Evolutionary Game-Based Defense Mechanism in the MANETs

被引:4
作者
Bouhaddi, Myria [1 ]
Adi, Kamel [1 ]
Radjef, Mohammed Said [2 ]
机构
[1] Univ Quebec, Comp Secur Res Lab, Outaouais, PQ, Canada
[2] Univ Bejaia, Res Unit LaMOS Modeling & Optimizat Syst, Bejaia, Algeria
来源
SECURITY OF INFORMATION AND NETWORKS (SIN'16) | 2016年
关键词
MANET; security; evolutionary game theory; ESS; replicator dynamic;
D O I
10.1145/2947626.2947646
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Providing a long term security of a computer system requires an efficient management of the resources consumption. This is particularly true for the Mobile Adhoc NETworks (MANETs) where nodes are characterized by limited resources. In this paper, we propose a game theoretic framework to predict malicious behaviors within a MANET and to analyze the best security alternatives that preserve the resources consumption of network entities. We model the interactions between an attacker and a defender evolving in the same environment as an evolutionary game. In these games, each entity can learn about the behavior of its opponent over time allowing the adjustment of its strategy. The main results of our game model are the elaboration of the Evolutionary Stable Strategies (ESSs) which is a stronger concept of equilibria and the illustration of the evolution process, based on the replicator dynamic. Numerical experiments verify the correctness of our theoretical analysis and show the feasibility and effectiveness of our model.
引用
收藏
页码:88 / 95
页数:8
相关论文
共 17 条
  • [1] [Anonymous], 2010, 6 INT C WIR COMM NET
  • [2] Basagni S., 2004, MOBILE AD HOC NETWOR
  • [3] Basar T., 1999, Dynamic Noncooperative Game Theory, Vsecond
  • [4] A Game Approach for an Efficient Intrusion Detection System in Mobile Ad Hoc Networks
    Bouhaddi, Myria
    Radjef, Mohammed Said
    Adi, Kamel
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 131 - 146
  • [5] A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks
    Chen, Lin
    Leneutre, Jean
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (02) : 165 - 178
  • [6] Dorri A., 2012, INT J COMPUTER SCI E, V6
  • [7] Kamhoua C., 2011, PROC IEEE INT C COMM, P1
  • [8] EVOLUTIONARY COALITIONAL GAMES: DESIGN AND CHALLENGES IN WIRELESS NETWORKS
    Khan, Manzoor Ahmed
    Tembine, Hamidou
    Vasilakos, Athanasios V.
    [J]. IEEE WIRELESS COMMUNICATIONS, 2012, 19 (02) : 50 - 56
  • [9] Liu Y., 2006, PROC IEEE INT C AUTO, P1, DOI [10.1109/IEDM.2006.346953, DOI 10.1109/IEDM.2006.346953]
  • [10] Neyman A., 2009, STOCHASTIC GAMES APP, V570