Advertisement

Bayesian Signaling Game Based Efficient Security Model for MANETs

  • Rashidah Funke Olanrewaju
  • Burhan ul Islam KhanEmail author
  • Farhat Anwar
  • Roohie Naaz Mir
  • Mashkuri Yaacob
  • Tehseen Mehraj
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 70)

Abstract

Game Theory acts as a suitable tool offering promising solutions to security-related concerns in Mobile Ad Hoc Networks (i.e., MANETs). In MANETs, security forms a prominent concern as it includes nodes which are usually portable and require significant coordination between them. Further, the absence of physical organisation makes such networks susceptible to security breaches, hindering secure routing and execution among nodes. Game Theory approach has been manipulated in the current study to achieve an analytical view while addressing the security concerns in MANETs. This paper offers a Bayesian-Signaling game model capable of analysing the behaviour associated with regular as well as malicious nodes. In the proposed model, the utility of normal nodes has been increased while reducing the utility linked to malicious nodes. Moreover, the system employs a reputation system capable of stimulating best cooperation between the nodes. The regular nodes record incessantly to examine their corresponding nodes’ behaviours by using the belief system of Bayes-rules. On its comparison with existing schemes, it was revealed that the presented algorithm provides better identification of malicious nodes and attacks while delivering improved throughput and reduced false positive rate.

Keywords

Bayesian signaling model Bayesian-Equilibrium game theory MANETs Secure routing protocol 

Notes

Acknowledgments

This work was supported by Ministry of Higher Education Malaysia (Kementerian Pendidikan Tinggi) under Research Initiative Grant Scheme number P-RIGS19-020-0020.

