Bayesian signaling game based efficient security model for MANETs
Game Theory acts as a suitable tool offering promising solutions to security-related concerns in Mobile Ad Hoc Networks (i.e., MANETs). In MANETs, security forms a prominent concern as it includes nodes which are usually portable and require significant coordination between them. Further, the absenc...
Saved in:
Main Authors: | , , , , , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
Springer, Cham
2020
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/70885/13/70885_Bayesian%20signaling%20game%20based%20efficient.pdf http://irep.iium.edu.my/70885/7/70885_Bayesian%20signaling%20game%20based%20efficient%20security%20model%20for%20MANETs_scopus.pdf http://irep.iium.edu.my/70885/ https://link.springer.com/chapter/10.1007/978-3-030-12385-7_75 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Islam Antarabangsa Malaysia |
Language: | English English |
Summary: | Game Theory acts as a suitable tool offering promising solutions to security-related concerns in Mobile Ad Hoc Networks (i.e., MANETs). In MANETs, security forms a prominent concern as it includes nodes which are usually portable and require significant coordination between them. Further, the absence of physical organisation makes such networks susceptible to security breaches, hindering secure routing and execution among nodes. Game Theory approach has been manipulated in the current study to achieve an analytical view while addressing the security concerns in MANETs. This paper offers a Bayesian-Signaling game model capable of analysing the behaviour associated with regular as well as malicious nodes. In the proposed model, the utility of normal nodes has been increased while reducing the utility linked to malicious nodes. Moreover, the system employs a reputation system capable of stimulating best cooperation between the nodes. The regular nodes record incessantly to examine their corresponding nodes’ behaviours by using the belief system of Bayes-rules. On its comparison with existing schemes, it was revealed that the presented algorithm provides better identification of malicious nodes and attacks while delivering improved throughput and reduced false positive rate. |
---|