Adaptive and Lightweight Abnormal Node Detection via Biological Immune Game in Mobile Multimedia Networks
Abstract
:1. Introduction
- (1)
- Physical layer. This mainly includes the threat of environment security, equipment security, and the threat caused by the malicious damage of the attackers, such as:
- Stealing a user’s device: when a wireless card is lost or stolen, an illegal user can breach an access point;
- Wireless interference: interference with the normal operation of the wireless channel by transmitting a large power-to-frequency signal.
- (2)
- Data link layer. This mainly includes spoofing based on MAC addresses, such as:
- Eavesdropping and listening: electronically eavesdropping on computer communications flowing through wireless networks;
- Spoofing attacks: redefining the MAC address of a wireless network or network card.
- (3)
- Network layer. This includes various attacks from the network, such as:
- Inserting an attack: impersonating a legitimate user, accessing an information system through a wireless channel, and gaining control;
- Denial of service: an attacker maliciously occupies almost all resources of the host or network, making them unavailable to legitimate users;
- A network takeover: an attacker takes over a wireless network or session process, allowing all traffic to reach the attacker’s machine;
- Energy consumption: the destruction of energy-saving mechanisms, such as by constantly sending connection requests, preventing the device from entering the energy-saving mode.
2. Background of Immune Game Theory
2.1. Artificial Immune Theory
- (1)
- SNS theory
- (2)
- DT theory
2.2. Game Theory
- (1)
- Player
- (2)
- Strategy set
- (3)
- Payoff function
- Nash Equilibrium [19]
3. Immune Game–Based Abnormal Node Detection Algorithm
3.1. Basic Idea
3.2. Detailed System Model and Problem Formulation
3.2.1. Immune Detection Algorithm
- (1)
- Nodes are not fluid.
- (2)
- Regional nodes are not sparse, i.e., a regional node can cover a rectangular area, and there is no dead-end phenomenon.
- (3)
- The sensor identification ID is unique.
- (4)
- Ordinary nodes in a region are similar. Ordinary nodes in different regions have some incompatibilities, and regional nodes cannot manage ordinary nodes across regions.
- Establishment of dangerous areas
- Fitness function
- Niching strategy
- Immune operation
- (1)
- Negative selection
- (2)
- Clone, crossover, and mutation.
- Basic idea of the algorithm
- Basic steps and flowchart of the algorithm
3.2.2. Node Game Model
3.2.3. Method of Immune Game
4. Performance Evaluation
4.1. Evaluation Methods
- (1)
- Hybrid attack verification. Through comparison experiments on the proposed algorithm, extended dynamics, and LISYS (an artificial immune system model proposed by Homfeyr and Forrest (1999)) based on the AIS model, the detection rate and false detection rate of the proposed algorithm were verified.
- (2)
- The node stability and reliability were verified, and through the comparison experiment of the immune-game model and Extended-DynamiCS, the immune-game model was found to maintain better network stability and reliability.
4.2. Simulation Background
4.3. Experimental Environment and Parameter Settings
4.4. Experimental Results
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Yamada, T.; Lambertsen, G.; Zhang, L. Mobile Multimedia Metropolitan Area Network. In Proceedings of the IEEE Wireless Communications and Networking, New Orleans, LA, USA, 16–20 March 2003; pp. 2047–2052. [Google Scholar]
- Racherla, G.; Saha, D. Security and Privacy Issues in Wireless and Mobile Computing. In Proceedings of the IEEE International Conference on Personal Wireless Communications, Conference Proceedings (Cat. No. 00TH8488), Hyderabad, India, 17–20 December 2000; pp. 509–513. [Google Scholar]
- Yamada, T. Mobile Multimedia Metropolitan Area Network; an Office LAN Extension to the 4G Mobile Network. In Proceedings of the International Telecommunications Network Strategy and Planning Symposium, Vienna, Austria, 13–16 June 2004; pp. 105–110. [Google Scholar]
