A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks

被引:13
作者
Hao, Dong [1 ]
Liao, Xiaojuan [1 ]
Adhikari, Avishek [2 ]
Sakurai, Kouichi [1 ]
Yokoo, Makoto [1 ]
机构
[1] Kyushu Univ, Grad Sch Informat Sci & Elect Engn, Nishi Ku, Fukuoka 812, Japan
[2] Univ Calcutta, Dept Pure Math, Kolkata, India
关键词
Repeated game; Collusion; Packet routing; Rational attacker; Selective forwarding; ATTACKS; NODES;
D O I
10.1016/j.comcom.2012.07.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In multihop wireless networks (MWNs), the selective forwarding attack is a special case of denial of service attack. In this attack, the malicious wireless nodes only forward a subset of the received packets, but drop the others. This attack becomes more severe if multiple attackers exist and collude together to disrupt the normal functioning of the secure protocols. By colluding, each attacker can even only drop a little packets, but the overall loss of the path will be high. However, most prior researches on selective forwarding attacks assume the attackers do not collude with each other. Furthermore, the previous works also lack of comprehensive security analysis. In this paper, by utilizing the game theoretic approach, we analyze the collusion in selective forwarding attacks. We first put forward a sub-route oriented punish and reward scheme, and propose an multi-attacker repeated colluding game. Then by static and dynamic analysis of this colluding attack game, we find the sub-game equilibriums which indicate the attackers' optimal attack strategies. Based on the analysis result, we establish a security policies for multihop wireless networks, to threaten and detect the malicious insider nodes which collude with each other to launch the selective forwarding attacks. (c) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:2125 / 2137
页数:13
相关论文
共 31 条
[1]  
Agrawal P., 2008, Proceedings of the 2Nd International Conference on Ubiquitous Information Management and Communication, P310
[2]  
Alpcan T., 2010, Network Security: A Decision and Game-Theoretic Approach
[3]  
Anjum Farooq., 2007, SECURITY WIRELESS AD
[4]  
[Anonymous], WIRELESS MESH NETWOR
[5]  
[Anonymous], 2006, Repeated Games and Reputations
[6]  
[Anonymous], 2009, P GLOBECOM 2009 2009
[7]  
[Anonymous], LCAREPORT2006002
[8]  
[Anonymous], AD HOC NETWORKS, DOI DOI 10.1016/S1570-8705(03)00008-8
[9]  
[Anonymous], 2002, Probability and Statistics
[10]  
[Anonymous], 2002, P 1 ACM WORKSH WIR S