基于完全博弈的Ad hoc网络风险评估
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Risk Assessment of Ad hoc Network Based on Complete Game
  • 作者:陈赵懿 ; 高秀峰 ; 曲直
  • 英文作者:CHEN Zhao-yi;GAO Xiu-feng;QU Zhi;Equipment Simulation Training Center,Shijiazhuang Campus of Army Engineering University;
  • 关键词:Ad ; hoc ; 风险 ; 博弈 ; 评估 ; 检测率
  • 英文关键词:Ad hoc;;risk;;game;;assessment;;detection rate
  • 中文刊名:ZJBX
  • 英文刊名:Journal of Academy of Armored Force Engineering
  • 机构:陆军工程大学石家庄校区模拟训练中心;
  • 出版日期:2019-04-15
  • 出版单位:装甲兵工程学院学报
  • 年:2019
  • 期:v.33;No.142
  • 语种:中文;
  • 页:ZJBX201902020
  • 页数:5
  • CN:02
  • ISSN:11-3984/E
  • 分类号:114-118
摘要
利用博弈论原理,从Ad hoc网络节点资产、攻击的检测率和误检率等方面对攻防双方不同策略进行综合量化,建立了攻防博弈下的Ad hoc网络风险评估模型。给出了纳什均衡求解算法和网络风险评估算法,通过求解攻防双方最优策略组合,得到攻防平衡状态下的网络风险评估值。通过仿真实验,证明网络风险值与攻击检测率、误检率和节点资产之间的关系符合实际情况,且评估算法操作简单,较其他评估模型更加客观准确,对提升Ad hoc网络安全具有一定参考价值。
        Based on the game theory principle,the different strategies of the attack and defense sides are comprehensively quantified from the nod assets of the Ad hoc network,the detection rate of the attack and the error detection rate. The risk assessment model of the Ad hoc network under the attack and defense game is established. The Nash equilibrium solution algorithm and the network risk assessment algorithm are given,and the network risk assessment value under the attack and defense equilibrium state is obtained by solving the optimal strategy combination of the attack and defense sides. Through simulation experiments,it is proved that the relationship between network risk value and attack detection rate,error detection rate and node assets is coincident with the actual objective situation,and the evaluation algorithm is simple in operation and feasible in calculation. Compared with other evaluation models,this model is more objective and accurate,and has certain reference value for improving Ad hoc network security.
引文
[1]张利,彭建芬,杜宇鸽,等.信息安全风险评估的综合评估方法综述[J].清华大学学报(自然科学版),2012,52(10):1364-1369.
    [2]沈士根.基于博弈论的无线传感器网络安全若干关键问题研究[D].上海:东华大学,2013:6-14.
    [3]AMIN H,RADU S.On the optimality of cooperative intrusion detection for resource constrained wireless networks[J].Computers&security,2013,34:16-35.
    [4]唐洁.Ad hoc网络中基于贝叶斯博弈的节点激励策略[J/OL].计算机工程,2018:1-7(2018-11-13)[2019-01-22].https:∥doi.org/10.19678/j.issn.1000-3428.0051753.
    [5]WANG W J,MAINAK C,KEVIN K,et al.A game theoretic approach to detect and co-exist with malicious nodes in wireless networks[J].Computer networks,2014,71:63-83.
    [6]BASANT S,SANTOSH B,SUSHANTA K.A game theory based multi layered intrusion detection framework for VANET[J].Future generation computer systems,2017,12:8.
    [7]WU H,WANG W,WEN C Y,et al.Game theoretical security detection strategy for networked systems[J].Information sciences,2018,453:346-363.
    [8]MEHTA A,SAINI R.A reviw paper on security in mobile Ad hoc network[J].International journal of advance research in science and engineering,2015,4(8):120-131.
    [9]GURJINDER K,YOGESH C,JAIN V K.Distributed denial of service attacks in mobile Ad hoc networks[J].International journal of electronics and communication engineering,2011,5(1):91-93.
    [10]PIETROA R,GUARINOA S.DOMINGO F.Security in wireless Ad-hoc networks:a survey[J].Computer communications,2014,51:1-20.
    [11]SUDHIR A,SANJEEV J,SANJEEV S.A survey of routing attacks and security measures in mobile Ad-hoc networks[J].Journal of computing,2011,3(1):41-48.
    [12]HAGE P,HARARY F.Eccentricity and centrality in networks[J].Social network,1995,17(1):57-63.
    [13]郑少仁,王海涛,赵志峰.Ad hoc网络技术[M].北京:人民邮电出版社,2005:94-96.
    [14]姜伟,方滨兴,田志宏.等.基于攻防博弈模型的网络安全测评和最优主动防御[J].计算机学报,2009,32(4):817-827.
    [15]DU S G,LI X L,DU J B,et al.An attack-and-defence game for security assessment in vehicular Ad hoc networks[J].Peer-topeer networking and applications,2014,7(3):215-228.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700