We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Comprehensive Survey on Game Theory Based Intrusion Detection System for Mobile Adhoc Networks

Published on December 2011 by Dr B. Paramasivan, K. Mohaideen Pitchai
Network Security and Cryptography
Foundation of Computer Science USA
NSC - Number 5
December 2011
Authors: Dr B. Paramasivan, K. Mohaideen Pitchai
be0665f2-7942-4d2c-9a94-768d32f4a2ff

Dr B. Paramasivan, K. Mohaideen Pitchai . Comprehensive Survey on Game Theory Based Intrusion Detection System for Mobile Adhoc Networks. Network Security and Cryptography. NSC, 5 (December 2011), 23-29.

@article{
author = { Dr B. Paramasivan, K. Mohaideen Pitchai },
title = { Comprehensive Survey on Game Theory Based Intrusion Detection System for Mobile Adhoc Networks },
journal = { Network Security and Cryptography },
issue_date = { December 2011 },
volume = { NSC },
number = { 5 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 23-29 },
numpages = 7,
url = { /specialissues/nsc/number5/4354-spe055t/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Network Security and Cryptography
%A Dr B. Paramasivan
%A K. Mohaideen Pitchai
%T Comprehensive Survey on Game Theory Based Intrusion Detection System for Mobile Adhoc Networks
%J Network Security and Cryptography
%@ 0975-8887
%V NSC
%N 5
%P 23-29
%D 2011
%I International Journal of Computer Applications
Abstract

Mobile Adhoc Networks (MANET's) are autonomous distributed systems that comprise a number of mobile nodes connected by wireless links, forming arbitrary time varying wireless network topologies. Security in mobile ad-hoc networks are particularly difficult to achieve, notably because of the limited physical protection to each of the nodes, the sporadic nature of connectivity, the absence of a certification authority, and the lack of a centralized monitoring or management unit, so it is not practically possible to prevent the network all the time. But Intrusion Detection System (IDS) can act as a frontier security area in relation to mobile ad hoc networks. In this paper the existing intrusion detection methods in mobile ad hoc network that uses game theory concepts are critically analyzed and their advantages, limitations over the other models are also explained. This paper can give a very good exposure to researchers who are willing to develop new algorithms for mobile adhoc network security.

References
  1. Sunita Sahu & Shishir K. Shandilya “A Comprehensive Survey on Intrusion Detection in MANET” International Journal of Information Technology and Knowledge Management, July-December 2010, Volume 2, No. 2, pp. 305-31
  2. Prof.A.K.Gulve, D.G.Vyawahar “Survey On Intrusion Detection System” International Journal of Computer Science and Applications Vol. 4, No. 1, April / May 2011.
  3. Roy. S, Ellis. C, Shiva. S, Dasgupta. D, Shandilya. V, Qishi Wu “A Survey of Game Theory as Applied to Network Security” System Sciences (HICSS), 2010 43rd Hawaii International Conference 11 March 2010.
  4. D. Fudenberg and J. Tirole, Game Theory. Cambridge, MA: MIT Press, 1991
  5. Hadi Otrok, Mourad Debbabi, Chadi Assi and Prabir Bhattacharya “A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks” 27th International IEEE Conference on Distributed Computing Systems Workshop (ICDCSW'07) 2007.
  6. A. Agah, S. Das, and K. Basu, “Intrusion Detection in Sensor Networks: A Non-cooperative Game Approach”, Proc. 3rd IEEE International Symposium on Network Computing and Applications, IEEE press, 2004.
  7. Animesh Patcha and Jung-Min Park (Corresponding author: Animesh Patcha) “A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks” International Journal of Network Security, Vol.2, No.2, PP.131–137, Mar. 2006
  8. S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile Ad hoc networks,” in Proceedings of the 6th annual international conference on Mobile computing and networking (ACM MobiCom 2000: ), pp. 255–265, New York, NY, USA, 2000.
  9. Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad-Hoc Networks”, Proc. MOBICOM 2000, Boston, ACM press, pp: 275-283, 2000.
  10. Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya. “A game theoretic intrusion detection model for mobile ad hoc networks” 2007 Elsevier B.V
  11. V. Srinivasan, P. Nuggehalli, C.F. Chiasserini, R.R. Rao, Cooperation in wireless ad hoc networks, in: Proceedings of the INFOCOM03, IEEE, 2003, pp. 808–817
  12. H. Yang, X. Meng, S. Lu, Self-organized network-layer security in mobile ad hoc networks, in: Proceedings of the ACM Workshop on Wireless Security, ACM, 2002, pp. 11–20
  13. Emmanouil A. PANAOUSIS and Christos POLITIS “Non-Cooperative Games Between Legitimate Nodes and Malicious Coalitions in MANET's” proceedings of the future network and mobile summit 2011 conference
  14. Y. Liu, C. Comaniciu, and H. Man, “A bayesian game approach for intrusion detection in wireless ad hoc networks,” in Proc. GAMENETS,(NY, USA), p. 4, 2006
  15. Feng Li, Member, IEEE, Yinying Yang, Student Member, IEEE, and Jie Wu, Fellow, IEEE “Attack and Flee: Game-Theory-Based Analysis on Interactions among Nodes in MANET's” IEEE Transactions on Systems, Man and Cybernetics, Part B 2010, pp.612-622.
  16. A. Josang, R. Ismail, and C. Boyd, “A survey of trust and reputation systems for online service provision” Decis. Support Syst., vol. 43, no. 2, pp. 618–644, Mar. 2007.
  17. J. Feigenbaum, C. Papadimitriou, R. Sami, S. Shenker, A BGP based mechanism for lowest-cost routing, in: Proceedings of the 21st annual symposium on Principles of distributed computing, ACM, 2002, pp. 173–182.
Index Terms

Computer Science
Information Sciences

Keywords

Bayesian Game Cooperative Game Signaling Game Shapley Value Nash Equilibrium