Game theoretic approach to model node misbehaviour in MANETS /
The security problems in Mobile Adhoc Networks (MANETs) are being constant topic of interest and drawn attention of research community from past decade, where massive study has already been presented for addressing the same. One of the precarious problems encountered in MANET is that of identifying...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
Kuala Lumpur:
Kulliyyah of Engineering, International Islamic University Malaysia,
2014
|
Subjects: | |
Online Access: | http://studentrepo.iium.edu.my/handle/123456789/4835 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 040380000a22002770004500 | ||
---|---|---|---|
008 | 140818t2014 my a g m 000 0 eng d | ||
040 | |a UIAM |b eng | ||
041 | |a eng | ||
043 | |a a-my--- | ||
050 | 0 | 0 | |a TK5105.77 |
100 | 1 | |a Khan, Burhan Ul Islam | |
245 | 1 | |a Game theoretic approach to model node misbehaviour in MANETS / |c by Burhan Ul Islam Khan | |
260 | |a Kuala Lumpur: |b Kulliyyah of Engineering, International Islamic University Malaysia, |c 2014 | ||
300 | |a xiii, 110 leaves : |b ill. ; |c 30cm. | ||
502 | |a Thesis (MSCIE)--International Islamic University Malaysia, 2014. | ||
504 | |a Includes bibliographical references (leaves 90-95). | ||
520 | |a The security problems in Mobile Adhoc Networks (MANETs) are being constant topic of interest and drawn attention of research community from past decade, where massive study has already been presented for addressing the same. One of the precarious problems encountered in MANET is that of identifying the malicious nodes. The identification and later mitigation of the same becomes immensely difficult task especially when Selfish / Erroneous nodes exist along with normal Collaborative nodes in the Regular camp. The presence of selfish nodes is potentially harmful as similar behaviour can be imitated by malicious nodes which are the point of concern of many security aspects. While performing the preliminary study of the proposed system, it was known that large amount of previous study has emphasized on usage of cryptographic protocols to secure MANET, where implementation becomes a big question mark and challenges time and space complexity of those sophisticated algorithm. While reviewing some more techniques on security system in MANET, it was found that game theory has also prime contribution in past few years due to potential accuracy in its probabilistic approach and computational efficiency. Therefore, the proposed system accentuates the use of game theory and probability theory considering selfish nodes in the regular node camp while modeling the Regular versus Malicious node game and thereby enhancing the prior mathematical schema of strategical decision making to accommodate for the same. The study performs statistical analysis and presents a mathematical model to mimic the multi-stage game between regular and malicious node using Game Theory. The framework effectively represent the various unpredictable actions of node cooperation, node declination, node attacks , as well as node reporting that can model the strategic profiling of various mobile nodes. Understanding the patterns and then deploying the algorithms in security products can reduce intrusion to a greater extend. The simulation has been conducted in Matlab for monitoring the trends of pure strategy, mixed strategy, and PBE strategy adoption to visualize the behavioral pattern of mobile nodes. The outcome of the study shows significant enhancement in reporting actions of regular node thus considerable reduce down vulnerability scenario in MANET. The study lays emphasis on Perfect Bayesian Equilibrium (PBE) strategy which forms as the basis of all the result analysis. The enhancement was found in terms of 62.67 % lesser false positives which favors higher overall network utility (modeled as utility of regular nodes in the game) with Selfish / Erroneous nodes existing in the network when collating the proposed schema with prior work. | ||
596 | |a 1 | ||
655 | 7 | |a Theses, IIUM local | |
690 | |a Dissertations, Academic |x Department of ECE |z IIUM | ||
710 | 2 | |a International Islamic University Malaysia. |b Department of ECE | |
856 | 4 | |u http://studentrepo.iium.edu.my/handle/123456789/4835 | |
900 | |a hab-zaj-ls | ||
999 | |c 438818 |d 469050 | ||
952 | |0 0 |6 T TK 005105.77 K45G 2014 |7 0 |8 THESES |9 759854 |a IIUM |b IIUM |c MULTIMEDIA |g 0.00 |o t TK 5105.77 K45G 2014 |p 11100334539 |r 2017-10-20 |t 1 |v 0.00 |y THESIS | ||
952 | |0 0 |6 TS CDF TK 5105.77 K45G 2014 |7 0 |8 THESES |9 852611 |a IIUM |b IIUM |c MULTIMEDIA |g 0.00 |o ts cdf TK 5105.77 K45G 2014 |p 11100334540 |r 2017-10-26 |t 1 |v 0.00 |y THESISDIG |