Skip to main content

Risk Assessment of Ad Hoc Based on Game Theory

  • Conference paper
  • First Online:
International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019 (ATCI 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1017))

Abstract

Based on the analysis of the node weight of Ad hoc network, the difficulty of detecting attack and the harm degree of attack, we propose an attack-and-defence game model for security assessment in Ad hoc networks. Through the quantification of the attack and defense strategy, we solve the Nash equilibrium solution and finally get the risk assessment of the network. Finally, we deployed an ad hoc experiment and used the model to explore the interaction between an attacker and a defender. Experimental results showed that the model and algorithm were feasible and effective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sanyal, S., Abraham, A., Gada, D., Gogri, R.: Security Scheme for Distributed DoS in Mobile Ad hoc Networks (2012)

    Google Scholar 

  2. Jin, S.: A summary of network security situational Awareness research. Network security technology and application (2014)

    Google Scholar 

  3. Liu, J., Liu, J., Lu, Y., Yang, B.: Application of game theory in network security situational awareness. Comput. Appl. 37(S2), 48–51 (2017)

    Google Scholar 

  4. Shen, S.: Research on some key problems of wireless sensor network security based on game theory. Donghua University (2013)

    Google Scholar 

  5. Wang, W., Chatterjee, M., Kwiat, K.: Coexistence with malicious nodes: a game theoretic approach. In: International Conference on Game Theory for Networks, GameNets 2009 (2009)

    Google Scholar 

  6. Tang, J.: Node incentive strategy based on Bayesian game in Ad hoc network [J/OL]. Comput. Eng. (2018)

    Google Scholar 

  7. Yan, H.: Research on dynamic intrusion response based on repetitive game theory in Ad hoc network. Donghua University (2011)

    Google Scholar 

  8. Sun, J.: Evaluation and analysis of ad hoc network security based on stochastic game network. Donghua University (2014)

    Google Scholar 

  9. Mehta, A., Saini, R.: A review paper on security in mobile adhoc network. Int. J. Adv. Res. Sci. Eng. 4 (2015)

    Google Scholar 

  10. Hage, P., Harary, F.: Eccentricity and centrality in networks. Soc. Netw. 17(1), 57–63 (1995)

    Article  Google Scholar 

  11. Shaoren, Z., Haitao, W., Zhifeng, Z.: Ad Hoc network Technology. People’s Post and Telecommunications Press, Beijing (2005)

    Google Scholar 

  12. Li, D., Chang, L., Xue, W., Li, Y.: Simulation research on stability control of network nodes. Comput. Simul. (2017)

    Google Scholar 

  13. Fudenberg, D., Tirole, J.: Game Theory. Renmin University of the People Press, Beijing (2015)

    MATH  Google Scholar 

  14. Du, S., Li, X., Du, J., Zhu, H.: An attack-and-defence game for security assessment in vehicular ad hoc networks. Springer, Heidelberg (2012)

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by National Natural Science Foundation of the state (Foundation No. 61602505), and Intra-military scientific research projects (project number: 130105197302074514).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhaoyi Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gao, X., Chen, Z. (2020). Risk Assessment of Ad Hoc Based on Game Theory. In: Abawajy, J., Choo, KK., Islam, R., Xu, Z., Atiquzzaman, M. (eds) International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019. ATCI 2019. Advances in Intelligent Systems and Computing, vol 1017. Springer, Cham. https://doi.org/10.1007/978-3-030-25128-4_34

Download citation

Publish with us

Policies and ethics