11th EAI International Conference on Mobile Multimedia Communications

Research Article

An Intrusion Detection Based on Bayesian Game Theory for UAV Network

Download1129 downloads
  • @INPROCEEDINGS{10.4108/eai.21-6-2018.2277054,
        author={Jianguo Sun and Wenshan Wang and Qingan Da and Liang Kou and Guodong Zhao and Liguo Zhang and Qilong Han},
        title={An Intrusion Detection Based on Bayesian Game Theory for UAV Network},
        proceedings={11th EAI International Conference on Mobile Multimedia Communications},
        publisher={EAI},
        proceedings_a={MOBIMEDIA},
        year={2018},
        month={9},
        keywords={unmanned aerial vehicles (uavs) uav networks intrusion detection system (ids) bayesian game bayesian nash equilibrium},
        doi={10.4108/eai.21-6-2018.2277054}
    }
    
  • Jianguo Sun
    Wenshan Wang
    Qingan Da
    Liang Kou
    Guodong Zhao
    Liguo Zhang
    Qilong Han
    Year: 2018
    An Intrusion Detection Based on Bayesian Game Theory for UAV Network
    MOBIMEDIA
    EAI
    DOI: 10.4108/eai.21-6-2018.2277054
Jianguo Sun1,*, Wenshan Wang1, Qingan Da1, Liang Kou1, Guodong Zhao1, Liguo Zhang1, Qilong Han1
  • 1: Harbin Engineering University
*Contact email: sunjianguo@hrbeu.edu.cn

Abstract

Unmanned aerial vehicles (UAVs) have enormous potential in public, civil and military fields, so the security of UAV networks is attracting increasing people’s attention. The existing schemes to network intrusion detection have two main limitations: a high false alarm rate and computational overhead. In this paper, aiming at the problem of UAV network security, an intrusion detection scheme based on Bayesian game theory is proposed. Bayesian game means that game participants do not have complete information on the profit function of the opponent. In this paper, incomplete information means that the IDS agent is not sure of the type of attacker and the attacker is not sure whether its neighbor node is an IDS agent or not. The simulation and experimental comparison show that the proposed scheme achieves a high detection rate of intrusion. In addition, the communication cost of the network is the lowest.