Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
Inspite of wide range of exploration towards the mitigation techniques for malicious nodes in past few years, the effective solution for addressing the behavioral patterns of malicious nodes are still largely un-found. One of the most challenging dynamics related to this issue is an effective visual...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Open Science
2015
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/42400/ http://irep.iium.edu.my/42400/ http://irep.iium.edu.my/42400/1/burhan-paper2015.pdf |
id |
iium-42400 |
---|---|
recordtype |
eprints |
spelling |
iium-424002016-04-29T16:48:04Z http://irep.iium.edu.my/42400/ Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach Olanrewaju, Rashidah Funke Khan, Burhan ul Islam Mir, Roohie Naaz Shah, Asadullah , , T10.5 Communication of technical information Inspite of wide range of exploration towards the mitigation techniques for malicious nodes in past few years, the effective solution for addressing the behavioral patterns of malicious nodes are still largely un-found. One of the most challenging dynamics related to this issue is an effective visualization of malicious nodes will never adopt any strategies in which has fairer chances of getting detected, hence, they will perform much confused behavior based on which it is almost difficult to identify whether it is regular node or malicious node. The current paper accentuates the potentials of game theory considering mutli-attacker collusion as the new enhancement that can effectively represent the various unpredictable actions of node cooperation, node declination, node attacks, as well as node reporting that can model the tactical profiling of various mobile nodes. Open Science 2015-03 Article PeerReviewed application/pdf en http://irep.iium.edu.my/42400/1/burhan-paper2015.pdf Olanrewaju, Rashidah Funke and Khan, Burhan ul Islam and Mir, Roohie Naaz and Shah, Asadullah and UNSPECIFIED and UNSPECIFIED (2015) Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach. American Journal of Computer Science and Engineering, 2 (3). pp. 10-19. http://www.openscienceonline.com/journal/ajcse |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
T10.5 Communication of technical information |
spellingShingle |
T10.5 Communication of technical information Olanrewaju, Rashidah Funke Khan, Burhan ul Islam Mir, Roohie Naaz Shah, Asadullah , , Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach |
description |
Inspite of wide range of exploration towards the mitigation techniques for malicious nodes in past few years, the effective solution for addressing the behavioral patterns of malicious nodes are still largely un-found. One of the most challenging dynamics related to this issue is an effective visualization of malicious nodes will never adopt any strategies in which has fairer chances of getting detected, hence, they will perform much confused behavior based on which it is almost difficult to identify whether it is regular node or malicious node. The current paper accentuates the potentials of game theory considering mutli-attacker collusion as the new enhancement that can effectively represent the various unpredictable actions of node cooperation, node declination, node attacks, as well as node reporting that can model the tactical profiling of various mobile nodes. |
format |
Article |
author |
Olanrewaju, Rashidah Funke Khan, Burhan ul Islam Mir, Roohie Naaz Shah, Asadullah , , |
author_facet |
Olanrewaju, Rashidah Funke Khan, Burhan ul Islam Mir, Roohie Naaz Shah, Asadullah , , |
author_sort |
Olanrewaju, Rashidah Funke |
title |
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach |
title_short |
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach |
title_full |
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach |
title_fullStr |
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach |
title_full_unstemmed |
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach |
title_sort |
behaviour visualization for malicious-attacker node collusion in manet based on probabilistic approach |
publisher |
Open Science |
publishDate |
2015 |
url |
http://irep.iium.edu.my/42400/ http://irep.iium.edu.my/42400/ http://irep.iium.edu.my/42400/1/burhan-paper2015.pdf |
first_indexed |
2023-09-18T21:00:26Z |
last_indexed |
2023-09-18T21:00:26Z |
_version_ |
1777410587185119232 |