Skip to main content

Bayesian Signaling Game Based Efficient Security Model for MANETs

  • Conference paper
  • First Online:
Advances in Information and Communication (FICC 2019)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 70))

Included in the following conference series:

Abstract

Game Theory acts as a suitable tool offering promising solutions to security-related concerns in Mobile Ad Hoc Networks (i.e., MANETs). In MANETs, security forms a prominent concern as it includes nodes which are usually portable and require significant coordination between them. Further, the absence of physical organisation makes such networks susceptible to security breaches, hindering secure routing and execution among nodes. Game Theory approach has been manipulated in the current study to achieve an analytical view while addressing the security concerns in MANETs. This paper offers a Bayesian-Signaling game model capable of analysing the behaviour associated with regular as well as malicious nodes. In the proposed model, the utility of normal nodes has been increased while reducing the utility linked to malicious nodes. Moreover, the system employs a reputation system capable of stimulating best cooperation between the nodes. The regular nodes record incessantly to examine their corresponding nodes’ behaviours by using the belief system of Bayes-rules. On its comparison with existing schemes, it was revealed that the presented algorithm provides better identification of malicious nodes and attacks while delivering improved throughput and reduced false positive rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cheng, X., Huang, X., Du, D.Z.: Ad Hoc Wireless Networking. Springer Science & Business Media, United States (2013)

    MATH  Google Scholar 

  2. Ma, Y., Jia, Z.: Evolution and trends of broadband access technologies and fibre-wireless systems. In: Fiber-Wireless Convergence in Next-Generation Communication Networks, pp. 43–75. Springer, Cham (2017)

    Google Scholar 

  3. Huang, J.H., Wang, L.C., Chang, C.J.: Architectures and deployment strategies for wireless mesh networks. In: Wireless Mesh Networks, pp. 29–56. Springer, Boston (2008)

    Google Scholar 

  4. Olanrewaju, R.F., Khan, B.U.I., Anwar, F., Khan, A.R., Shaikh, F.A., Mir, M.S.: MANET–A cogitation of its design and security issues. Middle-East J. Sci. Res. 24(10), 3094–3107 (2016)

    Google Scholar 

  5. Ghosekar, P., Katkar, G., Ghorpade, P.: Mobile ad hoc networking: imperatives and challenges. IJCA (Special Issue on MANETs) 3, 153–158 (2010)

    Google Scholar 

  6. Hogie, L., Bouvry, P., Guinand, F.: An overview of MANETs simulation. Electron. Notes Theor. Comput. Sci. 150(1), 81–101 (2006)

    Article  Google Scholar 

  7. Suri, P.R., Rani, S.: Bluetooth network—the adhoc network concept. In: SoutheastCon. Proceedings, pp. 720–720. IEEE (2007)

    Google Scholar 

  8. Khan, B.U.I., Olanrewaju, R.F., Ali, N.A., Shah, A.: ElePSO: energy-aware elephant swarm optimization for mobile ad-hoc network. Pensee J. 76(5), 88–103 (2014)

    Google Scholar 

  9. Khan, B.U.I., Olanrewaju, R.F., Anwar, F., Shah, A.: Manifestation and mitigation of node misbehaviour in ad-hoc networks. Wulfenia J. 21(3), 462–470 (2014)

    Google Scholar 

  10. Khan, B.U.I., Olanrewaju, R.F., Habaebi, M.H.: Malicious behaviour of node and its significant security techniques in MANET—A review. Aust. J. Basic Appl. Sci. 7(12), 286–293 (2013)

    Google Scholar 

  11. Khan, B.U.I., Olanrewaju, R.F., Mir, R.N., Baba, A., Adebayo, B.W.: Strategic profiling for behaviour visualization of malicious node in MANETs using game theory. J. Theor. Appl. Inf. Technol. 77(1), 25–43 (2015)

    Google Scholar 

  12. Khan, B.U.I., Olanrewaju, R.F., Mir, R.N., Yusoff, S.H., Sanni, M.L.: Trust and resource-oriented communication scheme in mobile ad hoc networks. In: Proceedings of SAI Intelligent Systems Conference, pp. 414–430. Springer, Cham (2016)

    Google Scholar 

  13. Khan, B.U.I., Olanrewaju, R.F., Anwar, F., Najeeb, A.R., Yaacob, M.: A survey on MANETs: architecture, evolution, applications, security issues and solutions. Indonesian J. Electr. Eng. Comput. Sci. 12(2), 832–842 (2018)

