| Literature DB >> 27367700 |
Mohamed S Abdalzaher1,2, Karim Seddik3, Maha Elsabrouty4, Osamu Muta5, Hiroshi Furukawa6, Adel Abdel-Rahman7.
Abstract
We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.Entities:
Keywords: WSNs applications; WSNs security; evolutionary game; game theory; game-theoretic based trust model
Year: 2016 PMID: 27367700 PMCID: PMC4970053 DOI: 10.3390/s16071003
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Cooperative and Non-cooperative Game Classification for Addressing WSN Security Issues.
WSN attack classifications and defense strategies based on game theory.
| Attack Type | Attacked Layer | P/Clr Attack | Ex/In Attack | Attack Feature | Attack Consequences | Defense Strategy | Game Type |
|---|---|---|---|---|---|---|---|
| Jamming [ | L1 [ | Clr | Ex | Interfere with radio frequencies | Disrupt whole/portion of the network | Stackelberg [ | NC/C/NC/NC |
| Tampering [ | L1 [ | Clr | Ex/In | Extract cryptographic keys | Create/replace existing node | Repeated [ | C |
| Sniffing [ | L2 [ | Clr | Ex | Overhear essential data from neighboring nodes | Penetration network secrecy | Stackelberg [ | NC |
| Collisions [ | L2 [ | P | In | Simultaneous transmission on the same frequency | Change in portion of data, Checksum mismatch at receiver | Evolutionary [ | NC |
| Exhaustion [ | L2 [ | Clr | In/Ex | Naive implementation may continuously attempt to retransmit the corrupted packets | Resource exhaustion | Repeated [ | C |
| Unfairness [ | L2 [ | P | In | Considered weak DoS, Intermittent exploiting the resources | Miss transmission deadline for other nodes in a real-time MAC protocol | Repeated [ | C |
| Stealthy [ | L2 [ | Clr | In | Compromise a node and inject false data through that node. | Make the network accept false data | ZS [ | NC |
| Energy Drain [ | L2 [ | Clr | In/Ex | Request from neighboring node to respond after massive traffic transmission | Paralyze the whole network | ZS [ | NC |
| Conflicting behavior [ | L3 [ | Clr | In | Perform differently with different nodes | Decrease trust value of nodes by conflicting their reputation | Repeated [ | C |
| Blackhole [ | L3 [ | Clr | In/Ex | Attract the whole traffic to be routed through it by advertising itself as the shortest route and drop all received message | Block the traffic to the sink, Expand crisis by easily combining with other extra attacker | Repeated [ | C |
| Spoofed, altered, replayed information [ | L3 [ | Clr | In/Ex | Disrupt the network traffic | Create routing loop, Extend or shorten source route, Error message generation | Bayesian [ | NC |
| Selective forwarding [ | L3 [ | Clr | In/Ex | Transmit certain packets and drop others | A malfunction occurs in transmission process | NZS [ | NC |
| Sinkhole [ | L3 [ | Clr | In | Compromise a node and then attract the surrounding nodes to use it as next node | Lose huge number of packets, Retransmit lost packets, Increase delay, Exhaust nodes | NZS [ | NC |
| Sybil [ | L3 [ | Clr | In | One node presents more than one ID | Exhaust nodes’ power | Stochastic [ | NC |
| Wormhole [ | L3 [ | Clr | In | Low-latency that links between two portions of the network where the messages replayed | Paralyze the whole network, Network traffic jamming | NZS [ | NC |
| Hello flood | L3 [ | Clr | Ex | Use high powered- transmitter to deceive neighbors that it has the trajectory towards the base station | The neighbor believe that attacker, Control the data flow | ZS | NC |
| Acknowledgment spoofing [ | L3 [ | Clr | In | Spoof the ACKs of overhead packets destined for neighboring nodes in order to provide false information to those neighboring nodes | Disrupt and confuse routing mechanism | Stochastic [ | NC |
| Badmouthing [ | L3 [ | Clr | In | Propagate negative reputation information about good nodes | Block valid path by confusing reputation system | Repeated [ | C |
| Goodmouthing (opposite Badmouthing behavior) | L3 [ | Clr | In | Propagate positive reputation information about bad nodes | Block valid path by confusing reputation system | Repeated | C |
| Whitewashing | L3 [ | Clr | In | Re-enter the network with new ID and fresh reputation | deteriorate the defense of reputation mechanism | Evolutionary | NC |
| Flooding [ | L4 [ | Clr | Ex | An attacker may repeatedly make new connection requests until the resources required by each connection are exhausted or reach a maximum limit | System traffic congestion, Cause channel capacity deterioration | Repeated [ | C |
| Desynchronization | L4 [ | Clr | Ex | Refers to the disruption of an existing connection | Repeatedly spoof messages to an end host, causing that host to request the retransmission of missed frames | Repeated | C |
| Intelligent behavior [ | - | Clr | In | Selectively provide services good or bad, high or low values of recommendation according to threshold of trust rating | Disrupt trust system order indistinguishably, Increase the cost of reputation evaluation | Stochastic [ | NC |
| DoS [ | L1-L4 [ | Clr | In/Ex | Prevent any part of WSNs from functioning correctly or in a timely manner | Split the network grid and take control of part of the network by inserting a new sink node jam and tampering network | Repeated [ | C/NC |
| ON-OFF | - | Clr | In | Behave well or badly by exploiting the dynamic properties of trust through time-domain inconsistent behaviors | Remain undetected while causing damage | Evolutionary | NC |
Clr... Clear, P... Passive, ZS... Zero-sum, NZS... Non Zero-sum, C... Cooperative, NC... Non-cooperative, In... Internal, Ex... External; * ⋯ based on the attack and game features.
Figure 2General Trust and Reputation Model Mechanisms.
Figure 3Proposed Game Theory Trust Model.
WSN intelligent attacks.
| Attack Type | Features |
|---|---|
| Badmouthing attack | Grants negative feedback on a node in order to disrupt its reputation. |
| Goodmouthing attack | Grants positive feedback about a malicious entity. |
| ON-OFF attack | Occurs when an adversary attempts to initiate a security attack or a mixture of attacks based irregular manner in order to make its reputation acceptable. |
| Sybil attack | Occurs when a node in a network claims multiple identities. |
| Whitewashing attack | Exists when an attacker resets a poor reputation by re-entering the system with a new identity. |
| Stealthy attack | Operates quietly, hides the evidence of its actions, disrupts the traffic stream from arriving the destination through malicious behavior at third party node. |
| Conflicting behavior attack | Deteriorates the reputation of good nodes by performing differently for different peers. |
| Intelligent behavior attack | Uses different behaviors based on unfixed strategy to manipulate good nodes. |