DOI QR코드

DOI QR Code

Stackelberg Game between Multi-Leader and Multi-Follower for Detecting Black Hole and Warm Hole Attacks In WSN

  • S.Suganthi (Mother Teresa Women's University) ;
  • D.Usha (Mother Teresa Women's University)
  • 투고 : 2023.08.05
  • 발행 : 2023.08.30

초록

Objective: • To detect black hole and warm hole attacks in wireless sensor networks. • To give a solution for energy depletion and security breach in wireless sensor networks. • To address the security problem using strategic decision support system. Methods: The proposed stackelberg game is used to make the spirited relations between multi leaders and multi followers. In this game, all cluster heads are acts as leaders, whereas agent nodes are acts as followers. The game is initially modeled as Quadratic Programming and also use backtracking search optimization algorithm for getting threshold value to determine the optimal strategies of both defender and attacker. Findings: To find optimal payoffs of multi leaders and multi followers are based on their utility functions. The attacks are easily detected based on some defined rules and optimum results of the game. Finally, the simulations are executed in matlab and the impacts of detection of black hole and warm hole attacks are also presented in this paper. Novelty: The novelty of this study is to considering the stackelberg game with backtracking search optimization algorithm (BSOA). BSOA is based on iterative process which tries to minimize the objective function. Thus we obtain the better optimization results than the earlier approaches.

키워드

참고문헌

  1. F. Yao, L. Jia, Y. Sun, Y. Xu, S. Feng, and Y. Zhu. A hierarchical learning approach to anti-jamming channel selection strategies, 2017; 1-13. DOI: https://doi.org/10.1007/s11276-017-1551-9. 
  2. Er.Harpal, Dr.Gaurav Tejpal and Dr.Sonal Sharma. Machine Learning Based Watchdog Protocol For Wormhole Attack Detection In Wireless Sensor Networks. International Journal of Computer Science and Information Security (IJCSIS). 2017; 15(9). 54-63. https://sites.google.com/site/ijcsis/ 
  3. Tamilarasi, N., Santhi, S.G. Detection of Wormhole Attack and Secure Path Selection in Wireless Sensor Network. Wireless Pers Commun. 2020; https://doi.org/10.1007/s11277-020-07365-4. 
  4. Dr. B. Padminidevi, Mrs.C.Selvarathi. Implementation Of Network Security Using Wormhole Attack. International Journal of Advanced Science and Technology, 2017; 29(7s). 1643 - 1650. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view/11051.  1051
  5. Ruirui Zhang1and Xin Xiao. Intrusion Detection in Wireless Sensor Networks with an Improved NSA Based on Space Division. Journal of Sensors. 2019. 1-20 Doi: 10.1155/2019/5451263. 
  6. Zulfiqar Ali Zardari, Kamran Ali Memon, Reehan Ali Shah, SanaullahDehraj, Iftikhar Ahmed. A lightweight technique for detection and prevention of wormhole attack in MANET.2020; 1-6. DOI: 10.4108/eai.13-7-2018.165515. 
  7. Lina Mallozzi , and Roberta Messalli. Multi-Leader Multi-Follower Model with Aggregative Uncertainty. 2017; 8(25). doi:10.3390/g8030025. 
  8. Lili Chen,Zhen Wang,Fenghua Li, Yunchuan Guo and Kui Geng. A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things. 2020; 20(804), doi:10.3390/s20030804 
  9. Mehetre, D., Roslin, S., & Wagh, S. Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust. 2019; Cluster Computing, 22, 1313-1328. https://doi.org/10.1007/s10586-017-1622-9. 
  10. Pedro Manso et.al. SDN-Based Intrusion Detection System for Early Detection and Mitigation of DDoS Attacks. Information 2019, 10, 106; doi:10.3390/info10030106. 
  11. Muhammad Asim Khan, Mansoor Khan. A Review on Security Attacks and Solution in Wireless Sensor Networks. American Journal of American Journal of Computer Science and Information Technology. 2019; 7 (1: 31). 1-7. DOI: 10.21767/2349-3917.100031 
  12. Zeljko Gavric1, and Dejan Simic. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks. Ingenieria e Investigation. 2018; 38(1). 130-138. DOI:10.15446/ing.investig.v38n165453.