IDEAS home Printed from https://ideas.repec.org/a/sae/intdis/v15y2019i4p1550147719841293.html
   My bibliography  Save this article

An attack-defense game based reliability analysis approach for wireless sensor networks

Author

Listed:
  • Wen Jiang
  • Zeyu Ma
  • Xinyang Deng

Abstract

Wireless sensor networks play an important role in daily life and have been applied in diverse fields. In practice, malware tries to infect sensor nodes, while wireless sensor network prevents from attacking. This article establishes a new attack–defense game based on Stackelberg game. In this game, malware selects its strategy of attacking first, and then wireless sensor network makes decision after observing the action of malware. This game considers the situation in which malware is more dominant than wireless sensor network. Then this game is solved and an equilibrium solution is calculated, which is the best strategy for malware and wireless sensor network to maximize their payoffs. With infection probability and defense probability, mean time to failure of a sensor node is computed and is used to analyze the reliability of wireless sensor network. The experiments show the influence of true-positive rate and false-positive rate on the equilibrium solution of game and the reliability of wireless sensor network. Finally, the proposed method is compared with the existing method based on a simultaneous game.

Suggested Citation

  • Wen Jiang & Zeyu Ma & Xinyang Deng, 2019. "An attack-defense game based reliability analysis approach for wireless sensor networks," International Journal of Distributed Sensor Networks, , vol. 15(4), pages 15501477198, April.
  • Handle: RePEc:sae:intdis:v:15:y:2019:i:4:p:1550147719841293
    DOI: 10.1177/1550147719841293
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1177/1550147719841293
    Download Restriction: no

