM Trans. on Information and Systems Security (TISSEC), 2006.
P. Inverardi, L. Mostarda, and A. Navarra. Distributed IDSs for enhancing security in mobile wireless sensor networks. IEEE International Conference on Advanced Information Networking and Applications, April 2006, pp. 116–120.
P. Techateerawat and A. Jennings. Energy efficiency of intrusion detection systems in wireless sensor networks. IEEE/WIC/ACMInternational Conference onWeb Intelligence and Intelligent Agent Technology Workshops, December 2006, pp. 227–230.
Y. Huang and W. Lee. A cooperative intrusion detection system for ad hoc networks. In Proceeding of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 135–147, October 2003.
O. Kachirski and R. Guha. Intrusion detection using mobile agents in wireless ad hoc networks. In Proceedings of the IEEE Workshop on Knowledge Media Networking, pp. 153–158, July 2002.
D. Fudenberg and D. Levine. The Theory of Learning in Games. MIT Press, 1998.
A. Sinha and P.A. Chandrakasan. JouleTrack — a web based tool for software energy profiling. ACM Design Automation Conference, June 2001.
Seminar notes. ZigBee technical training seminar. Freescale Semiconductor and EBV Electronics, Istanbul, Turkey, February 2005.
Q. Shi and C. Comaniciu. Efficient cooperative detection in wireless sentinel networks. In Proceedings of CISS, March 2010, Princeton, NJ.