Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks
| dc.contributor.author | Shamshirband, Shahaboddin | |
| dc.contributor.author | Patel, Ahmed | |
| dc.contributor.author | Anuar, Nor Badrul | |
| dc.contributor.author | Kiah, Miss Laiha Mat | |
| dc.contributor.author | Abraham, Ajith | |
| dc.date.accessioned | 2015-01-09T08:37:43Z | |
| dc.date.available | 2015-01-09T08:37:43Z | |
| dc.date.issued | 2014 | |
| dc.description.abstract | Owing to the distributed nature of denial-of-service attacks, it is tremendously challenging to detect such malicious behavior using traditional intrusion detection systems in Wireless Sensor Networks (WSNs). In the current paper, a game theoretic method is introduced, namely cooperative Game-based Fuzzy Q-learning (G-FQL). G-FQL adopts a combination of both the game theoretic approach and the fuzzy Q-learning algorithm in WSNs. It is a three-player strategy game consisting of sink nodes, a base station, and an attacker. The game performs at any time a victim node in the network receives a flooding packet as a DDoS attack beyond a specific alarm event threshold in WSN. The proposed model implements cooperative defense counter-attack scenarios for the sink node and the base station to operate as rational decision-maker players through a game theory strategy. In order to evaluate the performance of the proposed model, the Low Energy Adaptive Clustering Hierarchy (LEACH) was simulated using NS-2 simulator. The model is subsequently compared against other existing soft computing methods, such as fuzzy logic controller, Q-learning, and fuzzy Q-learning, in terms of detection accuracy, counter-defense, network lifetime and energy consumption, to demonstrate its efficiency and viability. The proposed model׳s attack detection and defense accuracy yield a greater improvement than existing above-mentioned machine learning methods. In contrast to the Markovian game theoretic, the proposed model operates better in terms of successful defense rate. | cs |
| dc.description.firstpage | 228 | cs |
| dc.description.lastpage | 241 | cs |
| dc.description.source | Web of Science | cs |
| dc.description.volume | 32 | cs |
| dc.identifier.citation | Engineering Applications of Artificial Intelligence. 2014, vol. 32, p. 228-241. | cs |
| dc.identifier.doi | 10.1016/j.engappai.2014.02.001 | |
| dc.identifier.issn | 0952-1976 | |
| dc.identifier.issn | 1873-6769 | |
| dc.identifier.uri | http://hdl.handle.net/10084/106275 | |
| dc.identifier.wos | 000336953900020 | |
| dc.language.iso | en | cs |
| dc.publisher | Elsevier | cs |
| dc.relation.ispartofseries | Engineering Applications of Artificial Intelligence | cs |
| dc.relation.uri | http://dx.doi.org/10.1016/j.engappai.2014.02.001 | cs |
| dc.title | Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks | cs |
| dc.type | article | cs |
| dc.type.status | Peer-reviewed | cs |
Files
License bundle
1 - 1 out of 1 results
Loading...
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: