Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020
Ubiquitous Computing and Internet of Things (IoT) are extremely popular in recent age and therefore imparting high level security mechanism is highly indispensable for such advanced technical systems. Game Theory is a useful tool for exploring the issues concerning Mobile Ad-Hoc Network (or MANET) s...
Main Authors: | , , |
---|---|
Format: | Monograph |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/73313/ http://irep.iium.edu.my/73313/1/PRIGS2019%20%20Final%20%20Report.pdf |
id |
iium-73313 |
---|---|
recordtype |
eprints |
spelling |
iium-733132020-01-09T12:34:10Z http://irep.iium.edu.my/73313/ Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020 Olanrewaju, Rashidah Funke Olanrewaju Anwar, Farhat Khan, Burhan Ul Islam T10.5 Communication of technical information Ubiquitous Computing and Internet of Things (IoT) are extremely popular in recent age and therefore imparting high level security mechanism is highly indispensable for such advanced technical systems. Game Theory is a useful tool for exploring the issues concerning Mobile Ad-Hoc Network (or MANET) security. In MANETs, coordination among the portable nodes is more significant, which encompasses their vulnerability challenges to several security assaults and the inability to run securely, when storing its resources and manage secure routing between the nodes. Furthermore, coordination among nodes during communication and working without control of any central manager truly ensembles them to be applied in IoT. Hence, it is imperative to design an efficient routing protocol to secure all nodes from unknown behaviors. In the current research study, the game-theory approach is utilized for analytical purpose and addresses the security problems in MANETs. The game-theoretic approach is mainly adopted to find the malicious activities in the networks. In the proposed work, a Bayesian-Signaling game model is proposed which analyses the behavior of both regular/normal and malicious nodes. The game model proposed also provides the finest actions of autonomous tactics for every node. A Bayesian-Equilibrium (BE) offers the best solution for games to resolve the incomplete information by joining strategies and players payoff which form an equilibrium. By exploiting the BE mechanism, the system can detect the behavior of regular as well as malicious nodes. Therefore, this Game Theoretic Approach for Exhaustive Tactical Modelling of Node Misbehavior in Adhoc Networking based IoT Paradigm will reduce the utility of malicious nodes and increase the utility of regular nodes. Also, it stimulates the best co-operation among the nodes by exploiting the reputation system. The framework tries to effectively represent the various unpredictable actions of node cooperation, node declination, node attacks as well as node reporting that can model the strategic profiling of various mobile nodes. Understanding the patterns and then deploying the algorithms in security products can reduce intrusion to a greater extent. On comparing our results with the existing systems, it was found that the proposed algorithm performed better in the detection of malicious nodes, throughput, false positive rate and detection of attacks. 2019 Monograph NonPeerReviewed application/pdf en http://irep.iium.edu.my/73313/1/PRIGS2019%20%20Final%20%20Report.pdf Olanrewaju, Rashidah Funke Olanrewaju and Anwar, Farhat and Khan, Burhan Ul Islam (2019) Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020. Research Report. UNSPECIFIED. (Unpublished) |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
T10.5 Communication of technical information |
spellingShingle |
T10.5 Communication of technical information Olanrewaju, Rashidah Funke Olanrewaju Anwar, Farhat Khan, Burhan Ul Islam Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020 |
description |
Ubiquitous Computing and Internet of Things (IoT) are extremely popular in recent age and therefore imparting high level security mechanism is highly indispensable for such advanced technical systems. Game Theory is a useful tool for exploring the issues concerning Mobile Ad-Hoc Network (or MANET) security. In MANETs, coordination among the portable nodes is more significant, which encompasses their vulnerability challenges to several security assaults and the inability to run securely, when storing its resources and manage secure routing between the nodes. Furthermore, coordination among nodes during communication and working without control of any central manager truly ensembles them to be applied in IoT. Hence, it is imperative to design an efficient routing protocol to secure all nodes from unknown behaviors. In the current research study, the game-theory approach is utilized for analytical purpose and addresses the security problems in MANETs. The game-theoretic approach is mainly adopted to find the malicious activities in the networks. In the proposed work, a Bayesian-Signaling game model is proposed which analyses the behavior of both regular/normal and malicious nodes. The game model proposed also provides the finest actions of autonomous tactics for every node. A Bayesian-Equilibrium (BE) offers the best solution for games to resolve the incomplete information by joining strategies and players payoff which form an equilibrium. By exploiting the BE mechanism, the system can detect the behavior of regular as well as malicious nodes. Therefore, this Game Theoretic Approach for Exhaustive Tactical Modelling of Node Misbehavior in Adhoc Networking based IoT Paradigm will reduce the utility of malicious nodes and increase the utility of regular nodes. Also, it stimulates the best co-operation among the nodes by exploiting the reputation system. The framework tries to effectively represent the various unpredictable actions of node cooperation, node declination, node attacks as well as node reporting that can model the strategic profiling of various mobile nodes. Understanding the patterns and then deploying the algorithms in security products can reduce intrusion to a greater extent. On comparing our results with the existing systems, it was found that the proposed algorithm performed better in the detection of malicious nodes, throughput, false positive rate and detection of attacks. |
format |
Monograph |
author |
Olanrewaju, Rashidah Funke Olanrewaju Anwar, Farhat Khan, Burhan Ul Islam |
author_facet |
Olanrewaju, Rashidah Funke Olanrewaju Anwar, Farhat Khan, Burhan Ul Islam |
author_sort |
Olanrewaju, Rashidah Funke Olanrewaju |
title |
Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020 |
title_short |
Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020 |
title_full |
Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020 |
title_fullStr |
Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020 |
title_full_unstemmed |
Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020 |
title_sort |
game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based iot paradigm/p-rigs18-020-0020 |
publishDate |
2019 |
url |
http://irep.iium.edu.my/73313/ http://irep.iium.edu.my/73313/1/PRIGS2019%20%20Final%20%20Report.pdf |
first_indexed |
2023-09-18T21:43:56Z |
last_indexed |
2023-09-18T21:43:56Z |
_version_ |
1777413323719966720 |