Bayesian signaling game based efficient security model for MANETs

Game Theory acts as a suitable tool offering promising solutions to security-related concerns in Mobile Ad Hoc Networks (i.e., MANETs). In MANETs, security forms a prominent concern as it includes nodes which are usually portable and require significant coordination between them. Further, the absenc...

Full description

Bibliographic Details
Main Authors: Olanrewaju, Rashidah Funke, Khan, Burhan Ul Islam, Anwar, Farhat, Mir, Roohie Naaz, Yaacob, Mashkuri, Mehraj, Tehseen
Other Authors: Arai, Kohei
Format: Conference or Workshop Item
Language:English
English
Published: Springer, Cham 2020
Subjects:
Online Access:http://irep.iium.edu.my/70885/
http://irep.iium.edu.my/70885/
http://irep.iium.edu.my/70885/
http://irep.iium.edu.my/70885/1/Bayesian%20Signaling%20Game%20Based%20Efficient.pdf
http://irep.iium.edu.my/70885/7/70885_Bayesian%20signaling%20game%20based%20efficient%20security%20model%20for%20MANETs_scopus.pdf
Description
Summary:Game Theory acts as a suitable tool offering promising solutions to security-related concerns in Mobile Ad Hoc Networks (i.e., MANETs). In MANETs, security forms a prominent concern as it includes nodes which are usually portable and require significant coordination between them. Further, the absence of physical organisation makes such networks susceptible to security breaches, hindering secure routing and execution among nodes. Game Theory approach has been manipulated in the current study to achieve an analytical view while addressing the security concerns in MANETs. This paper offers a Bayesian-Signaling game model capable of analysing the behaviour associated with regular as well as malicious nodes. In the proposed model, the utility of normal nodes has been increased while reducing the utility linked to malicious nodes. Moreover, the system employs a reputation system capable of stimulating best cooperation between the nodes. The regular nodes record incessantly to examine their corresponding nodes’ behaviours by using the belief system of Bayes-rules. On its comparison with existing schemes, it was revealed that the presented algorithm provides better identification of malicious nodes and attacks while delivering improved throughput and reduced false positive rate.