A Game Theory Approach for Malicious Node Detection in MANETs

نویسندگان

  • Yaser Taheri
  • Hossein Gharaee Garakani
  • Naser MohammadZadeh
چکیده

One of the main features of nodes in mobile ad hoc networks (MANETs) is their cooperation with neighbors to propagate data. Misusing this feature, malicious nodes cooperate with normal nodes to disrupt network operation and reduce its efficiency. These nodes attack other network nodes and prevent being detected by other nodes through using the mobility characteristic of nodes in MANETs. One of the effective ways to detect malicious nodes is using game theory. Focusing on this issue, in this paper, an approach is presented for malicious node detection using Games Theory. Data exchange between two nodes forms a game, and the history of the successful and unsuccessful sending/receiving of data, is stored to be used for future decisions. Malicious nodes are detected by the game components, sent and received data as well as information that have been stored in different stages. The experimental results indicate that if the density of malicious nodes approximately reaches 20%, and the game is repeated more than four times between neighboring nodes, the proposed approach raises the malicious node detection rate to 91%. However, if the density of malicious nodes is more than 30%, the algorithm can detect more than 87% of them after being repeated six times.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Overview of Game Theoretic Approach to Intrusion Detection System in MANETs

Mobile ad hoc networks (MANETs) are a collection of mobile nodes that communicates over wireless media. Performance of MANET depends on the cooperative participation of nodes in packet forwarding. During packet forwarding from source to destination, it takes help of middle hop depending on the distance. Middle hops play different role in different times. Nodes in MANETs suffer from limited reso...

متن کامل

BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...

متن کامل

A two-phase wormhole attack detection scheme in MANETs

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...

متن کامل

AN EFFICIENT CROSS LAYER APPROACH FOR MALICIOUS NODE DETECTION IN MANETs

This paper presents a novel approach for Detecting malicious Node in MANETs. MANET is a collection of mobile nodes equipped with both a wireless transmitter and a receiver that communicate with each other via bidirectional wireless links either directly or indirectly. The main objective is to prevent MANETs from malicious node by using cross layer approach. Also we use encryption and decryption...

متن کامل

Game theory approaches for improving intrusion detection in MANETs

Mobile Ad Hoc Networks (MANETs) are wireless networks in which the mobile nodes exchange information without the help of any predefined infrastructure. In such networks also called spontaneous networks, the nodes collaborate to provide the basic network services. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions. One of th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Inf. Sci. Eng.

دوره 32  شماره 

صفحات  -

تاریخ انتشار 2016