Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach

Inspite of wide range of exploration towards the mitigation techniques for malicious nodes in past few years, the effective solution for addressing the behavioral patterns of malicious nodes are still largely un-found. One of the most challenging dynamics related to this issue is an effective visual...

Full description

Bibliographic Details
Main Authors: Olanrewaju, Rashidah Funke, Khan, Burhan ul Islam, Mir, Roohie Naaz, Shah, Asadullah,
Format: Article
Language:English
Published: Open Science 2015
Subjects:
Online Access:http://irep.iium.edu.my/42400/
http://irep.iium.edu.my/42400/
http://irep.iium.edu.my/42400/1/burhan-paper2015.pdf
id iium-42400
recordtype eprints
spelling iium-424002016-04-29T16:48:04Z http://irep.iium.edu.my/42400/ Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach Olanrewaju, Rashidah Funke Khan, Burhan ul Islam Mir, Roohie Naaz Shah, Asadullah , , T10.5 Communication of technical information Inspite of wide range of exploration towards the mitigation techniques for malicious nodes in past few years, the effective solution for addressing the behavioral patterns of malicious nodes are still largely un-found. One of the most challenging dynamics related to this issue is an effective visualization of malicious nodes will never adopt any strategies in which has fairer chances of getting detected, hence, they will perform much confused behavior based on which it is almost difficult to identify whether it is regular node or malicious node. The current paper accentuates the potentials of game theory considering mutli-attacker collusion as the new enhancement that can effectively represent the various unpredictable actions of node cooperation, node declination, node attacks, as well as node reporting that can model the tactical profiling of various mobile nodes. Open Science 2015-03 Article PeerReviewed application/pdf en http://irep.iium.edu.my/42400/1/burhan-paper2015.pdf Olanrewaju, Rashidah Funke and Khan, Burhan ul Islam and Mir, Roohie Naaz and Shah, Asadullah and UNSPECIFIED and UNSPECIFIED (2015) Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach. American Journal of Computer Science and Engineering, 2 (3). pp. 10-19. http://www.openscienceonline.com/journal/ajcse
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic T10.5 Communication of technical information
spellingShingle T10.5 Communication of technical information
Olanrewaju, Rashidah Funke
Khan, Burhan ul Islam
Mir, Roohie Naaz
Shah, Asadullah
,
,
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
description Inspite of wide range of exploration towards the mitigation techniques for malicious nodes in past few years, the effective solution for addressing the behavioral patterns of malicious nodes are still largely un-found. One of the most challenging dynamics related to this issue is an effective visualization of malicious nodes will never adopt any strategies in which has fairer chances of getting detected, hence, they will perform much confused behavior based on which it is almost difficult to identify whether it is regular node or malicious node. The current paper accentuates the potentials of game theory considering mutli-attacker collusion as the new enhancement that can effectively represent the various unpredictable actions of node cooperation, node declination, node attacks, as well as node reporting that can model the tactical profiling of various mobile nodes.
format Article
author Olanrewaju, Rashidah Funke
Khan, Burhan ul Islam
Mir, Roohie Naaz
Shah, Asadullah
,
,
author_facet Olanrewaju, Rashidah Funke
Khan, Burhan ul Islam
Mir, Roohie Naaz
Shah, Asadullah
,
,
author_sort Olanrewaju, Rashidah Funke
title Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
title_short Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
title_full Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
title_fullStr Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
title_full_unstemmed Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
title_sort behaviour visualization for malicious-attacker node collusion in manet based on probabilistic approach
publisher Open Science
publishDate 2015
url http://irep.iium.edu.my/42400/
http://irep.iium.edu.my/42400/
http://irep.iium.edu.my/42400/1/burhan-paper2015.pdf
first_indexed 2023-09-18T21:00:26Z
last_indexed 2023-09-18T21:00:26Z
_version_ 1777410587185119232