    File URL: https://libkey.io/10.1177/1550147719841293?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Mohammed Ahmed Ahmed Al-Jaoufi & Yun Liu & Zhenjiang Zhang, 2018. "An Active Defense Model with Low Power Consumption and Deviation for Wireless Sensor Networks Utilizing Evolutionary Game Theory," Energies, MDPI, vol. 11(5), pages 1-16, May.
    2. Francisco Prieto-Castrillo & Amin Shokri Gazafroudi & Javier Prieto & Juan Manuel Corchado, 2018. "An Ising Spin-Based Model to Explore Efficient Flexibility in Distributed Power Systems," Complexity, Hindawi, vol. 2018, pages 1-16, May.
    3. Anna Nagurney & Patrizia Daniele & Shivani Shukla, 2017. "A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints," Annals of Operations Research, Springer, vol. 248(1), pages 405-427, January.
    4. Xiaoming Wang & Qiaoliang Li & Yingshu Li, 2010. "EiSIRS: a formal model to analyze the dynamics of worm propagation in wireless sensor networks," Journal of Combinatorial Optimization, Springer, vol. 20(1), pages 47-62, July.
    5. Huang, Zhiming & Yang, Lin & Jiang, Wen, 2019. "Uncertainty measurement with belief entropy on the interference effect in the quantum-like Bayesian Networks," Applied Mathematics and Computation, Elsevier, vol. 347(C), pages 417-428.
    6. Kang, Bingyi & Chhipi-Shrestha, Gyan & Deng, Yong & Hewage, Kasun & Sadiq, Rehan, 2018. "Stable strategies analysis based on the utility of Z-number in the evolutionary games," Applied Mathematics and Computation, Elsevier, vol. 324(C), pages 202-217.
    7. Xinyi Zhou & Yong Hu & Yong Deng & Felix T. S. Chan & Alessio Ishizaka, 2018. "A DEMATEL-based completion method for incomplete pairwise comparison matrix in AHP," Annals of Operations Research, Springer, vol. 271(2), pages 1045-1066, December.
    8. Karabulut, Ezgi & Aras, Necati & Kuban Altınel, İ., 2017. "Optimal sensor deployment to increase the security of the maximal breach path in border surveillance," European Journal of Operational Research, Elsevier, vol. 259(1), pages 19-36.
    9. Yin, Likang & Deng, Yong, 2018. "Measuring transferring similarity via local information," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 498(C), pages 102-115.
    10. Deng, Xinyang & Jiang, Wen & Wang, Zhen, 2019. "Zero-sum polymatrix games with link uncertainty: A Dempster-Shafer theory solution," Applied Mathematics and Computation, Elsevier, vol. 340(C), pages 101-112.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Hong Zhang & Shigen Shen & Qiying Cao & Xiaojun Wu & Shaofeng Liu, 2020. "Modeling and analyzing malware diffusion in wireless sensor networks based on cellular automaton," International Journal of Distributed Sensor Networks, , vol. 16(11), pages 15501477209, November.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Yin, Likang & Deng, Yong, 2018. "Toward uncertainty of weighted networks: An entropy-based model," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 508(C), pages 176-186.
    2. Li, Meizhu & Zhang, Qi & Deng, Yong, 2018. "Evidential identification of influential nodes in network of networks," Chaos, Solitons & Fractals, Elsevier, vol. 117(C), pages 283-296.
    3. Fei, Liguo & Zhang, Qi & Deng, Yong, 2018. "Identifying influential nodes in complex networks based on the inverse-square law," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 512(C), pages 1044-1059.
    4. Liguo Fei & Jun Xia & Yuqiang Feng & Luning Liu, 2019. "A novel method to determine basic probability assignment in Dempster–Shafer theory and its application in multi-sensor information fusion," International Journal of Distributed Sensor Networks, , vol. 15(7), pages 15501477198, July.
    5. Xu, Paiheng & Zhang, Rong & Deng, Yong, 2018. "A novel visibility graph transformation of time series into weighted networks," Chaos, Solitons & Fractals, Elsevier, vol. 117(C), pages 201-208.
    6. Wen, Tao & Jiang, Wen, 2019. "Identifying influential nodes based on fuzzy local dimension in complex networks," Chaos, Solitons & Fractals, Elsevier, vol. 119(C), pages 332-342.
    7. Deng, Xinyang & Jiang, Wen & Wang, Zhen, 2020. "An Information Source Selection Model Based on Evolutionary Game Theory," Applied Mathematics and Computation, Elsevier, vol. 385(C).
    8. Wei, Bo & Deng, Yong, 2019. "A cluster-growing dimension of complex networks: From the view of node closeness centrality," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 522(C), pages 80-87.
    9. Huang, Zhiming & Yang, Lin & Jiang, Wen, 2019. "Uncertainty measurement with belief entropy on the interference effect in the quantum-like Bayesian Networks," Applied Mathematics and Computation, Elsevier, vol. 347(C), pages 417-428.
    10. Wu, Yu’e & Zhang, Zhipeng & Yang, Guoli & Liu, Haixin & Zhang, Qingfeng, 2022. "Evolution of cooperation driven by diversity on a double-layer square lattice," Chaos, Solitons & Fractals, Elsevier, vol. 162(C).
    11. Duan, Shuyu & Wen, Tao & Jiang, Wen, 2019. "A new information dimension of complex network based on Rényi entropy," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 516(C), pages 529-542.
    12. Wen, Tao & Jiang, Wen, 2018. "An information dimension of weighted complex networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 501(C), pages 388-399.
    13. Rafiee, Samira & Salavati, Chiman & Abdollahpouri, Alireza, 2020. "CNDP: Link prediction based on common neighbors degree penalization," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 539(C).
    14. Yu Zhang & Wen Jiang & Xinyang Deng, 2019. "Fault diagnosis method based on time domain weighted data aggregation and information fusion," International Journal of Distributed Sensor Networks, , vol. 15(9), pages 15501477198, September.
    15. Akshay Hinduja & Manju Pandey, 2019. "An Integrated Intuitionistic Fuzzy MCDM Approach to Select Cloud-Based ERP System for SMEs," International Journal of Information Technology & Decision Making (IJITDM), World Scientific Publishing Co. Pte. Ltd., vol. 18(06), pages 1875-1908, November.
    16. Dong, Yukun & Xu, Hedong & Fan, Suohai, 2019. "Memory-based stag hunt game on regular lattices," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 519(C), pages 247-255.
    17. Michel Dacorogna & Marie Kratz, 2022. "Special Issue “Cyber Risk and Security”," Risks, MDPI, vol. 10(6), pages 1-4, May.
    18. Yanbin Li & Feng Zhang & Yun Li & Bingkang Li & Zhen Li, 2019. "Evaluating the Power Grid Investment Behavior in China: From the Perspective of Government Supervision," Energies, MDPI, vol. 12(21), pages 1-23, November.
    19. E. Allevi & A. Gnudi & I. V. Konnov & G. Oggioni, 2018. "Evaluating the effects of environmental regulations on a closed-loop supply chain network: a variational inequality approach," Annals of Operations Research, Springer, vol. 261(1), pages 1-43, February.
    20. Xiaobo Zhang & Chengshan Wang & Jie Fan & Huijun Wang & Hailong Li, 2020. "Optimizing the Analytic Hierarchy Process through a Suitability Evaluation of Underground Space Development in Tonghu District, Huizhou City," Energies, MDPI, vol. 13(3), pages 1-22, February.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:intdis:v:15:y:2019:i:4:p:1550147719841293. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.