You are on page 1of 4

Network Security For Wireless Sensor Network Using Game Theory Approach

V.Vinoba K.N.Government Arts College for Women Thanjavur P.Hema R.M.K. Collgege of Engineering and Technology Puduvoyal-601206 Abstract: In this paper we investigate the impacts of applying game theory on the network throughout and accuracy of malicious node detection to WSN. Currently, the needs of WSN have become inevitable in daily life. With continuous growth of WSN in daily life, business and defence application the security of transfering data from sensors to their destination has become an important research area. In this apaper we discuss currently available intrusion detection technique attack models using game theoryand to detect malicious node using game theory approach for nodes in forward data path. Introduction Game theory provides a mathematical method for analysing and modelling WSN security problems for it considers scenarios where multiple players with contradictory objectives compete with each other. We divide game theory application for WSN security into three categories (i) preventing Denial of service attacks (ii) intrusion detection (iii) coexistence with malicious nodes. In DoS attacks, the attackers objective is to make target destinations inaccessible by legitimate users . A sensor network without sufficient protection from DoS attacks may not be deployable in many areas. Nodes of a sensor network can not be trusted for the correct execution of critical network functions. Nodes misbehavior may range from simple selfishness or lack of collaborationdue to the need for power saving, to active attacks aiming at DoS and subversion of traffic. There are two types ofDoS attacks: Passive attacks: selfish nodes use the network but do not cooperate, saving battery life for their own communications; they do not intend to directly damage other nodes. Active attacks: malicious nodes damage other nodes by causing network outage by partitioning, while saving battery life is not a priority.

The prevention of passive denialof service attack at routing layer in wireless sensor networks as a repeated game between an intrusion detectorand nodes of a sensor network, where some of these nodesact maliciously. We propose a framework to enforce cooperation among nodes and punishment for non-cooperativebehavior. We assume that the rational users optimizetheir profits over time. Intrusion detector residing at the base station keeps track of other nodes collaboration bymonitoring them. If performances are lower than sometrigger thresholds, it means that some nodes act maliciously by deviation. Intrusion detector rates other nodes,which is known as subjective reputation and the positive rating accumulates for each node as it gets rewarded. In WSN, IDSs can be placed on all of nodes to make a network safer. But the always-on Strategy is not an efficient choice because of wasting the source of system. Instrusion detection can be done by using non co-operative game theoretic frame work which can help each cluster head node decide the probability of starting of IDSs service. In the intrusion detection problem, IDS needs toprotect each cluster in the network. Since we are considering one cluster at a time, detection of a malicious node on the path of data flow is very important. We assume that the network is operating under ideal radioconditions. Consequently, packet loss appears due to malicious activity. GAME THEORY BASED APPROACH A.Basics of Game Theory In game theory, the basic assumption is that the decision makers pursue some well defined objectives and take into account their knowledge or experience of the other decision makers behavior. In this research, we analyze the existing system as game and study the properties of game. We define the game G as =(N,A, {ui}), where Nis the finite set of players, action game theory. Rational players are assumed to maximize their payoff, which is a selfish motivation. In game theory, the solution of a game is the outcome. In WSN, the IDS plays as one player and intruder plays as opponent. In the WSN problem, the large WSN is divided into clusters and IDS defends a cluster at any given time, while the attacker disturbs the normal operations. B. Game Model

Figure 1

Figure 1 is a typical sensor network where data transferis from the sensor nodes (N) to the cluster head with action Ai and outcome ui . In this game model, we consider IDSat cluster head and monitor the data transfer from sensor nodes to cluster head. The attacker may attack any node in the cluster (including cluster head) and the IDS at the cluster head to defend the nodes. The IDS at the cluster head tries to maintain the normal functionality of the network by reventing the attacks while the attacker tries to disturb the network. This functionality will continue at all cluster heads as well as at the base station. Definition 1: An outcome of a game is Pareto optimal if there is no other outcome that makes every player at least as well off and at least one player strictly better off. Theorem 1: A zero sum game is not a Pareto optimal. Proof: If a change from one allocation to another can make at least one individual better off without making any other individual worse off, then it is called a Pareto improvement. An allocation is Pareto efficient or Pareto optimal when no further Pareto improvements can be made. This is often Pareto optimal. Definition 2: If the zero sum game is Pareto optimal then it is called a conflict game. In a conflict game, none of the players benefit. The game leads nowhere. Therefore, it is suggested to design an IDs to play a conflict game, so that the intruder never wins and no node compromises distraction or diversion. Definition 3: In a zero sum game the cost of attack on a node is equal to the cost to defend a node. This leads, the profit of an attack to the intruder equals the loss to the sensor network (loss may a cluster). Theorem 2: A zero sum game has no pure Nash Equilibrium. Proof: In pure strategy NE, when each players output maximizes its profits given the output of other player. Definition 4. The IDS defends many times for all intruder attacks. For a zero sum game, the cost of the intruders success and failure attacks equals the cost of success and failures of defending the nodes. To get a successful attack, an intruder must attack a number of times unsuccessfully. The waiting time for unsuccessful attacks is added to successful attacks of the intruder cost. The profit of the attacker depends upon the number of nodes compromised, but the total cost or energy used by the intruder to compromise the cluster nodes is the sum of the successful and failure attempts. Theorem 3: In zero sum game, the energy used to defend a cluster is finite. C. Detection of malicious node In the intrusion detection problem, IDS needs to protect each cluster in the network. Since we are considering one cluster at a time, detection of a malicious node on the path of data flow is

very important. m of which are malicious. Let there be q (=1) nonmalicious nodes between every two malicious nodes. Let be the number of selected acknowledgement points (A and E) in the packet path and be the percent of nodes which are randomly selected as check points. Let us consider the path SABCDEF BS in Figure 2, where D is a malicious node. Let A and E be the selected acknowledge points ( =2). The following are the possibilities: Any node in the path is malicious (compromised with an intruder) One or more of the nodes (for example B ) are malicious (before or between the acknowledge points) Node A or node E is malicious (assume that selected acknowledgement points are not malicious)

Figure 2 With the help of above theorems and definitions we can find the number of malicious node In the forwarding path. Here IDSs and intruders are non co-operative players. The intruder maximizes its benefits by destroying the functionality of the system and the protector tries to protect the facility. In this research, our problem is to detect malicious node in the forward path. CONCLUSIONS The random check points are selected to detect the malicious node in the communications path using zero sum game. The zero sum game presented in the current model shows the total energy required is constant.

You might also like