Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings

Research Article

Intrusion Detection System for IoT Heterogeneous Perceptual Network Based on Game Theory

Download
204 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-21373-2_37,
        author={Man Zhou and Lansheng Han and Hongwei Lu and Cai Fu},
        title={Intrusion Detection System for IoT Heterogeneous Perceptual Network Based on Game Theory},
        proceedings={Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13--14, 2019, Proceedings},
        proceedings_a={SPNCE},
        year={2019},
        month={6},
        keywords={IoT security Particle swarm optimization Energy consumption Intrusion detection system Game model},
        doi={10.1007/978-3-030-21373-2_37}
    }
    
  • Man Zhou
    Lansheng Han
    Hongwei Lu
    Cai Fu
    Year: 2019
    Intrusion Detection System for IoT Heterogeneous Perceptual Network Based on Game Theory
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-21373-2_37
Man Zhou1,*, Lansheng Han1,*, Hongwei Lu1,*, Cai Fu1,*
  • 1: Huazhong University of Science and Technology
*Contact email: zhou_man@hust.edu.cn, hanlansheng@hust.edu.cn, luhw@hust.edu.cn, fucai@hust.edu.cn

Abstract

With the acceleration of the Internet of things (IoT) construction, the security and energy consumption of IoT will become an import factor restricting the overall development of the IoT. In order to reduce the energy consumption of the IoT heterogeneous perceptual network in the attack-defense process, the placement strategy of the intrusion detection system (IDS) described in this paper is to place the IDS on the cluster head nodes selected by the clustering algorithm called ULEACH, which we have proposed in this paper. Furthermore, by applying modified particle swarm optimization, the optimal defense strategy is obtained. Finally, the experiment results show that proposed strategy not only effectively detects multiple network attacks, but also reduces energy consumption.