Security Enhancement in Mobile Ad hoc Networks using Non-zero Non-cooperative Game Theory
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 8
Abstract
Mobile Ad hoc Network (MANET) is a multi hop infrastructure less wireless networks which offers unrestricted mobility. As wireless ad-hoc networks lack a centralized infrastructure, they are exposed to a lot of attacks such as DOS attacks, Spoofing, and etc. So the security is the main concern for these networks. Especially secure routing is important given the fact that potential attackers aim to disrupt the appropriate operation within a MANET. In this paper we used non-zero noncooperative game theory is used model the security game between MANET, which is defended by Intrusion Detection System (IDS) operating at each node and a group of collaborative malicious nodes called malicious coalition. We used the mixed strategies to find the defend and attack probability distributions of any MANET and malicious coalition nodes that maximize the utility of the players in a non-cooperative security game between the afore mentioned entities at the Nash Equilibrium (NE). In this paper we propose an routing approach called NCGSE (Non Cooperative Game theory for Security enhancement) for defending legitimate nodes of MANET from the malicious activities of the adversaries. Our simulations were implemented by means of the popular discrete event network simulator NS-2 illustrated that the proposed NCGSE protocol outperforms the reputed Ad hoc On-demand Distance Vector (AODV) routing protocol in terms of Packet Delivery Ratio (PDR) within the MANET.
Authors and Affiliations
Prabhakara Reddy Baggidi, Dr. M. N. Giri Prasad, T. Srinivas
Providing Security and Minimizing Data Management Cost in the Cloud
Cloud Computing Providing Efficient Services for Users and Organizations. To outsource their data to cloud servers. But main problem is users are worrying about the leakage or damage of the data. in order to overcome...
Cooperative and Riskless Data Publishing in Cloud Computing
This paper explains. Proposing a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasurecoded data. The proposed design allows users to audit the cloud storag...
Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication
Cooperative communications enables efficient utilization of system communication resources, thereby allowing nodes or terminals participating in a communication network to collaborate with each other during informatio...
Proficient User Revocation On Cloud Computing
In today's Computing world Cloud enlisting is one of the best advancement which uses advanced computational power and it upgrades data sharing and data securing capacities. Essential inconvenience in appropriated fig...
Automatic Weed Detection System And Smart Herbicide Sprayer Robot For Corn Fields
The goal of this paper is to develop an automatic plantation system.Here fruit and weed in the plantation is detected and herbicide is sprayed for the weed affected area.The temperature of the field is monitored inor...