Skip to main content
Log in

WiFi Intrusion Detection and Prevention Systems Analyzing: A Game Theoretical Perspective

  • Published:
International Journal of Wireless Information Networks Aims and scope Submit manuscript

Abstract

WiFi is the de-facto wireless standard which suffers from a significant security vulnerability. Indeed, the WiFi management frames are not sent via an encrypted channel. However, many studies have been conducted to face this issue, but, preparing a comprehensive model for assessing the performance of these systems under different conditions is a research gap. In this paper, we propose an Abstract WIDPS with a useful but straightforward response function in confronting management frames transferring in an insecure channel. Indeed, we model the interaction between the entities involved in the problem based on game theory and propose a performance evaluation method for WIDPS depending on the network application context and the importance of confidentiality, integrity, and availability as the three principles of information security. This model provides an innovative solution for WIDPS qualitative classification. Finally, we evaluate the proposed method in several different samples, which obtains efficient results for classification and tuning of WIDPSs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Cisco visual networking index. Forecast and methodology, 20162021—cisco. https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/complete-white-paper-c11-481360.html. Accessed 19 Oct 2018.

  2. I.C.S.L.M.S. Committee, et al., ANSI/IEEE Std. 802.11-1999, 1999.

  3. T.D. Nguyen, D.H. Nguyen, B.N. Tran, H. Vu, and N. Mittal, In: 2008 Proceedings of 17th international conference on computer Communications and networks IEEE, New York, pp. 1–6, 2008.

  4. H. Han, B. Sheng, C. C. Tan, Q. Li and S. Lu, A timing-based scheme for rogue AP detection, IEEE Transactions on parallel and distributed Systems, Vol. 22, No. 11, p. 1912, 2011.

    Article  Google Scholar 

  5. R. Mitchell and R. Chen, A survey of intrusion detection in wireless network applications, Computer Communications, Vol. 42, p. 1, 2014.

    Article  Google Scholar 

  6. K. Scarfone and P. Mell, Guide to Intrusion Detection and Prevention Systems (IDPS), NIST Special Publication, Vol. 800, No. 2007, p. 94, 2007.

    Google Scholar 

  7. R. Myerson, Game Theory. Harvard University Press, Cambridge, 2013. https://books.google.com/books?id=oGUET9JBytEC.

  8. Y. Narahari, Game Theory and Mechanism Design4 ed., World ScientificSingapore, 2014.

    Book  Google Scholar 

  9. S. Tadelis, Game Theory: An Introduction, Princeton University PressPrinceton, 2013.

    MATH  Google Scholar 

  10. K. Leyton-Brown, and Y. Shoham, Essentials of Game Theory: A Concise, Multidisciplinary Introduction. Synthesis lectures on artificial intelligence and machine learning. Morgan & Claypool Publishers, 2008. https://books.google.com/books?id=u8sDLATVJikC.

  11. B. Aslam, M.H. Islam, and S.A. Khan, In Proceedings of the First Mobile Computing and Wireless Communication International Conference, 2006. MCWC 2006. IEEE, New York, pp. 221–226, 2006.

  12. B. Aslam, M.H. Islam, and S.A. Khan, In Proceedings of the First Mobile Computing and Wireless Communication International Conference, 2006. MCWC 2006. IEEE, New York, pp. 215–220, 2006.

  13. K. Bicakci and B. Tavli, Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks, Computer Standards & Interfaces, Vol. 31, No. 5, p. 931, 2009.

    Article  Google Scholar 

  14. M. Malekzadeh, A. A. A. Ghani, J. Desa and S. Subramaniam, An experimental evaluation of DoS attack and its impact on throughput of IEEE 802.11 wireless networks, IJCSNS, Vol. 8, No. 8, p. 1, 2008.

    Google Scholar 

  15. M. Bernaschi, F. Ferreri and L. Valcamonici, Access points vulnerabilities to DoS attacks in 802.11 networks, Wireless Networks, Vol. 14, No. 2, p. 159, 2008.

    Article  Google Scholar 

  16. H. Hwang, G. Jung, K. Sohn, and S. Park, In International Conference on Information Science and Security, 2008. ICISS. IEEE, New York, pp. 164–170, 2008.

  17. K. Bauer, H. Gonzales, and D. McCoy, In IEEE International Performance, computing and communications conference, 2008. IPCCC 2008. IEEE, New York, pp. 513–516, 2008.

  18. S. Bratus, C. Cornelius, D. Kotz, and D. Peebles, In Proceedings of the first ACM conference on Wireless network security. ACM, New York, pp. 56–61, 2008.

  19. G. Chen, H. Yao, and Z. Wang, In Second International Conference on Future Networks, 2010. ICFN’10. IEEE, New York, pp. 168–172, 2010.

  20. C. Yang, Y. Song and G. Gu, Active user-side evil twin access point detection using statistical techniques, IEEE Transactions on Information Forensics and Security, Vol. 7, No. 5, p. 1638, 2012.

    Article  Google Scholar 

  21. S. Y. Rashida, Hybrid architecture for distributed intrusion detection system in wireless network, International Journal of Network Security & Its Applications, Vol. 5, No. 3, p. 45, 2013.

    Article  Google Scholar 

  22. N. Sharma, P. N. Barwal and C. Noida, Study of DoS Attacks on IEEE 802. 11 WLAN and its prevention/detection techniques, International Journal of Engineering Science and Innovative Technology (IJESIT), Vol. 3, No. 3, p. 245, 2014.

    Google Scholar 

  23. P. Kavitha and M. Usha, Anomaly based intrusion detection in wlan using discrimination Algorithm combined with Naive Bayesian Classifier Naive Bayesian Classifier, Journal of Theoretical & Applied Information Technology, Vol. 62, p. 1, 2014.

    Google Scholar 

  24. S. M. Moosavirad, P. Kabiri and H. Mahini, Rashnu: a Wi-Fi intrusion response scheme, Security and Communication Networks, Vol. 8, No. 12, p. 2070, 2015.

    Article  Google Scholar 

  25. N. Baharudin, F.H.M. Ali, M.Y. Darus, and N. Awang, In 2015 5th International Conference on IT Convergence and Security (ICITCS). IEEE, New York, pp. 1–5, 2015.

  26. C. Kolias, G. Kambourakis, A. Stavrou and S. Gritzalis, Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset, IEEE Communications Surveys & Tutorials, Vol. 18, No. 1, p. 184, 2016.

    Article  Google Scholar 

  27. A. Kumar, P. Paul, In 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT). IEEE, New York, pp. 176–181, 2016.

  28. M.A.C. Aung, and K.P. Thant, In 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE, New York, pp. 173–178, 2017.

  29. J. Kaur, Networking Communication and Data Knowledge Engineering, SpringerBerlin, 2018. pp. 15–24.

    Book  Google Scholar 

  30. J.F.M. Sánchez, O.J.S. Parra, and A.A. López, In International Conference on Future Data and Security Engineering. Springer, Berlin, pp. 66–73, 2018.

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamidreza Mahini.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mahini, H., Mousavirad, S.M. WiFi Intrusion Detection and Prevention Systems Analyzing: A Game Theoretical Perspective. Int J Wireless Inf Networks 27, 77–88 (2020). https://doi.org/10.1007/s10776-019-00474-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10776-019-00474-3

Keywords

Navigation