References

  1. 1.
    Cheng, X., Huang, X., Du, D.Z.: Ad Hoc Wireless Networking. Springer Science & Business Media, United States (2013)zbMATHGoogle Scholar
  2. 2.
    Ma, Y., Jia, Z.: Evolution and trends of broadband access technologies and fibre-wireless systems. In: Fiber-Wireless Convergence in Next-Generation Communication Networks, pp. 43–75. Springer, Cham (2017)Google Scholar
  3. 3.
    Huang, J.H., Wang, L.C., Chang, C.J.: Architectures and deployment strategies for wireless mesh networks. In: Wireless Mesh Networks, pp. 29–56. Springer, Boston (2008)Google Scholar
  4. 4.
    Olanrewaju, R.F., Khan, B.U.I., Anwar, F., Khan, A.R., Shaikh, F.A., Mir, M.S.: MANET–A cogitation of its design and security issues. Middle-East J. Sci. Res. 24(10), 3094–3107 (2016)Google Scholar
  5. 5.
    Ghosekar, P., Katkar, G., Ghorpade, P.: Mobile ad hoc networking: imperatives and challenges. IJCA (Special Issue on MANETs) 3, 153–158 (2010)Google Scholar
  6. 6.
    Hogie, L., Bouvry, P., Guinand, F.: An overview of MANETs simulation. Electron. Notes Theor. Comput. Sci. 150(1), 81–101 (2006)CrossRefGoogle Scholar
  7. 7.
    Suri, P.R., Rani, S.: Bluetooth network—the adhoc network concept. In: SoutheastCon. Proceedings, pp. 720–720. IEEE (2007)Google Scholar
  8. 8.
    Khan, B.U.I., Olanrewaju, R.F., Ali, N.A., Shah, A.: ElePSO: energy-aware elephant swarm optimization for mobile ad-hoc network. Pensee J. 76(5), 88–103 (2014)Google Scholar
  9. 9.
    Khan, B.U.I., Olanrewaju, R.F., Anwar, F., Shah, A.: Manifestation and mitigation of node misbehaviour in ad-hoc networks. Wulfenia J. 21(3), 462–470 (2014)Google Scholar
  10. 10.
    Khan, B.U.I., Olanrewaju, R.F., Habaebi, M.H.: Malicious behaviour of node and its significant security techniques in MANET—A review. Aust. J. Basic Appl. Sci. 7(12), 286–293 (2013)Google Scholar
  11. 11.
    Khan, B.U.I., Olanrewaju, R.F., Mir, R.N., Baba, A., Adebayo, B.W.: Strategic profiling for behaviour visualization of malicious node in MANETs using game theory. J. Theor. Appl. Inf. Technol. 77(1), 25–43 (2015)Google Scholar
  12. 12.
    Khan, B.U.I., Olanrewaju, R.F., Mir, R.N., Yusoff, S.H., Sanni, M.L.: Trust and resource-oriented communication scheme in mobile ad hoc networks. In: Proceedings of SAI Intelligent Systems Conference, pp. 414–430. Springer, Cham (2016)Google Scholar
  13. 13.
    Khan, B.U.I., Olanrewaju, R.F., Anwar, F., Najeeb, A.R., Yaacob, M.: A survey on MANETs: architecture, evolution, applications, security issues and solutions. Indonesian J. Electr. Eng. Comput. Sci. 12(2), 832–842 (2018)CrossRefGoogle Scholar
  14. 14.
    Olanrewaju, R.F., Khan, B.U.I., Najeeb, A.R., Zahir, K.N., Hussain, S.: Snort-based smart and swift intrusion detection system. Indian J. Sci. Technol. 11(4), 1–9 (2018)CrossRefGoogle Scholar
  15. 15.
    Rath, M., Panigrahi, C.R.: Prioritization of security measures at the junction of MANET and IoT. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, p. 127, ACM (2016)Google Scholar
  16. 16.
    Bellavista, P., Cardone, G., Corradi, A., Foschini, L.: Convergence of MANET and WSN in IoT urban scenarios. IEEE Sens. J. 13(10), 3558–3567 (2013)CrossRefGoogle Scholar
  17. 17.
    Olanrewaju, R.F., Khan, B.U.I., Mir, R.N., Shah, A.: Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach. Am. J. Comput. Sci. Eng. 2(3), 10–19 (2015)Google Scholar
  18. 18.
    Olanrewaju, R.F., Mechraoui, A.L., Khan, B.U.I.: Game theory probabilistic application to detect misbehaving nodes in ad-hoc networks. In: Proceedings of the 2nd IEEE International Conference on Intelligent Systems Engineering (ICISE), Kuala Lumpur, Malaysia, 20–21 Mar 2018Google Scholar
  19. 19.
    Tantubay, N., Gautam, D.R., Dhariwal, M.K.: A review of power conservation in wireless mobile ad-hoc network (MANET). Int. J. Comput. Sci. Issues (IJCSI) 8(4), 378–383 (2011)Google Scholar
  20. 20.
    Arulanandam, K., Parthasarathy, B.: A new energy level efficiency issues in MANET. Int. J. Rev. Comput. 1(5), 104–109 (2009)Google Scholar
  21. 21.
    Singh, G., Singh, J.: MANET: issues and behavior analysis of routing protocols. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(4), 219–227 (2012)Google Scholar
  22. 22.
    Parvez, J., Peer, M.A.: A comparative analysis of performance and QoS issues in MANETs. World Acad. Sci. Eng. Technol. 48, 937–948 (2010)Google Scholar
  23. 23.
    Khan, B.U.I., Olanrewaju, R.F., Baba, A.M., Mir, R.N., Lone, S.A.: DTASR: dual threshold-based authentication for secure routing in mobile ad-hoc network. World Eng. Appl. Sci. J. 7(2), 68–73 (2016)Google Scholar
  24. 24.
    Khan, B.U.I., Zulkurnain, N.F., Olanrewaju, R.F., Nissar, G., Baba, A.M., Lone, S.A.: JIR2TA: joint invocation of resource-based thresholding and trust-oriented authentication in mobile ad-hoc network. In: Proceedings of SAI Intelligent Systems Conference, pp. 689–701. Springer, Cham (2016)Google Scholar
  25. 25.
