Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems

Konstantinos Maraslis, Theodoros Spyridopoulos, George Oikonomou, Theo Tryfonas, Mo Haghighi

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

Abstract

In this work we present an Intrusion Detection (ID) and an Intrusion Prevention (IP) model for Wireless Sensor Networks (WSNs). The attacker’s goal is to compromise the deployment by causing nodes to report faulty sensory information. The defender, who is the WSN’s operator, aims to detect the presence of faulty sensor measurements (ID) and to subsequently recover compromised nodes (IP). In order to address the conflicting interests involved, we adopt a Game Theoretic approach that takes into consideration the strategies of both players and we attempt to identify the presence of Nash Equilibria in the two games. The results are then verified in two simulation contexts: Firstly, we evaluate the model in a middleware-based WSN which uses clustering over a bespoke network stack. Subsequently, we test the model in a simulated IPv6-based sensor deployment. According to the findings, the results of both simulation models confirm the results of the theoretic one.
Original languageEnglish
Title of host publicationICT Systems Security and Privacy Protection
Subtitle of host publication30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings
Place of PublicationHamburg
PublisherSpringer International Publishing AG
Pages601-615
Number of pages15
Volume455
ISBN (Electronic)978-3-319-18467-8
ISBN (Print)978-3-319-18466-1
DOIs
Publication statusPublished - 9 May 2015
EventIFIP SEC 2015 International Conference on ICT Systems Security and Privacy Protection - Hamburg, Germany
Duration: 26 May 201528 May 2015

Publication series

NameIFIP Advances in Information and Communication Technology
ISSN (Print)1868-4238

Conference

ConferenceIFIP SEC 2015 International Conference on ICT Systems Security and Privacy Protection
CountryGermany
CityHamburg
Period26/05/1528/05/15

Keywords

  • Wireless Sensor Networks
  • Game Theory
  • Sensomax
  • Contiki Operating System
  • Trustworthiness

Fingerprint Dive into the research topics of 'Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems'. Together they form a unique fingerprint.

Cite this