Title
An Optimal Method for Detecting Internal and External Intrusion in MANET.
Abstract
Mobile Ad hoc Network (MANET) is formed by a set of mobile hosts which communicate among themselves through radio waves. The hosts establish infrastructure and cooperate to forward data in a multi-hop fashion without a central administration. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions. In this paper, we proposed a method for prevention internal intruder and detection external intruder by using game theory in mobile ad hoc network. One optimal solution for reducing the resource consumption of detection external intruder is to elect a leader for each cluster to provide intrusion service to other nodes in the its cluster, we call this mode moderate mode. Moderate mode is only suitable when the probability of attack is low. Once the probability of attack is high, victim nodes should launch their own IDS to detect and thwart intrusions and we call robust mode. In this paper leader should not be malicious or selfish node and must detect external intrusion in its cluster with minimum cost. Our proposed method has three steps: the first step building trust relationship between nodes and estimation trust value for each node to prevent internal intrusion. In the second step we propose an optimal method for leader election by using trust value; and in the third step, finding the threshold value for notifying the victim node to launch its IDS once the probability of attack exceeds that value. In first and third step we apply Bayesian game theory. Our method due to using game theory, trust value and honest leader can effectively improve the network security, performance and reduce resource consumption.
Year
DOI
Venue
2010
10.1007/978-3-642-17604-3_8
Communications in Computer and Information Science
Keywords
Field
DocType
Mobile Ad hoc Network (MANET),Intrusion Detection System (IDS),Cluster leader,Trust value,Game theory
Resource consumption,Leader election,Mobile ad hoc network,Intrusion,Trust relationship,Computer security,Network security,Computer network,Game theory,Engineering,Bayesian game
Conference
Volume
ISSN
Citations 
120
1865-0929
2
PageRank 
References 
Authors
0.35
12
3
Name
Order
Citations
PageRank
Marjan Kuchaki Rafsanjani17616.18
Laya Aliahmadipour231.38
Mohammad M. Javidi37112.98