    Khan, B.U.I., Olanrewaju, R.F., Mattoo, M.U., Aziz, A.A., Lone, S.A.: Modeling malicious multi-attacker node collusion in MANETs via game theory. Middle-East J. Sci. Res. 25(3), 568–579 (2017)Google Scholar
  26. 26.
    Khan, B.U.I., Olanrewaju, R.F., Baba, A.M., Zulkarnain, N.F., Lone, S.A.: STCM: secured trust-based communication method in vulnerable mobile ad-hoc network. In: 9th International Conference on Robotic, Vision, Signal Processing and Power Applications, pp. 149–161, Springer, Singapore (2017)Google Scholar
  27. 27.
    Ilavendhan, A., Saruladha, K.: Comparative study of game theoretic approaches to mitigate network layer attacks in VANETs. ICT Express 4(1), 46–50 (2018)CrossRefGoogle Scholar
  28. 28.
    Javidi, M.M., Aliahmadipour, L.: Game theory approaches for improving intrusion detection in MANETs. Sci. Res. Essays 6(31), 6535–6539 (2011)Google Scholar
  29. 29.
    Janzadeh, H., Fayazbakhsh, K., Dehghan, M., Fallah, M.S.: A secure credit-based cooperation stimulating mechanism for MANETs using hash chains. Future Gener. Comput. Syst. 25(8), 926–934 (2009)CrossRefGoogle Scholar
  30. 30.
    Panaousis, E.A., Politis, C.: A game theoretic approach for securing AODV in emergency Mobile Ad Hoc Networks. In: IEEE 34th Conference on Local Computer Networks, LCN, pp. 985–992 (2009)Google Scholar
  31. 31.
    Wang, K., Wu, M.: Nash equilibrium of node cooperation based on metamodel for MANETs. J. Inf. Sci. Eng. 28(2), 317–333 (2012)MathSciNetGoogle Scholar
  32. 32.
    Li, F., Yang, Y., Wu, J.: Attack and flee: Game-THEORY-based analysis on interactions among nodes in MANETs. IEEE Trans. Syst. Man Cybern. Part B (Cybernetics) 40(3), 612–622 (2010)Google Scholar
  33. 33.
    Liu, Y., Comaniciu, C., Man, H.: A Bayesian game approach for intrusion detection in wireless ad hoc networks. In: Proceeding from the 2006 Workshop on Game Theory for Communications and Networks, p. 4, ACM (2006)Google Scholar
  34. 34.
    Marchang, N., Tripathi, R.: A game theoretical approach for efficient deployment of intrusion detection system in mobile ad hoc networks. In: International Conference on Advanced Computing and Communications, ADCOM, pp. 460–464, IEEE (2007)Google Scholar
  35. 35.
    Li, Z., Shen, H.: Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks. IEEE Trans. Mob. Comput. 11(8), 1287–1303 (2012)CrossRefGoogle Scholar
  36. 36.
    Manshaei, M.H., Zhu, Q., Alpcan, T., Bacşar, T., Hubaux, J.P.: Game theory meets network security and privacy. ACM Comput. Surv. (CSUR) 45(3), 1–35 (2013)CrossRefGoogle Scholar
  37. 37.
    Theodorakopoulos, G., Baras, J.S.: Malicious users in unstructured networks. In: 26th IEEE International Conference on Computer Communications, pp. 884–891, IEEE (2007)Google Scholar
  38. 38.
    Wang, B., Zhu, J., Liu, K.R.: Self-learning repeated game framework for distributed primary-prioritized dynamic spectrum access. In: 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 631–638, IEEE (2007)Google Scholar
  39. 39.
    Hamdi, M., Abie, H.: Game-based adaptive security in the Internet of things for eHealth. In: IEEE International Conference on Communications (ICC), pp. 920–925, IEEE (2014)Google Scholar
  40. 40.
    Abegunde, J., Xiao, H., Spring, J.: A dynamic game with adaptive strategies for IEEE 802.15. 4 and IoT. In: Trustcom/BigDataSE/ISPA, pp. 473–480, IEEE (2016)Google Scholar
  41. 41.
    La, V.H., Cavalli, A.R.: A misbehavior node detection algorithm for 6LoWPAN Wireless Sensor Networks. In: 36th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 49–54, IEEE (2016)Google Scholar
  42. 42.
    Das, D., Majumder, K., Dasgupta, A.: Selfish node detection and low-cost data transmission in MANET using game theory. Procedia Comput. Sci. 54, 92–101 (2015)CrossRefGoogle Scholar
  43. 43.
    Taheri, Y., Garakani, H.G., Mohammadzadeh, N.: A game theory approach for malicious node detection in MANETs. J. Inf. Sc. Eng. 32(3), 559–573 (2016)MathSciNetGoogle Scholar
  44. 44.
    Rajkumar, B., Narsimha, G.: Trust-based certificate revocation for secure routing in MANET. Procedia Comput. Sci. 92, 431–441 (2016)CrossRefGoogle Scholar
  45. 45.
    Sengathir, J., Manoharan, R.: Security algorithms for mitigating selfish and shared root node attacks in MANETs. Int. J. Comput. Netw. Inf. Secur. 5(10), 1–10 (2013)Google Scholar
  46. 46.
    Paramasiva, B., Pitchai, K.M.: Modeling intrusion detection in mobile ad hoc networks as a non-cooperative game. In: International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), pp. 300–306, IEEE (2013)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Rashidah Funke Olanrewaju
    • 1
  • Burhan ul Islam Khan
    • 1
    Email author
  • Farhat Anwar
    • 1
  • Roohie Naaz Mir
    • 2
  • Mashkuri Yaacob
    • 1
  • Tehseen Mehraj
    • 3
  1. 1.Department of ECEKulliyyah of Engineering, UIAMGombakMalaysia
  2. 2.Department of CSENational Institute of TechnologySrinagarIndia
  3. 3.Department of ECEIslamic University of Science and TechnologyPulwamaIndia

Personalised recommendations