Modeling malicious multi-attacker node collusion in MANETs via game theory
Althoughthe mitigation approaches towards securing the mobile adhoc networks against malicious nodes have been explored widely in recent years but there is a dearth of solutions that can prove effective in addressing the behavior of malicious nodes within a network. As a result, visualizing the ma...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IDOSI Publications
2017
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/56761/ http://irep.iium.edu.my/56761/ http://irep.iium.edu.my/56761/ http://irep.iium.edu.my/56761/1/Modeling%20Malicious%20Multi-Attacker%20Node%20Collusion.pdf |
id |
iium-56761 |
---|---|
recordtype |
eprints |
spelling |
iium-567612017-11-03T03:02:35Z http://irep.iium.edu.my/56761/ Modeling malicious multi-attacker node collusion in MANETs via game theory Khan, Burhan Ul Islam Olanrewaju, Rashidah Funke Matoo, Mohd Mueen Ul-Islam Abdul Aziz, Afza Ahmad Lone, Sajaad Q Science (General) QA Mathematics QA75 Electronic computers. Computer science Althoughthe mitigation approaches towards securing the mobile adhoc networks against malicious nodes have been explored widely in recent years but there is a dearth of solutions that can prove effective in addressing the behavior of malicious nodes within a network. As a result, visualizing the malicious nodes effectively through various simulation techniques is considered to be the most challenging issue. Owing to the fact that malicious nodes do not employ any such approaches that are probable to be detected, they show confusing behavior which makes it nearly impossible to distinguish them as malicious or regular nodes. The proposed study highlights the ability of game theory for enhancing the multi-attacker collusion approach to represent the unpredictable behavior of nodes in cooperating, reporting, declining or attacking other nodes to achieve effective modelling of the range of mobile nodes in a mobile adhoc network. IDOSI Publications 2017 Article PeerReviewed application/pdf en http://irep.iium.edu.my/56761/1/Modeling%20Malicious%20Multi-Attacker%20Node%20Collusion.pdf Khan, Burhan Ul Islam and Olanrewaju, Rashidah Funke and Matoo, Mohd Mueen Ul-Islam and Abdul Aziz, Afza and Ahmad Lone, Sajaad (2017) Modeling malicious multi-attacker node collusion in MANETs via game theory. Middle-East Journal of Scientific Research, 25 (3). pp. 568-579. ISSN 1990-9233 E-ISSN 1999-8147 https://www.idosi.org/mejsr/mejsr25(3)17.htm 10.5829/idosi.mejsr.2017.568.579 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
Q Science (General) QA Mathematics QA75 Electronic computers. Computer science |
spellingShingle |
Q Science (General) QA Mathematics QA75 Electronic computers. Computer science Khan, Burhan Ul Islam Olanrewaju, Rashidah Funke Matoo, Mohd Mueen Ul-Islam Abdul Aziz, Afza Ahmad Lone, Sajaad Modeling malicious multi-attacker node collusion in MANETs via game theory |
description |
Althoughthe mitigation approaches towards securing the mobile adhoc networks against malicious
nodes have been explored widely in recent years but there is a dearth of solutions that can prove effective in
addressing the behavior of malicious nodes within a network. As a result, visualizing the malicious nodes
effectively through various simulation techniques is considered to be the most challenging issue. Owing to the
fact that malicious nodes do not employ any such approaches that are probable to be detected, they show
confusing behavior which makes it nearly impossible to distinguish them as malicious or regular nodes. The
proposed study highlights the ability of game theory for enhancing the multi-attacker collusion approach to
represent the unpredictable behavior of nodes in cooperating, reporting, declining or attacking other nodes to achieve effective modelling of the range of mobile nodes in a mobile adhoc network. |
format |
Article |
author |
Khan, Burhan Ul Islam Olanrewaju, Rashidah Funke Matoo, Mohd Mueen Ul-Islam Abdul Aziz, Afza Ahmad Lone, Sajaad |
author_facet |
Khan, Burhan Ul Islam Olanrewaju, Rashidah Funke Matoo, Mohd Mueen Ul-Islam Abdul Aziz, Afza Ahmad Lone, Sajaad |
author_sort |
Khan, Burhan Ul Islam |
title |
Modeling malicious multi-attacker node collusion
in MANETs via game theory |
title_short |
Modeling malicious multi-attacker node collusion
in MANETs via game theory |
title_full |
Modeling malicious multi-attacker node collusion
in MANETs via game theory |
title_fullStr |
Modeling malicious multi-attacker node collusion
in MANETs via game theory |
title_full_unstemmed |
Modeling malicious multi-attacker node collusion
in MANETs via game theory |
title_sort |
modeling malicious multi-attacker node collusion
in manets via game theory |
publisher |
IDOSI Publications |
publishDate |
2017 |
url |
http://irep.iium.edu.my/56761/ http://irep.iium.edu.my/56761/ http://irep.iium.edu.my/56761/ http://irep.iium.edu.my/56761/1/Modeling%20Malicious%20Multi-Attacker%20Node%20Collusion.pdf |
first_indexed |
2023-09-18T21:20:09Z |
last_indexed |
2023-09-18T21:20:09Z |
_version_ |
1777411827256262656 |