A Game Theoretic Approach Against the Greedy Behavior in MAC IEEE 802.11

被引:2
作者
El Houssaini, Mohammed-Alamine [1 ]
Aaroud, Abdessadek [1 ]
El Hore, Ali [1 ]
Ben-Othman, Jalel [2 ]
机构
[1] Chouaib Doukkali Univ, Fac Sci, Dept Comp Sci, El Jadida, Morocco
[2] Paris 13 Univ, Galilee Inst, Dept Comp Sci, Paris, France
来源
UBIQUITOUS NETWORKING, UNET 2017 | 2017年 / 10542卷
关键词
Mobile ad hoc network; MAC IEEE 802.11; Misbehavior reaction; NS2; simulation; Game theory; AD HOC NETWORKS; LAYER MISBEHAVIOR;
D O I
10.1007/978-3-319-68179-5_4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, mobile ad hoc networks are invading more and more our daily lives. Indeed, several persons are linked daily to ad hoc networks, which aim to exchange data via smartphones, computers, or tablets. A mobile ad hoc network is a group of mobile stations equipped with wireless transmitters/ receivers without fixed infrastructure use or centralized administration. In this sense, the network can be seen as a random graph due to the motion of nodes. The change of the network topology based on the time when nodes move or adjust their transmission and reception parameters. The design of these networks is characterized by its vulnerability to denial of service (DOS) attacks such as the greedy behavior (MAC layer misbehavior). In this paper, we formalized the reaction against this malicious behavior of the MAC layer by game theory. We have developed a model in the extensive form of our reaction scheme and a resolution of the game by Kuhn's algorithm. A validation of results though the NS2 network simulator is then given to the end.
引用
收藏
页码:38 / 47
页数:10
相关论文
共 12 条
[1]  
Aaroud Abdessadek, 2017, Applied Computing and Informatics, V13, P1, DOI 10.1016/j.aci.2015.11.001
[2]  
Abegunde J, 2014, IMA C GAM THEOR APPL
[3]  
[Anonymous], 2003, An Introduction to Game Theory
[4]  
Bai F., 2004, WIRELESS AD HOC SENS
[5]  
El Houssaini M., 2015, COMPUTER TECHNOLOGY, V6, P37
[6]   A Novel Reaction Scheme against the MAC Layer Misbehavior in Mobile Ad Hoc Networks [J].
El Houssaini, Mohammed-Alamine ;
Aaroud, Abdessadek ;
El Hore, Ali ;
Ben-Othman, Jalel .
7TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN 2016)/THE 6TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2016), 2016, 98 :64-71
[7]   Multivariate control chart for the detection of MAC layer misbehavior in mobile ad hoc networks [J].
El Houssaini, Mohammed-Alamine ;
Aaroud, Abdessadek ;
El Hore, Ali ;
Ben-Othman, Jalel .
7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 :58-65
[8]  
Giri V. R, 2010, P 2010 IEEE SARN S P
[9]  
Houssaini MAE, 2014, 2014 5TH WORKSHOP ON CODES, CRYPTOGRAPHY AND COMMUNICATION SYSTEMS (WCCCS' 14), P50, DOI 10.1109/WCCCS.2014.7107918
[10]  
IEEE Standards Association, 2012, 80211 IEEE, P818