Behaviour Visualization for Malicious-Attacker Node Collusion in MANET Based on Probabilistic Approach
[1]
Rashidah F. Olanrewaju, Kulliyyah of Engineering, International Islamic University Malaysia, Kualalumpur, Malaysia.
[2]
Burhan Ul Islam Khan, Department of Computer Science & Engineering, Islamic University of Science & Technology, Awantipora, Kashmir, India.
[3]
Roohie Naaz Mir, Department of Computer Science & Engineering, National Institute of Technology, Srinagar, Kashmir, India.
[4]
Balogun Wasiu Adebayo, Lagos State Polytechnic, Ikorodu, Nigeria.
Inspite of wide range of exploration towards the mitigation techniques for malicious nodes in past few years, the effective solutions for addressing the behavioral pattern of malicious nodes are still largely unfound. One of the most challenging dynamics related to this issue is an effective visualization of malicious nodes in the considered simulation techniques. As the malicious nodes will never adopt any strategies which has fairer chances of getting detected, hence, they will perform much confusive behavior based on which it is almost difficult to identify whether it is regular node or malicious node. The current paper accentuates the potentials of game theory considering multi-attacker collusion as the new enhancement that can effectively represent the various unpredictable actions of node cooperation, node declination, node attacks, as well as node reporting that can model the tactical profiling of various mobile nodes.
Node Misbehaviour, Mobile Adhoc Network, Malicious Nodes, Routing Misbehaviour, PBE
[1]
Loo, Jonathan, Jaime Lloret Mauri, and Jesús Hamilton Ortiz, eds. Mobile Ad Hoc Networks: Current Status and Future Trends. CRC Press, 2011.
[2]
Visalakshi, P., and S. Anjugam. "Security issues and vulnerabilities in Mobile Ad hoc Networks (MANET)-A Survey." International Journal of Computational Engineering Research (IJCER) ISSN: 2250-3005.
[3]
Abraham, Ittai, Danny Dolev, Rica Gonen, and Joe Halpern. "Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation." In Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing, pp. 53-62. ACM, 2006.
[4]
Roy, Sankardas, Charles Ellis, Sajjan Shiva, Dipankar Dasgupta, Vivek Shandilya, and Qishi Wu. "A survey of game theory as applied to network security." In System Sciences (HICSS), 2010 43rd Hawaii International Conference on, pp. 1-10. IEEE, 2010.
[5]
Yang, Hao, Haiyun Luo, Fan Ye, Songwu Lu, and Lixia Zhang. "Security in mobile ad hoc networks: challenges and solutions." Wireless Communications, IEEE 11, no. 1 (2004): 38-47.
[6]
Schütte, Martin. "Detecting selfish and malicious nodes in MANETs." In seminar: sicherheit in selbstorganisierenden netzen, hpi/universität potsdam, sommersemester. 2006.
[7]
Junhai, Luo, Ye Danxia, Xue Liu, and Fan Mingyu. "A survey of multicast routing protocols for mobile ad-hoc networks." Communications Surveys & Tutorials, IEEE 11, no. 1 (2009): 78-91.
[8]
Yoo, Younghwan, and Dharma P. Agrawal. "Why does it pay to be selfish in a MANET?." Wireless Communications, IEEE 13, no. 6 (2006): 87-97.
[9]
Probus, Michael Wayne. "Selfish node isolation in mobile ad-hoc networks." PhD diss., University of Louisville, 2007.
[10]
Sengathir, J., and R. Manoharan. "Security Algorithms for Mitigating Selfish and Shared Root Node Attacks in MANETs." International Journal of Computer Network and Information Security (IJCNIS) 5, no. 10 (2013): 1.
[11]
Rachedi, Abderrezak, Abderrahim Benslimane, Hadi Otrok, Noman Mohammed, and Mourad Debbabi. "A secure mechanism design-based and game theoretical model for manets." Mobile Networks and Applications 15, no. 2 (2010): 191-204.
[12]
Wang, Kun, and Meng Wu. "Nash equilibrium of node cooperation based on metamodel for MANETs." journal of information science and engineering 28, no. 2 (2012): 317-333.
[13]
Jiang, Ning, Kien A. Hua, and Danzhou Liu. "A scalable and robust approach to collaboration enforcement in mobile ad-hoc networks." Communications and Networks, Journal of 9, no. 1 (2007): 56-66.
[14]
Striki, Maria, John S. Baras, and Kyriakos Manousakis. "New Algorithms for the efficient design of topology-oriented Key Agreement Protocols in Multi-hop Ad Hoc Networks." In Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops, 2008. WiOPT 2008. 6th International Symposium on, pp. 384-393. IEEE, 2008.
[15]
Goyal, Priyanka, Sahil Batra, and Ajit Singh. "A literature review of security attack in mobile ad-hoc networks." International Journal of Computer Applications 9, no. 12 (2010): 11-15.
[16]
Khan, Burhan Ul Islam, Rashidah Funke Olanrewaju, and Mohamed Hadi Habaebi. "Malicious Behaviour of Node and its Significant Security Techniques in MANET-A." Australian Journal of Basic and Applied Sciences 7, no. 12 (2013): 286-293.
[17]
Zapata, Manel Guerrero. "Secure ad hoc on-demand distance vector routing." ACM SIGMOBILE Mobile Computing and Communications Review 6, no. 3 (2002): 106-107.
[18]
Hu, Yih-Chun, Adrian Perrig, and David B. Johnson. "Ariadne: A secure on-demand routing protocol for ad hoc networks." Wireless networks 11, no. 1-2 (2005): 21-38.
[19]
Singh, Gunjesh Kant, Harminder Singh Bindra, and A. L. Sangal. "Performance Analysis of DSR, AODV Routing Protocols based on Wormhole Attack in Mobile Ad-hoc Network." International Journal of Computer Applications 26, no. 5 (2011): 38-41.
[20]
Suganya, N. R., and S. Madhu Priya. "Detecting Selfish Nodes in a MANET through Fragmentation in Distributed Environment." International Journal of Science, Engineering and Technology Research 2, no. 6 (2013): pp-1370.
[21]
Kumar, Rakesh, Piush Verma, and Yaduvir Singh. "Design and Development of a Secured Routing Scheme for Mobile Adhoc Network." International Journal of Computer Applications (0975–8887) Volume (2011).
[22]
Khan, Burhan Ul Islam, Rashidah Funke Olanrewaju, Farhat Anwar, and Asadullah Shah. "Manifestation and mitigation of node misbehaviour in adhoc networks." Wulfenia Journal 21, no. 3 (2014): 462-470.
[23]
Li, Feng, Yinying Yang, and Jie Wu. "Attack and flee: game-theory-based analysis on interactions among nodes in MANETs." Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on 40, no. 3 (2010): 612-622.
[24]
Anil, G. N., and A. Venugopal Reddy. "Strategical Modelling with Virtual Competition for Analyzing Behavior of Malicious Node in Mobile Adhoc Network to Prevent Decamping." IJCSI (2011).
[25]
Cordasco, Jared, and Susanne Wetzel. "Cryptographic versus trust-based methods for MANET routing security." Electronic Notes in Theoretical Computer Science 197, no. 2 (2008): 131-140.
[26]
Wang, Xin-ping, Cui-hua Wu, Shao-hui Zou, Wan-xian Li, and Wei-wu Wan. "Research On The Questions Of Collusion And Collusion-Proof Equilibrium On The Quality Management System Certification Market In China." In Service Systems and Service Management, 2006 International Conference on, vol. 2, pp. 1299-1304. IEEE, 2006.