Modeling malicious multi-attacker node collusion in MANETs via game theory

Althoughthe mitigation approaches towards securing the mobile adhoc networks against malicious nodes have been explored widely in recent years but there is a dearth of solutions that can prove effective in addressing the behavior of malicious nodes within a network. As a result, visualizing the ma...

Full description

Bibliographic Details
Main Authors: Khan, Burhan Ul Islam, Olanrewaju, Rashidah Funke, Matoo, Mohd Mueen Ul-Islam, Abdul Aziz, Afza, Ahmad Lone, Sajaad
Format: Article
Language:English
Published: IDOSI Publications 2017
Subjects:
Online Access:http://irep.iium.edu.my/56761/
http://irep.iium.edu.my/56761/
http://irep.iium.edu.my/56761/
http://irep.iium.edu.my/56761/1/Modeling%20Malicious%20Multi-Attacker%20Node%20Collusion.pdf
id iium-56761
recordtype eprints
spelling iium-567612017-11-03T03:02:35Z http://irep.iium.edu.my/56761/ Modeling malicious multi-attacker node collusion in MANETs via game theory Khan, Burhan Ul Islam Olanrewaju, Rashidah Funke Matoo, Mohd Mueen Ul-Islam Abdul Aziz, Afza Ahmad Lone, Sajaad Q Science (General) QA Mathematics QA75 Electronic computers. Computer science Althoughthe mitigation approaches towards securing the mobile adhoc networks against malicious nodes have been explored widely in recent years but there is a dearth of solutions that can prove effective in addressing the behavior of malicious nodes within a network. As a result, visualizing the malicious nodes effectively through various simulation techniques is considered to be the most challenging issue. Owing to the fact that malicious nodes do not employ any such approaches that are probable to be detected, they show confusing behavior which makes it nearly impossible to distinguish them as malicious or regular nodes. The proposed study highlights the ability of game theory for enhancing the multi-attacker collusion approach to represent the unpredictable behavior of nodes in cooperating, reporting, declining or attacking other nodes to achieve effective modelling of the range of mobile nodes in a mobile adhoc network. IDOSI Publications 2017 Article PeerReviewed application/pdf en http://irep.iium.edu.my/56761/1/Modeling%20Malicious%20Multi-Attacker%20Node%20Collusion.pdf Khan, Burhan Ul Islam and Olanrewaju, Rashidah Funke and Matoo, Mohd Mueen Ul-Islam and Abdul Aziz, Afza and Ahmad Lone, Sajaad (2017) Modeling malicious multi-attacker node collusion in MANETs via game theory. Middle-East Journal of Scientific Research, 25 (3). pp. 568-579. ISSN 1990-9233 E-ISSN 1999-8147 https://www.idosi.org/mejsr/mejsr25(3)17.htm 10.5829/idosi.mejsr.2017.568.579
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic Q Science (General)
QA Mathematics
QA75 Electronic computers. Computer science
spellingShingle Q Science (General)
QA Mathematics
QA75 Electronic computers. Computer science
Khan, Burhan Ul Islam
Olanrewaju, Rashidah Funke
Matoo, Mohd Mueen Ul-Islam
Abdul Aziz, Afza
Ahmad Lone, Sajaad
Modeling malicious multi-attacker node collusion in MANETs via game theory
description Althoughthe mitigation approaches towards securing the mobile adhoc networks against malicious nodes have been explored widely in recent years but there is a dearth of solutions that can prove effective in addressing the behavior of malicious nodes within a network. As a result, visualizing the malicious nodes effectively through various simulation techniques is considered to be the most challenging issue. Owing to the fact that malicious nodes do not employ any such approaches that are probable to be detected, they show confusing behavior which makes it nearly impossible to distinguish them as malicious or regular nodes. The proposed study highlights the ability of game theory for enhancing the multi-attacker collusion approach to represent the unpredictable behavior of nodes in cooperating, reporting, declining or attacking other nodes to achieve effective modelling of the range of mobile nodes in a mobile adhoc network.
format Article
author Khan, Burhan Ul Islam
Olanrewaju, Rashidah Funke
Matoo, Mohd Mueen Ul-Islam
Abdul Aziz, Afza
Ahmad Lone, Sajaad
author_facet Khan, Burhan Ul Islam
Olanrewaju, Rashidah Funke
Matoo, Mohd Mueen Ul-Islam
Abdul Aziz, Afza
Ahmad Lone, Sajaad
author_sort Khan, Burhan Ul Islam
title Modeling malicious multi-attacker node collusion in MANETs via game theory
title_short Modeling malicious multi-attacker node collusion in MANETs via game theory
title_full Modeling malicious multi-attacker node collusion in MANETs via game theory
title_fullStr Modeling malicious multi-attacker node collusion in MANETs via game theory
title_full_unstemmed Modeling malicious multi-attacker node collusion in MANETs via game theory
title_sort modeling malicious multi-attacker node collusion in manets via game theory
publisher IDOSI Publications
publishDate 2017
url http://irep.iium.edu.my/56761/
http://irep.iium.edu.my/56761/
http://irep.iium.edu.my/56761/
http://irep.iium.edu.my/56761/1/Modeling%20Malicious%20Multi-Attacker%20Node%20Collusion.pdf
first_indexed 2023-09-18T21:20:09Z
last_indexed 2023-09-18T21:20:09Z
_version_ 1777411827256262656