DOI QR코드

DOI QR Code

Development of a Secure Routing Protocol using Game Theory Model in Mobile Ad Hoc Networks

  • Received : 2013.09.19
  • Accepted : 2014.11.19
  • Published : 2015.02.28

Abstract

In mobile ad-hoc networks (MANETs), nodes are mobile in nature. Collaboration between mobile nodes is more significant in MANETs, which have as their greatest challenges vulnerabilities to various security attacks and an inability to operate securely while preserving its resources and performing secure routing among nodes. Therefore, it is essential to develop an effective secure routing protocol to protect the nodes from anonymous behaviors. Currently, game theory is a tool that analyzes, formulates and solves selfishness issues. It is seldom applied to detect malicious behavior in networks. It deals, instead, with the strategic and rational behavior of each node. In our study,we used the dynamic Bayesian signaling game to analyze the strategy profile for regular and malicious nodes. This game also revealed the best actions of individual strategies for each node. Perfect Bayesian equilibrium (PBE) provides a prominent solution for signaling games to solve incomplete information by combining strategies and payoff of players that constitute equilibrium. Using PBE strategies of nodes are private information of regular and malicious nodes. Regular nodes should be cooperative during routing and update their payoff, while malicious nodes take sophisticated risks by evaluating their risk of being identified to decide when to decline. This approach minimizes the utility of malicious nodes and it motivates better cooperation between nodes by using the reputation system. Regular nodes monitor continuously to evaluate their neighbors using belief updating systems of the Bayes rule.

Keywords

References

  1. F. Li and J.Wu, "Attack and Flee : Game theory based analysis on interactions among nodes in MANETs," IEEE Trans. Syst., Man Cybern., vol. 40, pp. 612-622, 2010. https://doi.org/10.1109/TSMCB.2009.2035929
  2. Z. Li and H. Shen, "Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks," IEEE Trans. Mobile Comput., vol. 11, no. 8, pp. 1287-1303, Aug. 2012. https://doi.org/10.1109/TMC.2011.151
  3. Z. ji, W. Yu and K. J. R. Liu, "A belief evaluation framework in autonomous MANETs under noisy and imperfect observation: Vulnerability analysis and cooperation enforcement," IEEE Trans. Mobile Computing, vol. 9, pp. 1242-1254, 2010. https://doi.org/10.1109/TMC.2010.87
  4. M. Stadigl, "Co-evolutionary dynamics and Bayesian interaction games," Int. J. Game Theory, vol. 42, pp. 179-210, 2012.
  5. M. Kinateder, "Delayed perfect monitoring in repeated games," Int. J. Game Theory, vol. 42, pp. 283-294, 2012.
  6. N. Mohammed, H. Otrok, and L.Wang, "Mechanism design-based secure leader election model for intrusion detection in MANET," IEEE Trans. Dependable Secure Computing, vol. 8, pp. 89-103, 2011. https://doi.org/10.1109/TDSC.2009.22
  7. M. H. Manshaei et al., "Game theory meets network security and privacy," J. ACM Comput. Surv., vol. 45, no. 3, June 2013.
  8. M. Jiang, J. Li, and Y. C. Tay, "Cluster based routing protocol (CBRP)," IETF MANET Working Group, Internet-Draft, 1999.
  9. M. Kumar et al., "Comparative analysis of CBRP, DSR, AODV routing protocol in MANET," Int. J. Comput. Sci. Eng., vol. 2, no. 9, pp.2853-2858, 2010.
  10. G. Theodorakopoulos and J. Baras, "Malicious users in unstructured networks," in Proc. IEEE INFOCOM, May. 2007, pp. 884-891.
  11. Q. Zhu et al., "GUIDEX: A game-theoretic incentive-based mechanism for intrusion detection networks," IEEE J. Select. Areas Commun., vol. 30, no. 11, pp.2220-2230, Dec. 2012. https://doi.org/10.1109/JSAC.2012.121214
  12. M. T. Refaei et al., "Adaptation of reputation management systems to dynamic network conditions in ad hoc networks," IEEE Trans. Comput., vol. 59, no. 5, pp.707-719, May. 2010. https://doi.org/10.1109/TC.2010.34
  13. F. Li and J.Wu, "Mobility reduces uncertainty in MANETs,"in Proc. 26th IEEE INFOCOM, May. 2007, pp. 1946-1954.
  14. S. Ng and W. Seah, "Game-theoretic model for collaborative protocols in selfish, tariff-free, multihop wireless networks," in Proc. 27th IEEE INFOCOM, Singapore, Apr. 2008.
  15. M. Malawski, "Procedural values for cooperative games," Int. J. Game Theory, vol. 42, pp. 305-324, 2012.
  16. P. Liu, W. Zang, and M. Yu, "Incentive-based modeling and inference of attacker intent, objectives and strategies,"ACM Trans. Inform. Syst. Security, vol. 8, pp. 78-118, 2005. https://doi.org/10.1145/1053283.1053288
  17. A. Blanc, Y. Liu, and A. Vahdat, "Designing incentives for peer-to-peer routing," in Proc. IEEE INFOCOM, USA,Mar. 2005, vol. 1, pp. 374-385.
  18. S. Buchegger and J. Y. L. Boudec, "Performance analysis of the CONFIDANT Protocol, cooperation of nodes-Fairness in dynamic ad hoc networks," in Proc. IEEE/ACM MOBIHOC, June 2002.
  19. M. K. Rafsanjani et al., "A hybrid intrusion detection by game theory approaches in MANET," Indian J. Sci. Tech., vol. 5, no. 2, pp. 2123-2131, 2012.
  20. S. Buchegger and J. Y. L. Boudec, "The effect of ru-mor spreading in reputation systems for mobile ad hoc networks," in Proc. WIOPT, 2003.
  21. S. Buchegger and J. Y. L. Boudec, "Coping with false accusations in misbehavior reputation systems for mobile ad hoc networks," EPFL Tech. Rep. Number IC/2003/31, 2003.
  22. S. Buchegger and J. Boudec, "A robust reputation system for P2P and mobile ad-hoc networks," in Proc. 2nd Workshop on Econ. Peer-to-Peer Syst, 2004.
  23. P.Michiardi and R.Molva, "CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," in Proc. IFIP TC6/TC11 6th Joint Working Conf. Commun. and Multimedia Security: Advanced Commun. and Multimedia Security, 2002, pp. 107-121.