A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks

被引:67
作者
Wang, Yanwei [1 ]
Yu, F. Richard [1 ]
Tang, Helen [2 ]
Huang, Minyi [3 ]
机构
[1] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON K1S 5B6, Canada
[2] Def R&D Canada, Cyber Operat & Signals Warfare Sect, Ottawa, ON, Canada
[3] Carleton Univ, Sch Math & Stat, Ottawa, ON K1S 5B6, Canada
关键词
Mean field game; security; mobile ad hoc network (MANET); INTRUSION DETECTION; AUTHENTICATION;
D O I
10.1109/TWC.2013.122313.131118
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Game theory can provide a useful tool to study the security problem in mobile ad hoc networks (MANETs). Most of existing works on applying game theories to security only consider two players in the security game model: an attacker and a defender. While this assumption may be valid for a network with centralized administration, it is not realistic in MANETs, where centralized administration is not available. In this paper, using recent advances in mean field game theory, we propose a novel game theoretic approach with multiple players for security in MANETs. The mean field game theory provides a powerful mathematical tool for problems with a large number of players. The proposed scheme can enable an individual node in MANETs to make strategic security defence decisions without centralized administration. In addition, since security defence mechanisms consume precious system resources (e. g., energy), the proposed scheme considers not only the security requirement of MANETs but also the system resources. Moreover, each node in the proposed scheme only needs to know its own state information and the aggregate effect of the other nodes in the MANET. Therefore, the proposed scheme is a fully distributed scheme. Simulation results are presented to illustrate the effectiveness of the proposed scheme.
引用
收藏
页码:1616 / 1627
页数:12
相关论文
共 25 条
[1]  
Alpcan T., 2010, Network Security: A Decision and Game-Theoretic Approach
[2]   A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions [J].
Attar, Alireza ;
Tang, Helen ;
Vasilakos, Athanasios V. ;
Yu, F. Richard ;
Leung, Victor C. M. .
PROCEEDINGS OF THE IEEE, 2012, 100 (12) :3172-3186
[3]  
Bedi H., P 2011 COMP INT CYB, P129
[4]   Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks [J].
Bu, Shengrong ;
Yu, F. Richard ;
Liu, Xiaoping P. ;
Tang, Helen .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (09) :3064-3073
[5]   Security in mobile ad hoc networks [J].
Carvalho, Marco .
IEEE SECURITY & PRIVACY, 2008, 6 (02) :72-75
[6]   Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications [J].
Guan, Quansheng ;
Yu, F. Richard ;
Jiang, Shengming ;
Leung, Victor C. M. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2012, 61 (06) :2674-2685
[7]  
Huang M. Y, P 2012 GAMENETS
[8]   The NCE (Mean Field) Principle With Locality Dependent Cost Interactions [J].
Huang, Minyi ;
Caines, Peter E. ;
Malhame, Roland P. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2010, 55 (12) :2799-2805
[9]   Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs [J].
Li, Feng ;
Yang, Yinying ;
Wu, Jie .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2010, 40 (03) :612-622
[10]  
LIANG C, 2007, IEEE T WIREL COMMUN, V6, P2866