Game theory analysis and modeling of sophisticated multi-collusion attack in MANETs

Khan, Burhan Ul Islam and Anwar, Farhat and Olanrewaju, Rashidah F. and Mat Kiah, Miss Laiha and Mir, Roohie N. (2021) Game theory analysis and modeling of sophisticated multi-collusion attack in MANETs. IEEE Access, 9. pp. 61778-61792. ISSN 2169-3536, DOI

Full text not available from this repository.


Mobile Adhoc Network (MANET) has been a core topic of research since the last decade. Currently, this form of networking paradigm is increasingly being construed as an integral part of upcoming urban applications of Internet-of-Things (IoT), consisting of massive connectivity of diverse types of nodes. There is a significant barrier to the applicability of existing routing approaches in conventional MANETs when integrated with IoT. This routing mismatch can lead to security risks for the MANET-based application tied with the IoT platform. This paper examines a pragmatic scenario as a test case wherein the mobile nodes must exchange multimedia signals for supporting real-time streaming applications. There exist two essential security requirements viz. i) securing the data packet and ii) understanding the unpredictable behavior of the attacker. The current study considers sophistication on the part of attacker nodes. They are aware of each other's identity and thereby collude to conduct lethal attacks, which is rarely reflected in existing security modeling statistics. This research harnesses the potential modeling aspect of game theory to model the multiple-collusion attacker scenario. It contributes towards i) modeling strategies of regular/malicious nodes and ii) applying optimization principle using novel auxiliary information to formulate the optimal strategies. The model advances each regular node's capability to carry out precise computation about the opponent player's strategy prediction, i.e., malicious node. The simulation outcome of the proposed mathematical model in MATLAB ascertains that it outperforms the game theory's baseline approach.

Item Type: Article
Uncontrolled Keywords: Ad hoc networks; Mobile computing; Security; Games; Streaming media; Routing; Computational modeling; Colluder; Game theory; Mobile adhoc network; Multi-collusion attacker; Multistage game; Secure routing
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
T Technology > TA Engineering (General). Civil engineering (General)
Divisions: Faculty of Computer Science & Information Technology > Department of Computer System & Technology
Depositing User: Ms Zaharah Ramly
Date Deposited: 20 Jun 2022 06:50
Last Modified: 20 Jun 2022 06:50

Actions (login required)

View Item View Item