Mean field game theoretic approach for security in mobile ad-hoc networks

被引:0
作者
Wang, Yanwei [1 ]
Tang, Helen [2 ]
Yu, F. Richard [1 ]
Huang, Minyi [3 ]
机构
[1] Carleton Univ, Dept Syst & Comp Eng, Ottawa, ON K1S 5B6, Canada
[2] Defence R&D Canada Ottawa, Ottawa, ON, Canada
[3] Carleton Univ, Sch Math & Stat, Ottawa, ON K1S 5B6, Canada
来源
MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2013 | 2013年 / 8755卷
关键词
Mean field game; security; mobile ad-hoc network (MANET); INTRUSION DETECTION;
D O I
10.1117/12.2015281
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Game theory can provide a useful tool to study the security problem in mobile ad hoc networks (MANETs). Most existing work on applying game theories to security only considers two players in the security game model: an attacker and a defender. While this assumption is valid for a network with centralized administration, it may not be realistic in MANETs, where centralized administration is not available. Consequently, each individual node in a MANET should be treated separately in the security game model. In this paper, using recent advances in mean field game theory, we propose a novel game theoretic approach for security in MANETs. Mean field game theory provides a powerful mathematical tool for problems with a large number of players. Since security defence mechanisms consume precious system resources (e.g., energy), the proposed scheme considers not only the security requirement of MANETs but also the system resources. In addition, each node only needs to know its own state information and the aggregate effect of the other nodes in the MANET. Therefore, the proposed scheme is a fully distributed scheme. Simulation results are presented to illustrate the effectiveness of the proposed scheme.
引用
收藏
页数:8
相关论文
共 15 条
  • [1] [Anonymous], THESIS
  • [2] Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks
    Bu, Shengrong
    Yu, F. Richard
    Liu, Xiaoping P.
    Tang, Helen
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (09) : 3064 - 3073
  • [3] The NCE (Mean Field) Principle With Locality Dependent Cost Interactions
    Huang, Minyi
    Caines, Peter E.
    Malhame, Roland P.
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2010, 55 (12) : 2799 - 2805
  • [4] Huang Minyi., 2012, Game Theory for Networks, P138
  • [5] Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs
    Li, Feng
    Yang, Yinying
    Wu, Jie
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2010, 40 (03): : 612 - 622
  • [6] LIANG C, 2007, IEEE T WIREL COMMUN, V6, P2866
  • [7] Game Theory for Network Security
    Liang, Xiannuan
    Xiao, Yang
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01) : 472 - 486
  • [8] Optimal Combined Intrusion Detection and Biometric-Based Continuous Authentication in High Security Mobile Ad Hoc Networks
    Liu, Jie
    Yu, F. Richard
    Lung, Chung-Horng
    Tang, Helen
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (02) : 806 - 815
  • [9] Intrusion detection in wireless ad hoc networks
    Mishra, A
    Nadkarni, K
    Patcha, A
    [J]. IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01) : 48 - 60
  • [10] A Game Theoretic Approach for Securing AODV in Emergency Mobile Ad Hoc Networks
    Panaousis, Emmanouil A.
    Politis, Christos
    [J]. 2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009), 2009, : 985 - 992