- Johnston, D.; Walker, J. Overview of IEEE 802.16 security. IEEE Secur. Priv. 2004, 2, 40–48. [Google Scholar] [CrossRef]
- Staddon, J.; Balfanz, D.; Durfee, G. Efficient Tracing of Failed Nodes in Sensor Networks. In Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, Atlanta, GA, USA, 28 September 2002; pp. 275–286. [Google Scholar]
- Nitesh, K.; Jana, K.P. Distributed fault detection and recovery algorithms in two-tier wireless sensor networks. Int. J. Commun. Netw. Distrib. Syst. 2016, 16, 281–296. [Google Scholar] [CrossRef]
- Titouna, C.; Aliouat, M.; Gueroui, M. FDS: Fault Detection Scheme for Wireless Sensor Networks. Wirel. Pers. Commun. 2015, 86, 549–562. [Google Scholar] [CrossRef]
- Lau, B.C.; Ma, E.W.; Chow, T.W. Probabilistic fault detector for Wireless Sensor Network. Expert Syst. Appl. 2014, 41, 3703–3711. [Google Scholar] [CrossRef]
- Zhang, W.; Han, G.; Feng, Y.; Cheng, L.; Zhang, D.; Tan, X.; Fu, L. A Novel Method for Node Fault Detection Based on Clustering in Industrial Wireless Sensor Networks. Int. J. Distrib. Sens. Netw. 2015, 11, 230521. [Google Scholar] [CrossRef] [Green Version]
- Lim, T.H.; Bate, I.; Timmis, J. A Self-adaptive Fault-tolerant Systems for A Dependable Wireless Sensor Networks. Autom. Embed. Syst. 2014, 18, 223–250. [Google Scholar] [CrossRef]
- Salmon, H.M.; De Farias, C.M.; Loureiro, P.; Pirmez, L.; Rossetto, S.; Rodrigues, P.H.D.A.; Pirmez, R.; Delicato, F.; Carmo, L. Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques. Int. J. Wirel. Inf. Netw. 2012, 20, 39–66. [Google Scholar] [CrossRef]
- Qiao, L.; Bai-Hai, Z.; Ling-Guo, C.; Zhun, F.; Vasilakos, A.V. Immunizations on small worlds of tree-based wireless sensor networks. Chin. Phys. B 2012, 21, 050205. [Google Scholar]
- Jabbari, A.; Lang, W. Advanced Bio-Inspired Plausibility Checking in a Wireless Sensor Network Using Neuro-Immune Systems: Autonomous Fault Diagnosis in an Intelligent Transportation System. In Proceedings of the Fourth International Conference on Sensor Technologies and Applications, Venice, Italy, 18–25 July 2010; pp. 108–114. [Google Scholar]
- Zhang, Y.J.; Wei, J.; Wang, K. An Edge IDS Based on Biological Immune Principles for Dynamic Threat Detection. Wirel. Commun. Mob. Comput. 2020, 2020, 8811035. [Google Scholar] [CrossRef]
- Forrest, S.; Perelson, A.; Allen, L.; Cherukuri, R. Self-Nonself Discrimination in a Computer. In Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, Los Alamitos, CA, USA, 16–18 May 1994; pp. 271–281. [Google Scholar]
- Matzinger, P. The Danger Model: A Renewed Sense of Self. Science 2002, 296, 301–305. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Sun, F.X.; Kong, M.R.; Wang, J.H. An Immune Danger Theory Inspired Model for Network Security Threat Awareness. In Proceedings of the 2010 Second International Conference on Multimedia and Information Technology, Kaifeng, China, 24–25 April 2010; pp. 93–95. [Google Scholar]
- Obsborne, M.J.; Rubinstein, A. A Course in Game Theory; MIT Press: Cambridge, MA, USA, 1994. [Google Scholar]
- Nash, J.F. Non-cooperative games. Ann. Math. 1951, 54, 286–295. [Google Scholar] [CrossRef]
- Kishor, P.; Koen, T.D.; Dieter, F. A two-queue model for optimizing the value of information in energy harvesting sensor networks. Perform. Eval. 2018, 119, 27–42. [Google Scholar]
- Zbigniew, L. Routing algorithm for maximizing lifetime of wireless sensor network for broadcast transmission. Wirel. Pers. Commun. 2018, 101, 251–268. [Google Scholar]
- Amir, A.H. Analysis of incremental LMS adaptive algorithm over wireless sensor networks with delay delinks. Digit. Signal Process. 2019, 88, 88–89. [Google Scholar]
- Xu, F.; Wang, J. Link stabilization algorithm for WSN based on virus-antibody immune game. Comput. Eng. 2020, 46, 206–212, 235. [Google Scholar]
- Sergiu, H.; Andreu, M. Cooperation: Game-Theoretic Approaches. 1997. Available online: https://www.springer.com/gp/book/9783642644139 (accessed on 1 December 2021).
