Nash Equilibrium and Marcov Chains to Enhance Game Theoretic Approach for Vanet Security
Increased reliance on the Internet has made information and communication systems more vulnerable to security attacks in VANET. Instead of designing a defense against an attack, Game Theory attempts to design a defense against a sophisticated attacker who plans in anticipation of a complex defense in VANET. In addition, Game Theory can model issues of trust, incentives, and externalities that arise in security systems. This paper presents a Game theoretic potential for VANET security. The new technique termed NE (Nash Equilibrium) with Markov chains has been computed based on the game model, for VANET security. In this paper, Markov chains (MC) are used to choose the appropriate model for a given security problem in VANET and we have examined this new approach to extend the basic ideas of using game theory in VANET to predict transition rates for enhancing the security. The experimental evaluation will show that the Game theoretic approach of security measures for VANET using NE and MC perform better.
KeywordsVANET Nash Equilibrium Markov Chain
Unable to display preview. Download preview PDF.
- 1.Wagan, A.A., Mughal, B.M., Hasbullah, H.: VANET Security Framework for Trusted Grouping using TPM Hardware. In: 2010 Second International Conference on Communication Software and Networks (2010)Google Scholar
- 2.Moayedi, B.Z., Azgomi, M.A.: A Game Theoretic Approach for Quantitative Evaluation of Security by Considering Hackers with Diverse Behaviors. In: 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (2009)Google Scholar
- 3.Alpcan, T., Buchegger, S.: Security Games for Vehicular Networks. IEEE Transactions on Mobile Computing 10 (2011)Google Scholar
- 4.Grossklags, J., Christin, N., Chuang, J.: Secure or Insure? A Game-Theoretic Analysis of Information Security Games. In: Proc. 17th Int’l Conf. World Wide Web (WWW 2008, pp. 209–218 (2008)Google Scholar
- 5.Grossklags, J., Christin, N., Chuang, J.: Predicted and Observed User Behavior in the Weakest-Link Security Game. In: Proc. First Conf. Usability, Psychology, and Security (UPSEC 2008), pp. 1–6 (2008)Google Scholar
- 6.Do, Y., Buchegger, S., Alpcan, T., Hubaux, J.-P.: Centrality Analysis in Vehicular Ad-Hoc Networks. technical report, EPFL/T-Labs (2008)Google Scholar
- 7.Wagan, A.A., Mughal, B.M., Hasbullah, H.: VANET Security Framework for Trusted Grouping Using TPM Hardware. In: Second International Conference on Communication Software and Networks, ICCSN 2010, March 25 (2010)Google Scholar
- 8.Samara, G., Al-Salihy, W.A.H., Sures, R.: Security issues and challenges of Vehicular Ad Hoc Networks (VANET). In: 2010 4th International Conference on New Trends in Information Science and Service Science (NISS), June 17 (2010)Google Scholar
- 9.Mehraeen, S., Dierks, T., Jagannathan, S., Crow, M.L.: Zero-sum two-player game theoretic formulation of affine nonlinear discrete-time systems using neural networks. In: The 2010 International Joint Conference on Neural Networks (IJCNN), October 14 (2010)Google Scholar