Comprehensive Survey on Game Theory Based Intrusion Detection System for Mobile Adhoc Networks

نویسندگان

  • B. Paramasivan
  • K. Mohaideen Pitchai
  • Sunita Sahu
  • Shishir K. Shandilya
  • Qishi Wu
  • Hadi Otrok
  • Mourad Debbabi
  • Chadi Assi
  • Prabir Bhattacharya
  • Jung-Min Park
  • Noman Mohammed
  • Lingyu Wang
چکیده

Mobile Adhoc Networks (MANET's) are autonomous distributed systems that comprise a number of mobile nodes connected by wireless links, forming arbitrary time varying wireless network topologies. Security in mobile ad-hoc networks are particularly difficult to achieve, notably because of the limited physical protection to each of the nodes, the sporadic nature of connectivity, the absence of a certification authority, and the lack of a centralized monitoring or management unit, so it is not practically possible to prevent the network all the time. But Intrusion Detection System (IDS) can act as a frontier security area in relation to mobile ad hoc networks. In this paper the existing intrusion detection methods in mobile ad hoc network that uses game theory concepts are critically analyzed and their advantages, limitations over the other models are also explained. This paper can give a very good exposure to researchers who are willing to develop new algorithms for mobile adhoc network security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Survey of Intrusion Detection and Prevention System in MANETs based on Data Gathering Techniques

Intrusion Detection and Prevention System is a must for mobile ad networks as the security mechanisms like encryption, authentication and firewall systems are not able to completely secure the nodes and their communication. In this paper, we aim to study the various intrusion detection and prevention systems that were proposed for Mobile Adhoc Networks (MANETs) and compare the recent techniques...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011