    Article  Google Scholar 

  14. Olanrewaju, R.F., Khan, B.U.I., Najeeb, A.R., Zahir, K.N., Hussain, S.: Snort-based smart and swift intrusion detection system. Indian J. Sci. Technol. 11(4), 1–9 (2018)

    Article  Google Scholar 

  15. Rath, M., Panigrahi, C.R.: Prioritization of security measures at the junction of MANET and IoT. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, p. 127, ACM (2016)

    Google Scholar 

  16. Bellavista, P., Cardone, G., Corradi, A., Foschini, L.: Convergence of MANET and WSN in IoT urban scenarios. IEEE Sens. J. 13(10), 3558–3567 (2013)

    Article  Google Scholar 

  17. Olanrewaju, R.F., Khan, B.U.I., Mir, R.N., Shah, A.: Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach. Am. J. Comput. Sci. Eng. 2(3), 10–19 (2015)

    Google Scholar 

  18. Olanrewaju, R.F., Mechraoui, A.L., Khan, B.U.I.: Game theory probabilistic application to detect misbehaving nodes in ad-hoc networks. In: Proceedings of the 2nd IEEE International Conference on Intelligent Systems Engineering (ICISE), Kuala Lumpur, Malaysia, 20–21 Mar 2018

    Google Scholar 

  19. Tantubay, N., Gautam, D.R., Dhariwal, M.K.: A review of power conservation in wireless mobile ad-hoc network (MANET). Int. J. Comput. Sci. Issues (IJCSI) 8(4), 378–383 (2011)

    Google Scholar 

  20. Arulanandam, K., Parthasarathy, B.: A new energy level efficiency issues in MANET. Int. J. Rev. Comput. 1(5), 104–109 (2009)

    Google Scholar 

  21. Singh, G., Singh, J.: MANET: issues and behavior analysis of routing protocols. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(4), 219–227 (2012)

    Google Scholar 

  22. Parvez, J., Peer, M.A.: A comparative analysis of performance and QoS issues in MANETs. World Acad. Sci. Eng. Technol. 48, 937–948 (2010)

    Google Scholar 

  23. Khan, B.U.I., Olanrewaju, R.F., Baba, A.M., Mir, R.N., Lone, S.A.: DTASR: dual threshold-based authentication for secure routing in mobile ad-hoc network. World Eng. Appl. Sci. J. 7(2), 68–73 (2016)

    Google Scholar 

  24. Khan, B.U.I., Zulkurnain, N.F., Olanrewaju, R.F., Nissar, G., Baba, A.M., Lone, S.A.: JIR2TA: joint invocation of resource-based thresholding and trust-oriented authentication in mobile ad-hoc network. In: Proceedings of SAI Intelligent Systems Conference, pp. 689–701. Springer, Cham (2016)

    Google Scholar 

  25. Khan, B.U.I., Olanrewaju, R.F., Mattoo, M.U., Aziz, A.A., Lone, S.A.: Modeling malicious multi-attacker node collusion in MANETs via game theory. Middle-East J. Sci. Res. 25(3), 568–579 (2017)

    Google Scholar 

  26. Khan, B.U.I., Olanrewaju, R.F., Baba, A.M., Zulkarnain, N.F., Lone, S.A.: STCM: secured trust-based communication method in vulnerable mobile ad-hoc network. In: 9th International Conference on Robotic, Vision, Signal Processing and Power Applications, pp. 149–161, Springer, Singapore (2017)

    Google Scholar 

  27. Ilavendhan, A., Saruladha, K.: Comparative study of game theoretic approaches to mitigate network layer attacks in VANETs. ICT Express 4(1), 46–50 (2018)

    Article  Google Scholar 

  28. Javidi, M.M., Aliahmadipour, L.: Game theory approaches for improving intrusion detection in MANETs. Sci. Res. Essays 6(31), 6535–6539 (2011)

    Google Scholar 

  29. Janzadeh, H., Fayazbakhsh, K., Dehghan, M., Fallah, M.S.: A secure credit-based cooperation stimulating mechanism for MANETs using hash chains. Future Gener. Comput. Syst. 25(8), 926–934 (2009)

    Article  Google Scholar 

  30. Panaousis, E.A., Politis, C.: A game theoretic approach for securing AODV in emergency Mobile Ad Hoc Networks. In: IEEE 34th Conference on Local Computer Networks, LCN, pp. 985–992 (2009)

