Abstract
Game Theory acts as a suitable tool offering promising solutions to security-related concerns in Mobile Ad Hoc Networks (i.e., MANETs). In MANETs, security forms a prominent concern as it includes nodes which are usually portable and require significant coordination between them. Further, the absence of physical organisation makes such networks susceptible to security breaches, hindering secure routing and execution among nodes. Game Theory approach has been manipulated in the current study to achieve an analytical view while addressing the security concerns in MANETs. This paper offers a Bayesian-Signaling game model capable of analysing the behaviour associated with regular as well as malicious nodes. In the proposed model, the utility of normal nodes has been increased while reducing the utility linked to malicious nodes. Moreover, the system employs a reputation system capable of stimulating best cooperation between the nodes. The regular nodes record incessantly to examine their corresponding nodes’ behaviours by using the belief system of Bayes-rules. On its comparison with existing schemes, it was revealed that the presented algorithm provides better identification of malicious nodes and attacks while delivering improved throughput and reduced false positive rate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cheng, X., Huang, X., Du, D.Z.: Ad Hoc Wireless Networking. Springer Science & Business Media, United States (2013)
Ma, Y., Jia, Z.: Evolution and trends of broadband access technologies and fibre-wireless systems. In: Fiber-Wireless Convergence in Next-Generation Communication Networks, pp. 43–75. Springer, Cham (2017)
Huang, J.H., Wang, L.C., Chang, C.J.: Architectures and deployment strategies for wireless mesh networks. In: Wireless Mesh Networks, pp. 29–56. Springer, Boston (2008)
Olanrewaju, R.F., Khan, B.U.I., Anwar, F., Khan, A.R., Shaikh, F.A., Mir, M.S.: MANET–A cogitation of its design and security issues. Middle-East J. Sci. Res. 24(10), 3094–3107 (2016)
Ghosekar, P., Katkar, G., Ghorpade, P.: Mobile ad hoc networking: imperatives and challenges. IJCA (Special Issue on MANETs) 3, 153–158 (2010)
Hogie, L., Bouvry, P., Guinand, F.: An overview of MANETs simulation. Electron. Notes Theor. Comput. Sci. 150(1), 81–101 (2006)
Suri, P.R., Rani, S.: Bluetooth network—the adhoc network concept. In: SoutheastCon. Proceedings, pp. 720–720. IEEE (2007)
Khan, B.U.I., Olanrewaju, R.F., Ali, N.A., Shah, A.: ElePSO: energy-aware elephant swarm optimization for mobile ad-hoc network. Pensee J. 76(5), 88–103 (2014)
Khan, B.U.I., Olanrewaju, R.F., Anwar, F., Shah, A.: Manifestation and mitigation of node misbehaviour in ad-hoc networks. Wulfenia J. 21(3), 462–470 (2014)
Khan, B.U.I., Olanrewaju, R.F., Habaebi, M.H.: Malicious behaviour of node and its significant security techniques in MANET—A review. Aust. J. Basic Appl. Sci. 7(12), 286–293 (2013)
Khan, B.U.I., Olanrewaju, R.F., Mir, R.N., Baba, A., Adebayo, B.W.: Strategic profiling for behaviour visualization of malicious node in MANETs using game theory. J. Theor. Appl. Inf. Technol. 77(1), 25–43 (2015)
Khan, B.U.I., Olanrewaju, R.F., Mir, R.N., Yusoff, S.H., Sanni, M.L.: Trust and resource-oriented communication scheme in mobile ad hoc networks. In: Proceedings of SAI Intelligent Systems Conference, pp. 414–430. Springer, Cham (2016)
Khan, B.U.I., Olanrewaju, R.F., Anwar, F., Najeeb, A.R., Yaacob, M.: A survey on MANETs: architecture, evolution, applications, security issues and solutions. Indonesian J. Electr. Eng. Comput. Sci. 12(2), 832–842 (2018)
Olanrewaju, R.F., Khan, B.U.I., Najeeb, A.R., Zahir, K.N., Hussain, S.: Snort-based smart and swift intrusion detection system. Indian J. Sci. Technol. 11(4), 1–9 (2018)
Rath, M., Panigrahi, C.R.: Prioritization of security measures at the junction of MANET and IoT. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, p. 127, ACM (2016)
Bellavista, P., Cardone, G., Corradi, A., Foschini, L.: Convergence of MANET and WSN in IoT urban scenarios. IEEE Sens. J. 13(10), 3558–3567 (2013)
Olanrewaju, R.F., Khan, B.U.I., Mir, R.N., Shah, A.: Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach. Am. J. Comput. Sci. Eng. 2(3), 10–19 (2015)
Olanrewaju, R.F., Mechraoui, A.L., Khan, B.U.I.: Game theory probabilistic application to detect misbehaving nodes in ad-hoc networks. In: Proceedings of the 2nd IEEE International Conference on Intelligent Systems Engineering (ICISE), Kuala Lumpur, Malaysia, 20–21 Mar 2018
Tantubay, N., Gautam, D.R., Dhariwal, M.K.: A review of power conservation in wireless mobile ad-hoc network (MANET). Int. J. Comput. Sci. Issues (IJCSI) 8(4), 378–383 (2011)
Arulanandam, K., Parthasarathy, B.: A new energy level efficiency issues in MANET. Int. J. Rev. Comput. 1(5), 104–109 (2009)
Singh, G., Singh, J.: MANET: issues and behavior analysis of routing protocols. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(4), 219–227 (2012)
Parvez, J., Peer, M.A.: A comparative analysis of performance and QoS issues in MANETs. World Acad. Sci. Eng. Technol. 48, 937–948 (2010)
Khan, B.U.I., Olanrewaju, R.F., Baba, A.M., Mir, R.N., Lone, S.A.: DTASR: dual threshold-based authentication for secure routing in mobile ad-hoc network. World Eng. Appl. Sci. J. 7(2), 68–73 (2016)
Khan, B.U.I., Zulkurnain, N.F., Olanrewaju, R.F., Nissar, G., Baba, A.M., Lone, S.A.: JIR2TA: joint invocation of resource-based thresholding and trust-oriented authentication in mobile ad-hoc network. In: Proceedings of SAI Intelligent Systems Conference, pp. 689–701. Springer, Cham (2016)
Khan, B.U.I., Olanrewaju, R.F., Mattoo, M.U., Aziz, A.A., Lone, S.A.: Modeling malicious multi-attacker node collusion in MANETs via game theory. Middle-East J. Sci. Res. 25(3), 568–579 (2017)
Khan, B.U.I., Olanrewaju, R.F., Baba, A.M., Zulkarnain, N.F., Lone, S.A.: STCM: secured trust-based communication method in vulnerable mobile ad-hoc network. In: 9th International Conference on Robotic, Vision, Signal Processing and Power Applications, pp. 149–161, Springer, Singapore (2017)
Ilavendhan, A., Saruladha, K.: Comparative study of game theoretic approaches to mitigate network layer attacks in VANETs. ICT Express 4(1), 46–50 (2018)
Javidi, M.M., Aliahmadipour, L.: Game theory approaches for improving intrusion detection in MANETs. Sci. Res. Essays 6(31), 6535–6539 (2011)
Janzadeh, H., Fayazbakhsh, K., Dehghan, M., Fallah, M.S.: A secure credit-based cooperation stimulating mechanism for MANETs using hash chains. Future Gener. Comput. Syst. 25(8), 926–934 (2009)
Panaousis, E.A., Politis, C.: A game theoretic approach for securing AODV in emergency Mobile Ad Hoc Networks. In: IEEE 34th Conference on Local Computer Networks, LCN, pp. 985–992 (2009)
Wang, K., Wu, M.: Nash equilibrium of node cooperation based on metamodel for MANETs. J. Inf. Sci. Eng. 28(2), 317–333 (2012)
Li, F., Yang, Y., Wu, J.: Attack and flee: Game-THEORY-based analysis on interactions among nodes in MANETs. IEEE Trans. Syst. Man Cybern. Part B (Cybernetics) 40(3), 612–622 (2010)
Liu, Y., Comaniciu, C., Man, H.: A Bayesian game approach for intrusion detection in wireless ad hoc networks. In: Proceeding from the 2006 Workshop on Game Theory for Communications and Networks, p. 4, ACM (2006)
Marchang, N., Tripathi, R.: A game theoretical approach for efficient deployment of intrusion detection system in mobile ad hoc networks. In: International Conference on Advanced Computing and Communications, ADCOM, pp. 460–464, IEEE (2007)
Li, Z., Shen, H.: Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks. IEEE Trans. Mob. Comput. 11(8), 1287–1303 (2012)
Manshaei, M.H., Zhu, Q., Alpcan, T., Bacşar, T., Hubaux, J.P.: Game theory meets network security and privacy. ACM Comput. Surv. (CSUR) 45(3), 1–35 (2013)
Theodorakopoulos, G., Baras, J.S.: Malicious users in unstructured networks. In: 26th IEEE International Conference on Computer Communications, pp. 884–891, IEEE (2007)
Wang, B., Zhu, J., Liu, K.R.: Self-learning repeated game framework for distributed primary-prioritized dynamic spectrum access. In: 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 631–638, IEEE (2007)
Hamdi, M., Abie, H.: Game-based adaptive security in the Internet of things for eHealth. In: IEEE International Conference on Communications (ICC), pp. 920–925, IEEE (2014)
Abegunde, J., Xiao, H., Spring, J.: A dynamic game with adaptive strategies for IEEE 802.15. 4 and IoT. In: Trustcom/BigDataSE/ISPA, pp. 473–480, IEEE (2016)
La, V.H., Cavalli, A.R.: A misbehavior node detection algorithm for 6LoWPAN Wireless Sensor Networks. In: 36th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 49–54, IEEE (2016)
Das, D., Majumder, K., Dasgupta, A.: Selfish node detection and low-cost data transmission in MANET using game theory. Procedia Comput. Sci. 54, 92–101 (2015)
Taheri, Y., Garakani, H.G., Mohammadzadeh, N.: A game theory approach for malicious node detection in MANETs. J. Inf. Sc. Eng. 32(3), 559–573 (2016)
Rajkumar, B., Narsimha, G.: Trust-based certificate revocation for secure routing in MANET. Procedia Comput. Sci. 92, 431–441 (2016)
Sengathir, J., Manoharan, R.: Security algorithms for mitigating selfish and shared root node attacks in MANETs. Int. J. Comput. Netw. Inf. Secur. 5(10), 1–10 (2013)
Paramasiva, B., Pitchai, K.M.: Modeling intrusion detection in mobile ad hoc networks as a non-cooperative game. In: International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), pp. 300–306, IEEE (2013)
Acknowledgments
This work was supported by Ministry of Higher Education Malaysia (Kementerian Pendidikan Tinggi) under Research Initiative Grant Scheme number P-RIGS19-020-0020.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Olanrewaju, R.F., Burhan ul Islam Khan, Anwar, F., Mir, R.N., Yaacob, M., Mehraj, T. (2020). Bayesian Signaling Game Based Efficient Security Model for MANETs. In: Arai, K., Bhatia, R. (eds) Advances in Information and Communication. FICC 2019. Lecture Notes in Networks and Systems, vol 70. Springer, Cham. https://doi.org/10.1007/978-3-030-12385-7_75
Download citation
DOI: https://doi.org/10.1007/978-3-030-12385-7_75
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-12384-0
Online ISBN: 978-3-030-12385-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)