用户名: 密码: 验证码:
物联网中重复博弈论入侵检测模型
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Repeated game theory intrusion detection model for the Internet of Things
  • 作者:左军
  • 英文作者:ZUO Jun;China United Network Communications Corporation Limited Chongqing Shapingba Branch Company;
  • 关键词:物联网 ; 入侵检测 ; 博弈论 ; 随机最优反应均衡
  • 英文关键词:Internet of Things;;intrusion detection;;game theory;;quantal response equilibrium
  • 中文刊名:FIVE
  • 英文刊名:Journal of Chongqing University
  • 机构:中国联合网络通信有限公司重庆市分公司沙坪坝区分公司;
  • 出版日期:2014-06-15
  • 出版单位:重庆大学学报
  • 年:2014
  • 期:v.37
  • 基金:国家自然科学基金资助项目(61309032);; 重庆市自然科学基金资助项目(cstc2012jjA40053)
  • 语种:中文;
  • 页:FIVE201406014
  • 页数:7
  • CN:06
  • ISSN:50-1044/N
  • 分类号:94-100
摘要
由于物联网通信节点自身的缺陷,导致现有的安全方法难于应用到物联网中。针对这一情况,提出基于重复博弈论的入侵检测模型。建立一种用于检测恶意通信节点的重复博弈模型算法,使模型应用更符合实际情况,结合随机最优反应均衡算法优化模型使结果能更适应实际网络并且能趋于纳什均衡,并引入一种通用惩罚策略,刺激通信节点之间采取合作策略,提高模型发包成功率。通过对模型算法进行实验仿真,表明该模型能够有效地遏制恶意节点的攻击,提高网络效率。
        The existing security methods cannot be applied to the Internet of Things due to the defects of communication nodes.To solve this problem,an intrusion detection model based on repeated game theory is presented.A repeated game model algorithm for detecting malicious nodes is built,and the algorithm of Quantal Response Equilibrium(QRE) is used for optimizing the model and making results reach the Nash equilibrium.Moreover,a common punishment strategy is introduced to improve the success of transfer data in this model.The results of the simulation represent that this model can restrain malicious nodes attacking effectively and improve the efficiency of network.
引文
[1]林闯.物联网关键理论与技术[J].计算机学报,2011,34(5):761-762.LIN Chuang.The key theory and technology in Internet of Things[J].Chinese Journal of Computers,2011,34(5):761-762.
    [2]张毅,唐红.物联网综述[J].数字通信,2010,37(4):24-27.ZHANG Yi,TANG Hong.Review on Internet of Things[J].Digital Communication,2010,37(4):24-27.
    [3]邬贺铨.物联网的应用与挑战综述[J].重庆邮电大学学报:自然科学版,2010,22(5):526-531.WU Hequan.Review on Internet of Things:application and challenges[J].Journal of Chongqing University of Posts and Telecommunications:Natural Science Edition,2010,22(5):526-531.
    [4]宁焕生,徐群玉.全球物联网发展及中国物联网建设若干思考[J].电子学报,2010,38(11):2590-2599.NING Huansheng,XU Qunyu.Research on global Internet of Things'developments and it's lonstruction in China[J].Acta Electronica Sinica,2010,38(11):2590-2599.
    [5]杨庚,许建,陈伟,等.物联网安全特征与关键技术[J].南京邮电大学学报:自然科学版,2010,30(4):20-29.YANG Geng.XU Jian,CHEN Wei,et al.Security characteristic and technology in the Internet of Things[J].Journal Of Nanjing University Of Posts and Telecommunications:Natural Science Edition,2010,30(4):20-29.
    [6]Farooqi A H,Khan F A.A survey of intrusion detection systems for wireless sensor networks[J].International Journal of Ad Hoc and Ubiquitous Computing.2012,9(2):69-83.
    [7]Jadidoleslamy H.A high-level architecture for intrusion detection on heterogeneous wireless sensor networks:hierarchical,scalable and dynamic reconfigurable[J].Wireless Sensor Network,2011,3(7):241-261.
    [8]Krontiris I,Benenson Z,Giannetsos T,et al.Cooperative intrusion detection in wireless sensor networks[J].Lecture Notes in Computer Science,2009,5432:263-278.
    [9]Gacia T P,Diaz V J,Macia F G,et al.Anomaly-based network intrusion detection:Techniques,systems and challenges[J].Computers&Security,2009,28(1-2):18-28.
    [10]Zhou C V,Leckie C,Karunasekera S.A survey of coordinated attacks and collaborative intrusion detection[J].Computers&Security,2010,29(1):124-140.
    [11]刘勇国,李学明,廖晓峰,等.基于数据挖掘的入侵检测[J].重庆大学学报:自然科学版,2002,25(10):128-131.LIU Yongguo,LI Xueming,LIAO Xiaofeng,et al.Intrusion detection based on data mining[J].Journal of Chongqing University:Natural Science Edition,2002,25(10):128-131.
    [12]杨元凉,马文平,刘维博,等.有效的多协议攻击自动化检测系统[J].重庆大学学报,2012,35(2):71-77.YANG Yuanliang,MA Wenping,LIU Weibo,et al.An effective automatic detection system for multi-protocol attack[J].Journal of Chongqing University,2012,35(2):71-77.
    [13]Shen S G,Yue G X,Cao Q Y.A survey of game theory in wireless sensor networks security[J].Journal of Networks,2011,6(3):521-532.
    [14]Akkarajitsakul K,Hossain E,Niyato D,et al.Game theoretic approaches for multiple access in wireless networks:A survey[J].Communications Surveys&Tutorials,2011,13(3):372-395.
    [15]Reddy Y B.A game theory approach to detect malicious nodes in wireless sensor networks[C]//Proceedings of 2009 the 3rd International Conference on Sensor Technologies and Applications,Washington DC:IEEE Computer Society,2009:462-468.
    [16]Agah A,Das S K,Basu K,et al.Intrusion detection in sensor networks:A non-cooperative game approach[C]//Proceedings of Third IEEE International Symposium on Network Computing and Applications,August 30-September 1,2004,Cambridge,MA,USA.Piscataway:IEEE Press,2004:343-346.
    [17]Mckelvey R D,Palfrey T R.Quantal response equilibrium for normal form games[J].Games and Economic Behavior,1995,10(1):6-38.
    [18]王博,黄传河,杨文忠,等.Ad Hoc网络中基于惩罚机制的激励合作转发模型[J].计算机研究与发展,2011,48(3):398-406.WANG Bo,HUANG Chuanhe,YANG Wenzhong,et al.An incentive-cooperative forwarding model based on punishment mechanism in wireless ad hoc networks[J].Journal of Computer Research and Development,2011,48(3):398-406.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700