Abstract
Based on the analysis of the node weight of Ad hoc network, the difficulty of detecting attack and the harm degree of attack, we propose an attack-and-defence game model for security assessment in Ad hoc networks. Through the quantification of the attack and defense strategy, we solve the Nash equilibrium solution and finally get the risk assessment of the network. Finally, we deployed an ad hoc experiment and used the model to explore the interaction between an attacker and a defender. Experimental results showed that the model and algorithm were feasible and effective.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sanyal, S., Abraham, A., Gada, D., Gogri, R.: Security Scheme for Distributed DoS in Mobile Ad hoc Networks (2012)
Jin, S.: A summary of network security situational Awareness research. Network security technology and application (2014)
Liu, J., Liu, J., Lu, Y., Yang, B.: Application of game theory in network security situational awareness. Comput. Appl. 37(S2), 48–51 (2017)
Shen, S.: Research on some key problems of wireless sensor network security based on game theory. Donghua University (2013)
Wang, W., Chatterjee, M., Kwiat, K.: Coexistence with malicious nodes: a game theoretic approach. In: International Conference on Game Theory for Networks, GameNets 2009 (2009)
Tang, J.: Node incentive strategy based on Bayesian game in Ad hoc network [J/OL]. Comput. Eng. (2018)
Yan, H.: Research on dynamic intrusion response based on repetitive game theory in Ad hoc network. Donghua University (2011)
Sun, J.: Evaluation and analysis of ad hoc network security based on stochastic game network. Donghua University (2014)
Mehta, A., Saini, R.: A review paper on security in mobile adhoc network. Int. J. Adv. Res. Sci. Eng. 4 (2015)
Hage, P., Harary, F.: Eccentricity and centrality in networks. Soc. Netw. 17(1), 57–63 (1995)
Shaoren, Z., Haitao, W., Zhifeng, Z.: Ad Hoc network Technology. People’s Post and Telecommunications Press, Beijing (2005)
Li, D., Chang, L., Xue, W., Li, Y.: Simulation research on stability control of network nodes. Comput. Simul. (2017)
Fudenberg, D., Tirole, J.: Game Theory. Renmin University of the People Press, Beijing (2015)
Du, S., Li, X., Du, J., Zhu, H.: An attack-and-defence game for security assessment in vehicular ad hoc networks. Springer, Heidelberg (2012)
Acknowledgments
This research was supported by National Natural Science Foundation of the state (Foundation No. 61602505), and Intra-military scientific research projects (project number: 130105197302074514).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Gao, X., Chen, Z. (2020). Risk Assessment of Ad Hoc Based on Game Theory. In: Abawajy, J., Choo, KK., Islam, R., Xu, Z., Atiquzzaman, M. (eds) International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019. ATCI 2019. Advances in Intelligent Systems and Computing, vol 1017. Springer, Cham. https://doi.org/10.1007/978-3-030-25128-4_34
Download citation
DOI: https://doi.org/10.1007/978-3-030-25128-4_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-25127-7
Online ISBN: 978-3-030-25128-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)