Skip to main content

Modeling Attacks on MANET Using an Incomplete Repeated Bayesian Game

  • Conference paper
Intelligent Systems'2014

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 323))

  • 4034 Accesses

Abstract

Nowadays, individuals, as well as corporations, use the internet on a daily basis to send and receive emails, browse the internet, perform financial transactions, etc…However, this dependence comes with the huge risk of communicating over a network that has been compromised. Network administrators are constantly faced with new and improved security attacks that might result in significant losses. Only recently have game theoretic approaches found their way into the area of network security. In this paper we discuss the different types of security attacks while focusing on a general attack that resembles attacks on mobile ad hoc networks or MANETs. We model the attack as a Bayesian repetitive game with incomplete information between a malicious node and a normal node. We study the Nash equilibria of the game, and describe several punishment strategies. Finally, we show the results of our simulations where an equilibrium state is always reached and the average profit of normal nodes always significantly exceeds that of malicious nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. IBM. An information resource for data breach prevention and response. ibm.com, http://www-935.ibm.com/services/us/en/it-services/data-breach/data-breach-statistics.html (accessed: November 13, 2013)

  2. ZDNet. Android app malware rates jump 40 percent, zdnet.com, http://www.zdnet.com/android-app-malware-rates-jump-40-percent-7000019093/ (accessed: November 13, 2013)

  3. readwrite. Google Play Hits One Million Android Apps, readwrite.com, http://readwrite.com/2013/07/24/google-play-hits-one-million-android-apps#awesm=~onaP99fjV8C2eD (accessed: November 12, 2013)

  4. Karaa, H., Lau, J.Y.: Game Theory Applications in Network Reliability. In: Proc. Communications, 23rd Biennial Symposium, pp. 236–239 (2006)

    Google Scholar 

  5. Ileri, O., Mauand, S.-C., Mandayam, N.B.: Pricing for enabling forwarding in self-configuring ad hoc networks. IEEE Journal on Selected Areas in Communications 23(1), 151–162 (2005)

    Article  Google Scholar 

  6. Bandyopadhyay, S., Bandyopadhyay, S.: A game-theoretic analysis on the conditions of cooperation in a wireless ad hoc network. In: Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, pp. 54–58 (2005)

    Google Scholar 

  7. Carin, L., Cybenko, G., Hughes, J.: Quantitative evaluation of risk for investment efficient strategies in cybersecurity: The queries methodology. IEEE Computer (2008)

    Google Scholar 

  8. Liu, Y., Comaniciu, C., Man, H.: A Bayesian game approach for intrusion detection in wireless ad hoc networks. In: ACM International Conference Proceeding Series, vol. 199 (2006)

    Google Scholar 

  9. Lye, K., Wing, J.: Game strategies in network security. In: Proceedings of the Foundations of Computer Security (2002)

    Google Scholar 

  10. Nguyen, K.C., Alpcan, T., Basar, T.: Stochastic games for security in networks with interdependent nodes. In: Proc. of Intl. Conf. on Game Theory for Networks (GameNets) (2009)

    Google Scholar 

  11. Xiaolin, C., Xiaobin, T., Yong, Z., Hongsheng, X.: A Markov game theory-based risk assessment model for network information systems. In: International Conference on Computer Science and Software Engineering (2008)

    Google Scholar 

  12. Alpcan, T., Baser, T.: An intrusion detection game with limited observations. In: Proc. of the 12th Int. Symp. on Dynamic Games and Applications (2006)

    Google Scholar 

  13. Nguyen, K.C., Alpcan, T., Basar, T.: Security games with incomplete information. In: Proc. of IEEE Intl. Conf. on Communications (ICC) (2009)

    Google Scholar 

  14. Patcha, A., Park, J.: A game theoretic approach to modeling intrusion detection in mobile ad hoc networks. In: Proceedings of the 2004 IEEE Workshop on Information Assurance and Security (2004)

    Google Scholar 

  15. You, X., Shiyong, Z.: A kind of network security behavior model based on game theory. In: Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Farah Saab .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Saab, F., Awad, M. (2015). Modeling Attacks on MANET Using an Incomplete Repeated Bayesian Game. In: Filev, D., et al. Intelligent Systems'2014. Advances in Intelligent Systems and Computing, vol 323. Springer, Cham. https://doi.org/10.1007/978-3-319-11310-4_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11310-4_24

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11309-8

  • Online ISBN: 978-3-319-11310-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics