Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs
Mobile Adhoc Network (MANET) has been a core topic of research since the last decade. Currently, this form of networking paradigm is increasingly being construed as an integral part of upcoming urban applications of Internet-of-Things (IoT), consisting of massive connectivity of diverse types of nod...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2021-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9404178/ |
_version_ | 1818740527657385984 |
---|---|
author | Burhan Ul Islam Khan Farhat Anwar Rashidah F. Olanrewaju Miss Laiha Binti Mat Kiah Roohie N. Mir |
author_facet | Burhan Ul Islam Khan Farhat Anwar Rashidah F. Olanrewaju Miss Laiha Binti Mat Kiah Roohie N. Mir |
author_sort | Burhan Ul Islam Khan |
collection | DOAJ |
description | Mobile Adhoc Network (MANET) has been a core topic of research since the last decade. Currently, this form of networking paradigm is increasingly being construed as an integral part of upcoming urban applications of Internet-of-Things (IoT), consisting of massive connectivity of diverse types of nodes. There is a significant barrier to the applicability of existing routing approaches in conventional MANETs when integrated with IoT. This routing mismatch can lead to security risks for the MANET-based application tied with the IoT platform. This paper examines a pragmatic scenario as a test case wherein the mobile nodes must exchange multimedia signals for supporting real-time streaming applications. There exist two essential security requirements viz. i) securing the data packet and ii) understanding the unpredictable behavior of the attacker. The current study considers sophistication on the part of attacker nodes. They are aware of each other’s identity and thereby collude to conduct lethal attacks, which is rarely reflected in existing security modeling statistics. This research harnesses the potential modeling aspect of game theory to model the multiple-collusion attacker scenario. It contributes towards i) modeling strategies of regular/malicious nodes and ii) applying optimization principle using novel auxiliary information to formulate the optimal strategies. The model advances each regular node’s capability to carry out precise computation about the opponent player’s strategy prediction, i.e., malicious node. The simulation outcome of the proposed mathematical model in MATLAB ascertains that it outperforms the game theory’s baseline approach. |
first_indexed | 2024-12-18T01:42:09Z |
format | Article |
id | doaj.art-ae846eb3abc841f58c187cf7ba79a579 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-18T01:42:09Z |
publishDate | 2021-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-ae846eb3abc841f58c187cf7ba79a5792022-12-21T21:25:16ZengIEEEIEEE Access2169-35362021-01-019617786179210.1109/ACCESS.2021.30733439404178Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETsBurhan Ul Islam Khan0https://orcid.org/0000-0003-1539-0104Farhat Anwar1https://orcid.org/0000-0001-7417-4263Rashidah F. Olanrewaju2https://orcid.org/0000-0002-2921-530XMiss Laiha Binti Mat Kiah3https://orcid.org/0000-0002-1240-5406Roohie N. Mir4https://orcid.org/0000-0002-6460-0684Department of Electrical and Computer Engineering, Kulliyyah of Engineering, International Islamic University Malaysia (IIUM), Kuala Lumpur, MalaysiaDepartment of Electrical and Computer Engineering, Kulliyyah of Engineering, International Islamic University Malaysia (IIUM), Kuala Lumpur, MalaysiaDepartment of Electrical and Computer Engineering, Kulliyyah of Engineering, International Islamic University Malaysia (IIUM), Kuala Lumpur, MalaysiaDepartment of Computer System and Technology, University of Malaya (UM), Kuala Lumpur, MalaysiaDepartment of Computer Science and Engineering, National Institute of Technology (NIT), Srinagar, IndiaMobile Adhoc Network (MANET) has been a core topic of research since the last decade. Currently, this form of networking paradigm is increasingly being construed as an integral part of upcoming urban applications of Internet-of-Things (IoT), consisting of massive connectivity of diverse types of nodes. There is a significant barrier to the applicability of existing routing approaches in conventional MANETs when integrated with IoT. This routing mismatch can lead to security risks for the MANET-based application tied with the IoT platform. This paper examines a pragmatic scenario as a test case wherein the mobile nodes must exchange multimedia signals for supporting real-time streaming applications. There exist two essential security requirements viz. i) securing the data packet and ii) understanding the unpredictable behavior of the attacker. The current study considers sophistication on the part of attacker nodes. They are aware of each other’s identity and thereby collude to conduct lethal attacks, which is rarely reflected in existing security modeling statistics. This research harnesses the potential modeling aspect of game theory to model the multiple-collusion attacker scenario. It contributes towards i) modeling strategies of regular/malicious nodes and ii) applying optimization principle using novel auxiliary information to formulate the optimal strategies. The model advances each regular node’s capability to carry out precise computation about the opponent player’s strategy prediction, i.e., malicious node. The simulation outcome of the proposed mathematical model in MATLAB ascertains that it outperforms the game theory’s baseline approach.https://ieeexplore.ieee.org/document/9404178/Colludergame theorymobile adhoc networkmulti-collusion attackermultistage gamesecure routing |
spellingShingle | Burhan Ul Islam Khan Farhat Anwar Rashidah F. Olanrewaju Miss Laiha Binti Mat Kiah Roohie N. Mir Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs IEEE Access Colluder game theory mobile adhoc network multi-collusion attacker multistage game secure routing |
title | Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs |
title_full | Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs |
title_fullStr | Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs |
title_full_unstemmed | Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs |
title_short | Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs |
title_sort | game theory analysis and modeling of sophisticated multi collusion attack in manets |
topic | Colluder game theory mobile adhoc network multi-collusion attacker multistage game secure routing |
url | https://ieeexplore.ieee.org/document/9404178/ |
work_keys_str_mv | AT burhanulislamkhan gametheoryanalysisandmodelingofsophisticatedmulticollusionattackinmanets AT farhatanwar gametheoryanalysisandmodelingofsophisticatedmulticollusionattackinmanets AT rashidahfolanrewaju gametheoryanalysisandmodelingofsophisticatedmulticollusionattackinmanets AT misslaihabintimatkiah gametheoryanalysisandmodelingofsophisticatedmulticollusionattackinmanets AT roohienmir gametheoryanalysisandmodelingofsophisticatedmulticollusionattackinmanets |