4 research outputs found

    Bayesian signaling game based efficient security model for MANETs

    Get PDF
    Game Theory acts as a suitable tool offering promising solutions to security-related concerns in Mobile Ad Hoc Networks (i.e., MANETs). In MANETs, security forms a prominent concern as it includes nodes which are usually portable and require significant coordination between them. Further, the absence of physical organisation makes such networks susceptible to security breaches, hindering secure routing and execution among nodes. Game Theory approach has been manipulated in the current study to achieve an analytical view while addressing the security concerns in MANETs. This paper offers a Bayesian-Signaling game model capable of analysing the behaviour associated with regular as well as malicious nodes. In the proposed model, the utility of normal nodes has been increased while reducing the utility linked to malicious nodes. Moreover, the system employs a reputation system capable of stimulating best cooperation between the nodes. The regular nodes record incessantly to examine their corresponding nodes’ behaviours by using the belief system of Bayes-rules. On its comparison with existing schemes, it was revealed that the presented algorithm provides better identification of malicious nodes and attacks while delivering improved throughput and reduced false positive rate

    ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET

    Get PDF
    Game Theory is a useful tool for exploring the issues concerning Mobile Ad-Hoc Network (or MANET) security. In MANETs, coordination among the portable nodes is more significant, which encompasses their vulnerability challenges to several security assaults and the inability to run securely, when storing its resources and manage secure routing between the nodes. Hence, it is imperative to design an efficient routing protocol to secure all nodes from unknown behaviors. In the current research study, the game-theory approach is utilized for analytical purpose and addresses the security problems in MANETs. The game-theoretic approach is mainly adopted to find the malicious activities in the networks. In the proposed work, a Bayesian-Signaling game model is proposed which analyses the behavior of both regular/normal and malicious nodes. The game model proposed also provides the finest actions of autonomous tactics for every node. A Bayesian-Equilibrium (BE) offers the best solution for games to resolve the incomplete information by joining strategies and players payoff which form an equilibrium. By exploiting the BE mechanism, the system can detect the behavior of regular as well as malicious nodes. Therefore, Efficient ComputationalModelling based on Game Theory or ECM-GT methodology will reduce the utility of malicious nodes and increase the utility of regular nodes. Also, it stimulates the best co-operation among the nodes by exploiting the reputation system. On comparing our results with the existing systems, it was found that the proposed algorithm performed better in the detection of malicious nodes, throughput, false positive rate and detection of attacks

    STRATEGIC PROFILING & ANALYTIC MODELLING OF NODE MISBEHAVIOR IN MANET BASED IOT PARADIGM THEORY

    Get PDF
    Ubiquitous Computing and Internet of Things (IoT) are extremely popular in recent age and therefore imparting high level security mechanism is highly indispensable for such advanced technical systems. Game Theory acts as a suitable tool offering promising solutions to securityrelated concerns in Mobile Ad-Hoc Networks (i.e., MANETs). In MANETs, security forms a prominent concern as it includes nodes which are usually portable and require significant coordination between them. Further, the absence of physical organisation makes such networks susceptible to security breaches, hindering secure routing and execution among nodes. Coordination among nodes during communication and working without control of any central manager truly ensembles them to be applied in IoT. However, the identification and later mitigation of malicious nodes becomes an immensely difficult task especially when Selfish/Erroneous nodes exist along with normal Collaborative nodes in the Regular camp. Game Theory approach has been manipulated in the current study to achieve an analytical view while addressing the security concerns in MANETs. This study considers selfish nodes in the regular node camp while modelling the Regular versus Malicious node game and thereby enhancing the prior mathematical schema of strategical decision making to accommodate for the same. The proposed study performs statistical analysis and presents a mathematical model to mimic the multi-stage game between regular and malicious node using Game Theory. The simulation of the model has proved that the Perfect Bayesian Equilibrium outshines other approaches used in this study, specifically pure strategy and mixed strategy. The utility of both regular and malicious node has improved noticeably when nodes adopt PBE strategy. The framework tries to effectively represent the various unpredictable actions of node cooperation, node declination, node attacks as well as node reporting that can model the strategic profiling of various mobile nodes. Understanding the patterns and then deploying the algorithms in security products can reduce intrusion to a greater extent

    A monitoring-based approach for WSN security using IEEE-802.15.4/6LowPAN and DTLS communication

    Get PDF
    International audienceIn this paper, we present a monitoring based approach for securing upper layer communications of WSN (Wireless Sensor Networks), the latter using IEEE802.15.4/6LoWPAN stacks and tinyDTLS. The monitoring techniques have been integrated as an extension to the industrial tool MMT (Montimage Monitoring Tool). The MMT-extension verifies that the network is working following a set of security rules that have been defined by ETSI. The security rules check if the protocol stack is working properly. If MMT detects a security rule that was not respected, then it sends an alarm to the system manager so that he can take properly reactive adjustments. We tested each of the security rules in MMT's extension using point-to-point configuration. After all these tests were verified, we tested our MMT-extension using real data gathered from the FIT IoT-LAB platform. The results of these tests shown that our MMT's extension for WSN using IEEE-802.15.4/6LowPAN and DTLS communication is feasible
    corecore