ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET
Game Theory is a useful tool for exploring the issues concerning Mobile Ad-Hoc Network (or MANET) security. In MANETs, coordination among the portable nodes is more significant, which encompasses their vulnerability challenges to several security assaults and the inability to run securely, when...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
Blue Eyes Intelligence Engineering & Sciences Publication
2019
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/72187/ http://irep.iium.edu.my/72187/ http://irep.iium.edu.my/72187/1/F3833048619.pdf http://irep.iium.edu.my/72187/7/72187_International%20Journal%20of%20Soft%20Computing%20and%20Engineering_scopus.pdf |
Summary: | Game Theory is a useful tool for exploring the issues
concerning Mobile Ad-Hoc Network (or MANET) security. In
MANETs, coordination among the portable nodes is more
significant, which encompasses their vulnerability challenges to
several security assaults and the inability to run securely, when
storing its resources and manage secure routing between the
nodes. Hence, it is imperative to design an efficient routing
protocol to secure all nodes from unknown behaviors. In the
current research study, the game-theory approach is utilized for
analytical purpose and addresses the security problems in
MANETs. The game-theoretic approach is mainly adopted to find
the malicious activities in the networks. In the proposed work, a
Bayesian-Signaling game model is proposed which analyses the
behavior of both regular/normal and malicious nodes. The game
model proposed also provides the finest actions of autonomous
tactics for every node. A Bayesian-Equilibrium (BE) offers the
best solution for games to resolve the incomplete information by
joining strategies and players payoff which form an equilibrium.
By exploiting the BE mechanism, the system can detect the
behavior of regular as well as malicious nodes. Therefore,
Efficient ComputationalModelling based on Game Theory or
ECM-GT methodology will reduce the utility of malicious nodes
and increase the utility of regular nodes. Also, it stimulates the
best co-operation among the nodes by exploiting the reputation
system. On comparing our results with the existing systems, it was
found that the proposed algorithm performed better in the
detection of malicious nodes, throughput, false positive rate and
detection of attacks. |
---|