Vis enkel innførsel

dc.contributor.authorKantzavelou, Ioanna
dc.contributor.authorMaglaras, Leandros
dc.contributor.authorTzikopoulos, Panagiotis F.
dc.contributor.authorKatsikas, Sokratis
dc.date.accessioned2023-01-20T08:56:16Z
dc.date.available2023-01-20T08:56:16Z
dc.date.created2022-04-03T13:46:05Z
dc.date.issued2022
dc.identifier.citationPeerJ Computer Science. 2022, 8 .en_US
dc.identifier.issn2376-5992
dc.identifier.urihttps://hdl.handle.net/11250/3044834
dc.description.abstractInsiders might have incentives and objectives opposed to those of the belonging organization. It is hard to detect them because of their privileges that partially protect them. In Wireless Sensor Networks (WSNs), significant security issues arise, including compromised nodes by insiders that disrupt the normal network operation. Immediate defensive actions to isolate malicious nodes would mitigate any related impacts. A multiplayer game model is proposed as a solution to the problem of insider attacks in WSNs, the Game of Wireless Sensor Networks (GoWiSeN). It is an imperfect information game, formulated with the use of non-cooperative game theory, holding the assumption that all players are rational. The model consists of several Local Intrusion Detection Systems (LIDSs), which are located to different nodes and communicate with a Global Intrusion Detection System (GIDS). Each LIDS gives suggestions whether the monitoring node is trusted or not. The game is being played between a potential attacker, the nodes and the GIDS. The GIDS is responsible for making a final decision and for isolating a compromised node in case of an internal attack. The theoretical model represents these interactions in an extensive form game. The formal elements of the game are specified, the outcomes of the game are quantified by first specifying players’ preferences, and then, by using the von Neumann-Morgenstern utility function, and payoffs are obtained. The game is constructed and solved, by locating NE in pure and mixed strategies. Experimental evaluations conducted on real network datasets, using IDSs of different capabilities, simulate special cases and compromised nodes in a WSN, verify the model efficiency, and show how the game should be played.en_US
dc.language.isoengen_US
dc.publisherPeerJen_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleA multiplayer game model to detect insiders in wireless sensor networksen_US
dc.title.alternativeA multiplayer game model to detect insiders in wireless sensor networksen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.source.pagenumber0en_US
dc.source.volume8en_US
dc.source.journalPeerJ Computer Scienceen_US
dc.identifier.doi10.7717/PEERJ-CS.791
dc.identifier.cristin2014866
dc.relation.projectNorges forskningsråd: 310105en_US
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal