Abstract
Secure communication is one of the main challenges of ad hoc Vehicle Networks (VANET). Intrusion detection of malicious nodes is one of the solutions to secure communication in VANETs using hybrid architecture (V2V and V2I). This article proposes an approach based on game theory, in particular the “Tit-for-Tat” (TfT) strategy as a suitable paradigm for human cooperation in order to detect malicious nodes in passive and active attacks. This article analyzes the performance of the proposed approach and the “TfT” strategy contribution in VANET security.
Article PDF
Avoid common mistakes on your manuscript.
References
R. Abassi, VANET security and forensics: challenges and opportunities, Wiley WIREs Foren. Sci. 1 (2019), e1324.
H. Hasrouny, A.E. Samhat, C. Bassil, A. Laouiti, VANet security challenges and solutions: a survey, Vehicul. Commun. 7 (2017), 7–20.
W. Ahmed, M. Elhadef, Securing intelligent vehicular ad hoc networks: a survey, in: J. Park, V. Loia, G. Yi, Y. Sung (Eds.), Advances in Computer Science and Ubiquitous Computing, Springer Nature, Singapore, 2018, pp. 6–14.
V. Laxmi, C. Lal, M.S. Gaur, D. Mehta, JellyFish attack: analysis, detection and countermeasure in TCP-based MANET, J. Inform. Secur. Appl. 22 (2015), 99–112.
F. Sakiz, S. Sen, A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV, Ad Hoc Netw. 61 (2017), 33–50.
S.S. Manvi, S. Tangade, A survey on authentication schemes in VANETs for secured communication, Vehicul. Commun. 9 (2017), 19–30.
M.N. Mejri, J. Ben-Othman, GDVAN: a new greedy behavior attack detection algorithm for VANETs, IEEE Trans. Mobile Comput. 16 (2017), 759–771.
J. Kang, D. Lin, W. Jiang, E. Bertino, Highly efficient randomized authentication in VANETs, Perv. Mobile Comput. 44 (2018), 31–44.
C.A. Kerrache, A. Lakas, N. Lagraa, Detection of intelligent malicious and selfish nodes in VANET using threshold adaptive control, 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), IEEE, Ras Al Khaimah, UAE, 2016, pp. 1–4.
H. Hasrouny, C. Bassil, A.E. Samhat, A. Laouiti, Security risk analysis of a trust model for secure group leader-based communication in VANET, in: A. Laouiti, A. Qayyum, M. Mohamad Saad (Eds.), Vehicular Ad-Hoc Networks for Smart Cities, Springer, Singapore, 2017, pp. 71–83.
S.A. Soleymani, A.H. Abdullah, M. Zareei, M.H. Anisi, C. Vargas-Rosales, M.K. Khan, et al., A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing, IEEE Access 5 (2017), 15619–15629.
T.N.D. Pham, C.K. Yeo, Adaptive trust and privacy management framework for vehicular networks, Vehicul. Commun. 13 (2018), 1–12.
S. Ahmed, M. Ur Rehman, A. Ishtiaq, S. Khan, A. Ali, S. Begum, VANSec: attack-resistant VANET security algorithm in terms of trust computation error and normalized routing overhead, J. Sens. 2018 (2018), 6576841.
A. Kchaou, R. Abassi, S. Guemara, Toward a distributed trust management scheme for VANET, Proceedings of the 13th International Conference on Availability, Reliability and Security, Association for Computing Machinery, Hamburg, Germany, 2018, pp. 1–6.
T. Bonaci, L. Bushnell, Node capture games: a game theoretic approach to modeling and mitigating node capture attacks, in: J.S. Baras, J. Katz, E. Altman (Eds.), Decision and Game Theory for Security, Second International Conference on Decision and Game Theory for Security (GameSEC), Springer, Berlin, Heidelberg, 2011, pp. 44–55.
C.A. Kamhouna, N. Pissinou, K. Makki, Game theoretic modeling and evolution of trust in autonomous multi-hop networks: application to network security and privacy, 2011 IEEE International Conference on Communications (ICC), IEEE, Kyoto, Japan, 2011, pp. 1–6.
A.T. Ab Ghani, K. Tanaka, Networks games with and without synchroneity, in: J.S. Baras, J. Katz, E. Altman (Eds.), Decision and Game Theory for Security, Second International Conference on Decision and Game Theory for Security (GameSEC), Springer, Berlin, Heidelberg, 2011, pp. 87–103.
A. Clark, R. Poovendran, Maximizing influence in competitive environments: a game-theoretic approach, in: J.S. Baras, J. Katz, E. Altman (Eds.), Decision and Game Theory for Security, Second International Conference on Decision and Game Theory for Security (GameSEC), Springer, Berlin, Heidelberg, 2011, pp. 151–162.
P.H. Chia, J. Chuang, Colonel blotto in the phishing war, in: J.S. Baras, J. Katz, E. Altman (Eds.), Decision and Game Theory for Security, Second International Conference on Decision and Game Theory for Security (GameSEC), Springer, Berlin, Heidelberg, 2011, pp. 201–218.
N. Kushwah, A. Sonker, Malicious node detection on vehicular ad-hoc network using Dempster Shafer theory for denial of services attack, 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN), IEEE, Tehri, India, 2016, pp. 432–436.
M.N. Mejri, N. Achir, M. Hamdi, A new security games based reaction algorithm against DOS attacks in VANETs, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), IEEE, Las Vegas, NV, USA, 2016, pp. 837–840.
S. Bahamou, D. El Ouadghiri, J.M. Bonnin, When game theory meets security and privacy related risk assessment of vehicular networks (VANET), J. Mobile Multimedia 12 (2017), 213–224.
M.M. Mehdi, I. Raza, S.A. Hussain, A game theory based trust model for Vehicular Ad hoc Networks (VANETs), Comput. Netw. 121 (2017), 152–172.
A. Ilavendhan, K. Saruladha, Comparative study of game theoretic approaches to mitigate network layer attacks in VANETs, ICT Exp. 4 (2018), 46–50.
A. Rapoport, D.A. Seale, A.M. Colman, Is tit-for-tat the answer? On the conclusions drawn from Axelrod’s tournaments, PLoS One 10 (2015), e0134128.
K. Madhumidha, N. Vijayarangan, K. Padmanabhan, B. Satish, Probabilistic tit-for-tat strategy versus Nash equilibrium for infinitely repeated games with industrial applications, J. Game Theory 6 (2017), 53–61.
E. Rasmusen, Games and information: an introduction to game theory, fourth ed., Basil Blackwell, 2005.
A.R. Karlin, Y. Peres, Game theory, Alive, Licensed to AMS (ISBN-13: 978-1470419820), 2016.
K. Fall, K. Varadhan, The NS manual, A Collaboration between researchers at UC Berkeley, LBL, USC/ISI, and Xerox PARC, 5373 (2011).
M. Behrisch, L. Bieker, J. Erdmann, D. Krajzewicz, SUMO - simulation of urban mobility, The Third International Conference on Advances in System Simulation, IARIA, Barcelona, Spain, 2011.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
This is an open access article distributed under the CC BY-NC 4.0 license (http://creativecommons.org/licenses/by-nc/4.0/).
About this article
Cite this article
Mostefa, F.Z., Maaza, Z.M. & Duvallet, C. Secure Communications by Tit-for-Tat Strategy in Vehicular Networks. Int J Netw Distrib Comput 8, 214–221 (2020). https://doi.org/10.2991/ijndc.k.200925.001
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.2991/ijndc.k.200925.001