- Camp, T.; Boleng, J.; Davies, V. A survey of mobility models for ad hoc network research. Wirel. Commun. Mob. Comput. 2002, 2, 483–502. [Google Scholar] [CrossRef]
- Shen, S.G. Game Theory Based Research on Several Key Problems of Wireless Sensor Networks Security. Ph.D. Thesis, Donghua University, Shanghai, China, 2013. [Google Scholar]
- Buzacott, J.A. Markov Approach to Finding Failure Times of Repairable Systems. IEEE Trans. Reliab. 1970, 19, 128–134. [Google Scholar] [CrossRef]
Artificial Immune System | Abnormal Node Detection System |
---|---|
Artificial immunity | Node security |
B-cells | Node |
Antibody | Detector |
Antigen | Feature information |
Affinity between antibodies and antigens | Threshold matched |
Response | Match |
Antibodies are killed | Lost information |
Clone | Duplication/mutation |
Mature detectors | Abnormal Node affirmed |
Memory detectors | Abnormal Node that often occurs |
Label | Attack Type | Attack Code | Attack Name | Size of Training Set | Size of Testing Set |
---|---|---|---|---|---|
0 | NOM-AL | 0 | / | 97,278 | 60,593 |
1 | PRO-BING | / | 4107 | 4166 | |
1 | Ipsweep | 1247 | 306 | ||
2 | mscan | - | 1053 | ||
3 | nmap | 231 | 84 | ||
4 | Portsweep | 1040 | 354 | ||
5 | saint | - | 736 | ||
6 | satan | 1589 | 1633 | ||
2 | DOS | / | 391,458 | 229,853 | |
7 | Apache2 | - | 794 | ||
8 | back | 2203 | 1098 | ||
9 | land | 21 | 9 | ||
10 | mailbomb | - | 5000 | ||
11 | neptune | 107,201 | 58,001 | ||
12 | pod | 264 | 87 | ||
13 | Processtable | - | 759 | ||
14 | smurf | 280,790 | 164,091 | ||
15 | teardrop | 979 | 12 | ||
16 | UDPstorm | - | 2 |
Item | Value | Item | Value |
---|---|---|---|
network simulation area | 100 m × 100 m | size of data packet | 150 bytes |
Initial energy of nodes | 50 J | transmission rate | 500 Kbps |
Node distribution | random site | communication mode | TDMA |
Parameter Type | Parameters | Value |
---|---|---|
Immune parameter | L (Size of a single detector) | 64 bit |
r (Threshold of matches) | 16 bit | |
m (Number of alphabet symbols) | 4 | |
P (Number of detectors) | 200 | |
Game parameter | (Probability that node will be infected and detected) | 0.8 |
(Probability that node is not infected but is detected) | 0.08 | |
Pr (Probability that user will check alarm node) | 0.8 | |
(User detects failed node and recovers, allowing user to reduce percentage of losses) | 0.5 | |
GA (Benefits that can be gained when user detects an attack). | 250 | |
GC (Benefits of normal node communication.) | 100 | |
GD (Average return per test) | 200 | |
ED (Average cost per test) | 10 | |
D (Node attack was not detected and user lost.) | 1000 | |
LF (Normal node was mistakenly alarmed and user lost) | 15 | |
λ (Environmental weight; starts when number of node failures exceeds threshold) | 0.8 | |
(Probability that abnormal detection agent chooses to perform detection action) | 0.8 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhang, Y.; Wang, K.; Zhang, J. Adaptive and Lightweight Abnormal Node Detection via Biological Immune Game in Mobile Multimedia Networks. Algorithms 2021, 14, 368. https://doi.org/10.3390/a14120368
Zhang Y, Wang K, Zhang J. Adaptive and Lightweight Abnormal Node Detection via Biological Immune Game in Mobile Multimedia Networks. Algorithms. 2021; 14(12):368. https://doi.org/10.3390/a14120368
Chicago/Turabian StyleZhang, Yajing, Kai Wang, and Jinghui Zhang. 2021. "Adaptive and Lightweight Abnormal Node Detection via Biological Immune Game in Mobile Multimedia Networks" Algorithms 14, no. 12: 368. https://doi.org/10.3390/a14120368
APA StyleZhang, Y., Wang, K., & Zhang, J. (2021). Adaptive and Lightweight Abnormal Node Detection via Biological Immune Game in Mobile Multimedia Networks. Algorithms, 14(12), 368. https://doi.org/10.3390/a14120368