About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings

Research Article

Intrusion Detection System for IoT Heterogeneous Perceptual Network Based on Game Theory

Download(Requires a free EAI acccount)
359 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-21373-2_37,
        author={Man Zhou and Lansheng Han and Hongwei Lu and Cai Fu},
        title={Intrusion Detection System for IoT Heterogeneous Perceptual Network Based on Game Theory},
        proceedings={Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13--14, 2019, Proceedings},
        proceedings_a={SPNCE},
        year={2019},
        month={6},
        keywords={IoT security Particle swarm optimization Energy consumption Intrusion detection system Game model},
        doi={10.1007/978-3-030-21373-2_37}
    }
    
  • Man Zhou
    Lansheng Han
    Hongwei Lu
    Cai Fu
    Year: 2019
    Intrusion Detection System for IoT Heterogeneous Perceptual Network Based on Game Theory
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-21373-2_37
Man Zhou1,*, Lansheng Han1,*, Hongwei Lu1,*, Cai Fu1,*
  • 1: Huazhong University of Science and Technology
*Contact email: zhou_man@hust.edu.cn, hanlansheng@hust.edu.cn, luhw@hust.edu.cn, fucai@hust.edu.cn

Abstract

With the acceleration of the Internet of things (IoT) construction, the security and energy consumption of IoT will become an import factor restricting the overall development of the IoT. In order to reduce the energy consumption of the IoT heterogeneous perceptual network in the attack-defense process, the placement strategy of the intrusion detection system (IDS) described in this paper is to place the IDS on the cluster head nodes selected by the clustering algorithm called ULEACH, which we have proposed in this paper. Furthermore, by applying modified particle swarm optimization, the optimal defense strategy is obtained. Finally, the experiment results show that proposed strategy not only effectively detects multiple network attacks, but also reduces energy consumption.

Keywords
IoT security Particle swarm optimization Energy consumption Intrusion detection system Game model
Published
2019-06-10
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-21373-2_37
Copyright © 2019–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL