Abstract | ||
---|---|---|
Mobile Ad hoc Network (MANET) is formed by a set of mobile hosts which communicate among themselves through radio waves. The hosts establish infrastructure and cooperate to forward data in a multi-hop fashion without a central administration. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions. In this paper, we proposed a method for prevention internal intruder and detection external intruder by using game theory in mobile ad hoc network. One optimal solution for reducing the resource consumption of detection external intruder is to elect a leader for each cluster to provide intrusion service to other nodes in the its cluster, we call this mode moderate mode. Moderate mode is only suitable when the probability of attack is low. Once the probability of attack is high, victim nodes should launch their own IDS to detect and thwart intrusions and we call robust mode. In this paper leader should not be malicious or selfish node and must detect external intrusion in its cluster with minimum cost. Our proposed method has three steps: the first step building trust relationship between nodes and estimation trust value for each node to prevent internal intrusion. In the second step we propose an optimal method for leader election by using trust value; and in the third step, finding the threshold value for notifying the victim node to launch its IDS once the probability of attack exceeds that value. In first and third step we apply Bayesian game theory. Our method due to using game theory, trust value and honest leader can effectively improve the network security, performance and reduce resource consumption. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1007/978-3-642-17604-3_8 | Communications in Computer and Information Science |
Keywords | Field | DocType |
Mobile Ad hoc Network (MANET),Intrusion Detection System (IDS),Cluster leader,Trust value,Game theory | Resource consumption,Leader election,Mobile ad hoc network,Intrusion,Trust relationship,Computer security,Network security,Computer network,Game theory,Engineering,Bayesian game | Conference |
Volume | ISSN | Citations |
120 | 1865-0929 | 2 |
PageRank | References | Authors |
0.35 | 12 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Marjan Kuchaki Rafsanjani | 1 | 76 | 16.18 |
Laya Aliahmadipour | 2 | 3 | 1.38 |
Mohammad M. Javidi | 3 | 71 | 12.98 |