    Google Scholar 

  31. Wang, K., Wu, M.: Nash equilibrium of node cooperation based on metamodel for MANETs. J. Inf. Sci. Eng. 28(2), 317–333 (2012)

    MathSciNet  Google Scholar 

  32. Li, F., Yang, Y., Wu, J.: Attack and flee: Game-THEORY-based analysis on interactions among nodes in MANETs. IEEE Trans. Syst. Man Cybern. Part B (Cybernetics) 40(3), 612–622 (2010)

    Google Scholar 

  33. Liu, Y., Comaniciu, C., Man, H.: A Bayesian game approach for intrusion detection in wireless ad hoc networks. In: Proceeding from the 2006 Workshop on Game Theory for Communications and Networks, p. 4, ACM (2006)

    Google Scholar 

  34. Marchang, N., Tripathi, R.: A game theoretical approach for efficient deployment of intrusion detection system in mobile ad hoc networks. In: International Conference on Advanced Computing and Communications, ADCOM, pp. 460–464, IEEE (2007)

    Google Scholar 

  35. Li, Z., Shen, H.: Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks. IEEE Trans. Mob. Comput. 11(8), 1287–1303 (2012)

    Article  Google Scholar 

  36. Manshaei, M.H., Zhu, Q., Alpcan, T., Bacşar, T., Hubaux, J.P.: Game theory meets network security and privacy. ACM Comput. Surv. (CSUR) 45(3), 1–35 (2013)

    Article  Google Scholar 

  37. Theodorakopoulos, G., Baras, J.S.: Malicious users in unstructured networks. In: 26th IEEE International Conference on Computer Communications, pp. 884–891, IEEE (2007)

    Google Scholar 

  38. Wang, B., Zhu, J., Liu, K.R.: Self-learning repeated game framework for distributed primary-prioritized dynamic spectrum access. In: 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 631–638, IEEE (2007)

    Google Scholar 

  39. Hamdi, M., Abie, H.: Game-based adaptive security in the Internet of things for eHealth. In: IEEE International Conference on Communications (ICC), pp. 920–925, IEEE (2014)

    Google Scholar 

  40. Abegunde, J., Xiao, H., Spring, J.: A dynamic game with adaptive strategies for IEEE 802.15. 4 and IoT. In: Trustcom/BigDataSE/ISPA, pp. 473–480, IEEE (2016)

    Google Scholar 

  41. La, V.H., Cavalli, A.R.: A misbehavior node detection algorithm for 6LoWPAN Wireless Sensor Networks. In: 36th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 49–54, IEEE (2016)

    Google Scholar 

  42. Das, D., Majumder, K., Dasgupta, A.: Selfish node detection and low-cost data transmission in MANET using game theory. Procedia Comput. Sci. 54, 92–101 (2015)

    Article  Google Scholar 

  43. Taheri, Y., Garakani, H.G., Mohammadzadeh, N.: A game theory approach for malicious node detection in MANETs. J. Inf. Sc. Eng. 32(3), 559–573 (2016)

    MathSciNet  Google Scholar 

  44. Rajkumar, B., Narsimha, G.: Trust-based certificate revocation for secure routing in MANET. Procedia Comput. Sci. 92, 431–441 (2016)

    Article  Google Scholar 

  45. Sengathir, J., Manoharan, R.: Security algorithms for mitigating selfish and shared root node attacks in MANETs. Int. J. Comput. Netw. Inf. Secur. 5(10), 1–10 (2013)

    Google Scholar 

  46. Paramasiva, B., Pitchai, K.M.: Modeling intrusion detection in mobile ad hoc networks as a non-cooperative game. In: International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), pp. 300–306, IEEE (2013)

    Google Scholar 

Download references

Acknowledgments

This work was supported by Ministry of Higher Education Malaysia (Kementerian Pendidikan Tinggi) under Research Initiative Grant Scheme number P-RIGS19-020-0020.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Burhan ul Islam Khan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Olanrewaju, R.F., Burhan ul Islam Khan, Anwar, F., Mir, R.N., Yaacob, M., Mehraj, T. (2020). Bayesian Signaling Game Based Efficient Security Model for MANETs. In: Arai, K., Bhatia, R. (eds) Advances in Information and Communication. FICC 2019. Lecture Notes in Networks and Systems, vol 70. Springer, Cham. https://doi.org/10.1007/978-3-030-12385-7_75

Download citation

Publish with us

Policies and ethics