Call for Paper - September 2022 Edition
IJCA solicits original research papers for the September 2022 Edition. Last date of manuscript submission is August 22, 2022. Read More

A Comprehensive Survey on Security Enhancement in Mobile Adhoc Networks using Game Theory Approaches

Print
PDF
IJCA Proceedings on EGovernance and Cloud Computing Services - 2012
© 2012 by IJCA Journal
EGOV - Number 4
Year of Publication: 2012
Authors:
R. Sujitha
M. Kaliappan
P. Subbulakshmi

R Sujitha, M Kaliappan and P Subbulakshmi. Article: A Comprehensive Survey on Security Enhancement in Mobile Adhoc Networks using Game Theory Approaches. IJCA Proceedings on EGovernance and Cloud Computing Services - 2012 EGOV(4):18-21, December 2012. Full text available. BibTeX

@article{key:article,
	author = {R. Sujitha and M. Kaliappan and P. Subbulakshmi},
	title = {Article: A Comprehensive Survey on Security Enhancement in Mobile Adhoc Networks using Game Theory Approaches},
	journal = {IJCA Proceedings on EGovernance and Cloud Computing Services - 2012},
	year = {2012},
	volume = {EGOV},
	number = {4},
	pages = {18-21},
	month = {December},
	note = {Full text available}
}

Abstract

Enhancing security in Mobile Adhoc Network is a challenging issue. Mobile adhoc networks (MANET) designed to operate in more impetuous and swiftly changing environment. Enhancing MANET security is entirely different from the conventional methods of establishing security. There are many approaches in enhancing security in MANET. This paper discuss some techniques for belief evaluation of mobile nodes in MANET. In addition, this paper discusses about leader election scheme for mobile nodes.

References

  • Feng Li & Jie Wu ,"Attack and Flee:Game Theory Based Analysis on Interactions Among Nodes in MANETs", IEEE Transactions on Systems,MAN and Cybernetics,June 2010,Volume 40,No 3.
  • Zhu ji,Wei Yu and K. J Ray Liu,"A Belief Evaluation Framework in Autonomous MANETs under Noisy and Imperfect Observation:Vulnerability Analysis and Cooperation Enforcement", IEEE Transactions on Mobile Computing,September 2010,Volume 9,No 9.
  • Noman Mohammed, Hadi Otrok, Lingyu Wang," Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET", IEEE Transactions on Dependable and Secure Computing. Vol. 8, No 1, Jan 2011.
  • S. Ng and W. Seah, "Game-theoretic model for collaborative protocols in selfish, tariff-free, multihop wireless networks," in Proc. IEEE INFOCOM, 2008.
  • F. LI AND J. WU, "Mobility reduces uncertainty in MANETs," in Proc. IEEE INFOCOM, 2007.
  • G. Theodorakopoulos and J. Baras, "Malicious users in unstructured networks," in Proc. IEEE INFOCOM, 2007, pp. 884–891.
  • P. Nuggehalli, M. Sarkar, K. Kulkarni, and R. Rao, "A game-theoretic analysis of QoS in wireless MAC," in Proc. IEEE INFOCOM, 2008
  • Y. Liu, C. Comaniciu, and H. Man, "A Bayesian game approach for intrusion detection in wireless ad hoc networks," in Proc. ACM GameNets, 2006
  • M. Felegyhazi, J. Hubaux, and L. Buttyan, "Nash equilibria of packet forwarding strategies in wireless ad hoc networks," IEEE Trans. Mobile Comput. , vol. 5, no. 5, pp. 463–476, May 2006.
  • P. Liu, W. Zang, and M. Yu, "Incentive-based modeling and inference of attacker intent, objectives and strategies," ACM Trans. Inf. Syst. Secur. ,vol. 8, no. 1, Feb. 2005.
  • A. Blanc, Y. Liu, and A. Vahdat, "Designing incentives for peer-to-peer routing," in Proc. IEEE INFOCOM, 2005
  • S. Bansal and M. Baker, "Observation-based cooperation enforcement in ad hoc networks," Stanford Univ. Press, Stanford, CA, Tech. 2003.
  • S. Buchegger and J. Boudec, "A robust reputation system for P2P and mobile ad-hoc networks," in Proc. 2nd Workshop Econ. Peer-to-Peer Syst. , 2004.
  • P. Michiardi and R. Molva, "CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," in Proc. Commun. Multimedia Secur. , 2002.
  • S. Bansal and M. Baker, "Observation-based cooperation enforcement in ad hoc networks," Stanford Univ. Press, Stanford, CA, Tech. 2003