CFP last date
20 June 2024
Reseach Article

A Comprehensive Survey on Security Enhancement in Mobile Adhoc Networks using Game Theory Approaches

Published on December 2012 by R. Sujitha, M. Kaliappan, P. Subbulakshmi
EGovernance and Cloud Computing Services - 2012
Foundation of Computer Science USA
EGOV - Number 4
December 2012
Authors: R. Sujitha, M. Kaliappan, P. Subbulakshmi
3db8bc07-bcdb-465f-abe9-2b2b0d956be2

R. Sujitha, M. Kaliappan, P. Subbulakshmi . A Comprehensive Survey on Security Enhancement in Mobile Adhoc Networks using Game Theory Approaches. EGovernance and Cloud Computing Services - 2012. EGOV, 4 (December 2012), 18-21.

@article{
author = { R. Sujitha, M. Kaliappan, P. Subbulakshmi },
title = { A Comprehensive Survey on Security Enhancement in Mobile Adhoc Networks using Game Theory Approaches },
journal = { EGovernance and Cloud Computing Services - 2012 },
issue_date = { December 2012 },
volume = { EGOV },
number = { 4 },
month = { December },
year = { 2012 },
issn = 0975-8887,
pages = { 18-21 },
numpages = 4,
url = { /proceedings/egov/number4/9505-1034/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 EGovernance and Cloud Computing Services - 2012
%A R. Sujitha
%A M. Kaliappan
%A P. Subbulakshmi
%T A Comprehensive Survey on Security Enhancement in Mobile Adhoc Networks using Game Theory Approaches
%J EGovernance and Cloud Computing Services - 2012
%@ 0975-8887
%V EGOV
%N 4
%P 18-21
%D 2012
%I International Journal of Computer Applications
Abstract

Enhancing security in Mobile Adhoc Network is a challenging issue. Mobile adhoc networks (MANET) designed to operate in more impetuous and swiftly changing environment. Enhancing MANET security is entirely different from the conventional methods of establishing security. There are many approaches in enhancing security in MANET. This paper discuss some techniques for belief evaluation of mobile nodes in MANET. In addition, this paper discusses about leader election scheme for mobile nodes.

References
  1. Feng Li & Jie Wu ,"Attack and Flee:Game Theory Based Analysis on Interactions Among Nodes in MANETs", IEEE Transactions on Systems,MAN and Cybernetics,June 2010,Volume 40,No 3.
  2. Zhu ji,Wei Yu and K. J Ray Liu,"A Belief Evaluation Framework in Autonomous MANETs under Noisy and Imperfect Observation:Vulnerability Analysis and Cooperation Enforcement", IEEE Transactions on Mobile Computing,September 2010,Volume 9,No 9.
  3. Noman Mohammed, Hadi Otrok, Lingyu Wang," Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET", IEEE Transactions on Dependable and Secure Computing. Vol. 8, No 1, Jan 2011.
  4. S. Ng and W. Seah, "Game-theoretic model for collaborative protocols in selfish, tariff-free, multihop wireless networks," in Proc. IEEE INFOCOM, 2008.
  5. F. LI AND J. WU, "Mobility reduces uncertainty in MANETs," in Proc. IEEE INFOCOM, 2007.
  6. G. Theodorakopoulos and J. Baras, "Malicious users in unstructured networks," in Proc. IEEE INFOCOM, 2007, pp. 884–891.
  7. P. Nuggehalli, M. Sarkar, K. Kulkarni, and R. Rao, "A game-theoretic analysis of QoS in wireless MAC," in Proc. IEEE INFOCOM, 2008
  8. Y. Liu, C. Comaniciu, and H. Man, "A Bayesian game approach for intrusion detection in wireless ad hoc networks," in Proc. ACM GameNets, 2006
  9. M. Felegyhazi, J. Hubaux, and L. Buttyan, "Nash equilibria of packet forwarding strategies in wireless ad hoc networks," IEEE Trans. Mobile Comput. , vol. 5, no. 5, pp. 463–476, May 2006.
  10. P. Liu, W. Zang, and M. Yu, "Incentive-based modeling and inference of attacker intent, objectives and strategies," ACM Trans. Inf. Syst. Secur. ,vol. 8, no. 1, Feb. 2005.
  11. A. Blanc, Y. Liu, and A. Vahdat, "Designing incentives for peer-to-peer routing," in Proc. IEEE INFOCOM, 2005
  12. S. Bansal and M. Baker, "Observation-based cooperation enforcement in ad hoc networks," Stanford Univ. Press, Stanford, CA, Tech. 2003.
  13. S. Buchegger and J. Boudec, "A robust reputation system for P2P and mobile ad-hoc networks," in Proc. 2nd Workshop Econ. Peer-to-Peer Syst. , 2004.
  14. P. Michiardi and R. Molva, "CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," in Proc. Commun. Multimedia Secur. , 2002.
  15. S. Bansal and M. Baker, "Observation-based cooperation enforcement in ad hoc networks," Stanford Univ. Press, Stanford, CA, Tech. 2003
Index Terms

Computer Science
Information Sciences

Keywords

Bayesian Game Cooperative Game Dynamic Bayesian Game Mechanism Design Theory