Game theoretic approach to model node misbehaviour in MANETS /

The security problems in Mobile Adhoc Networks (MANETs) are being constant topic of interest and drawn attention of research community from past decade, where massive study has already been presented for addressing the same. One of the precarious problems encountered in MANET is that of identifying...

Full description

Saved in:
Bibliographic Details
Main Author: Khan, Burhan Ul Islam
Format: Thesis
Language:English
Published: Kuala Lumpur: Kulliyyah of Engineering, International Islamic University Malaysia, 2014
Subjects:
Online Access:http://studentrepo.iium.edu.my/handle/123456789/4835
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 040380000a22002770004500
008 140818t2014 my a g m 000 0 eng d
040 |a UIAM  |b eng 
041 |a eng 
043 |a a-my--- 
050 0 0 |a TK5105.77 
100 1 |a Khan, Burhan Ul Islam 
245 1 |a Game theoretic approach to model node misbehaviour in MANETS /  |c by Burhan Ul Islam Khan 
260 |a Kuala Lumpur:   |b Kulliyyah of Engineering, International Islamic University Malaysia,   |c 2014 
300 |a xiii, 110 leaves :  |b ill. ;  |c 30cm. 
502 |a Thesis (MSCIE)--International Islamic University Malaysia, 2014. 
504 |a Includes bibliographical references (leaves 90-95). 
520 |a The security problems in Mobile Adhoc Networks (MANETs) are being constant topic of interest and drawn attention of research community from past decade, where massive study has already been presented for addressing the same. One of the precarious problems encountered in MANET is that of identifying the malicious nodes. The identification and later mitigation of the same becomes immensely difficult task especially when Selfish / Erroneous nodes exist along with normal Collaborative nodes in the Regular camp. The presence of selfish nodes is potentially harmful as similar behaviour can be imitated by malicious nodes which are the point of concern of many security aspects. While performing the preliminary study of the proposed system, it was known that large amount of previous study has emphasized on usage of cryptographic protocols to secure MANET, where implementation becomes a big question mark and challenges time and space complexity of those sophisticated algorithm. While reviewing some more techniques on security system in MANET, it was found that game theory has also prime contribution in past few years due to potential accuracy in its probabilistic approach and computational efficiency. Therefore, the proposed system accentuates the use of game theory and probability theory considering selfish nodes in the regular node camp while modeling the Regular versus Malicious node game and thereby enhancing the prior mathematical schema of strategical decision making to accommodate for the same. The study performs statistical analysis and presents a mathematical model to mimic the multi-stage game between regular and malicious node using Game Theory. The framework effectively represent the various unpredictable actions of node cooperation, node declination, node attacks , as well as node reporting that can model the strategic profiling of various mobile nodes. Understanding the patterns and then deploying the algorithms in security products can reduce intrusion to a greater extend. The simulation has been conducted in Matlab for monitoring the trends of pure strategy, mixed strategy, and PBE strategy adoption to visualize the behavioral pattern of mobile nodes. The outcome of the study shows significant enhancement in reporting actions of regular node thus considerable reduce down vulnerability scenario in MANET. The study lays emphasis on Perfect Bayesian Equilibrium (PBE) strategy which forms as the basis of all the result analysis. The enhancement was found in terms of 62.67 % lesser false positives which favors higher overall network utility (modeled as utility of regular nodes in the game) with Selfish / Erroneous nodes existing in the network when collating the proposed schema with prior work. 
596 |a 1 
655 7 |a Theses, IIUM local 
690 |a Dissertations, Academic  |x Department of ECE  |z IIUM 
710 2 |a International Islamic University Malaysia.  |b Department of ECE 
856 4 |u http://studentrepo.iium.edu.my/handle/123456789/4835 
900 |a hab-zaj-ls 
999 |c 438818  |d 469050 
952 |0 0  |6 T TK 005105.77 K45G 2014  |7 0  |8 THESES  |9 759854  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o t TK 5105.77 K45G 2014  |p 11100334539  |r 2017-10-20  |t 1  |v 0.00  |y THESIS 
952 |0 0  |6 TS CDF TK 5105.77 K45G 2014  |7 0  |8 THESES  |9 852611  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o ts cdf TK 5105.77 K45G 2014  |p 11100334540  |r 2017-10-26  |t 1  |v 0.00  |y THESISDIG