ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET
Game Theory is a useful tool for exploring the issues concerning Mobile Ad-Hoc Network (or MANET) security. In MANETs, coordination among the portable nodes is more significant, which encompasses their vulnerability challenges to several security assaults and the inability to run securely, when...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
Blue Eyes Intelligence Engineering & Sciences Publication
2019
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/72187/1/F3833048619.pdf http://irep.iium.edu.my/72187/7/72187_International%20Journal%20of%20Soft%20Computing%20and%20Engineering_scopus.pdf http://irep.iium.edu.my/72187/ https://www.ijitee.org/wp-content/uploads/papers/v8i7/F3833048619.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.iium.irep.72187 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.721872019-11-24T15:37:57Z http://irep.iium.edu.my/72187/ ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET Khan, Burhan Ul Islam Olanrewaju, Rashidah Funke Anwar, Farhat Mir, Roohie Naaz T10.5 Communication of technical information TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices Game Theory is a useful tool for exploring the issues concerning Mobile Ad-Hoc Network (or MANET) security. In MANETs, coordination among the portable nodes is more significant, which encompasses their vulnerability challenges to several security assaults and the inability to run securely, when storing its resources and manage secure routing between the nodes. Hence, it is imperative to design an efficient routing protocol to secure all nodes from unknown behaviors. In the current research study, the game-theory approach is utilized for analytical purpose and addresses the security problems in MANETs. The game-theoretic approach is mainly adopted to find the malicious activities in the networks. In the proposed work, a Bayesian-Signaling game model is proposed which analyses the behavior of both regular/normal and malicious nodes. The game model proposed also provides the finest actions of autonomous tactics for every node. A Bayesian-Equilibrium (BE) offers the best solution for games to resolve the incomplete information by joining strategies and players payoff which form an equilibrium. By exploiting the BE mechanism, the system can detect the behavior of regular as well as malicious nodes. Therefore, Efficient ComputationalModelling based on Game Theory or ECM-GT methodology will reduce the utility of malicious nodes and increase the utility of regular nodes. Also, it stimulates the best co-operation among the nodes by exploiting the reputation system. On comparing our results with the existing systems, it was found that the proposed algorithm performed better in the detection of malicious nodes, throughput, false positive rate and detection of attacks. Blue Eyes Intelligence Engineering & Sciences Publication 2019-05 Article PeerReviewed application/pdf en http://irep.iium.edu.my/72187/1/F3833048619.pdf application/pdf en http://irep.iium.edu.my/72187/7/72187_International%20Journal%20of%20Soft%20Computing%20and%20Engineering_scopus.pdf Khan, Burhan Ul Islam and Olanrewaju, Rashidah Funke and Anwar, Farhat and Mir, Roohie Naaz (2019) ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET. International Journal of Soft Computing and Engineering, 8 (7). pp. 506-519. ISSN 2278-3075 https://www.ijitee.org/wp-content/uploads/papers/v8i7/F3833048619.pdf |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English English |
topic |
T10.5 Communication of technical information TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices |
spellingShingle |
T10.5 Communication of technical information TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices Khan, Burhan Ul Islam Olanrewaju, Rashidah Funke Anwar, Farhat Mir, Roohie Naaz ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET |
description |
Game Theory is a useful tool for exploring the issues
concerning Mobile Ad-Hoc Network (or MANET) security. In
MANETs, coordination among the portable nodes is more
significant, which encompasses their vulnerability challenges to
several security assaults and the inability to run securely, when
storing its resources and manage secure routing between the
nodes. Hence, it is imperative to design an efficient routing
protocol to secure all nodes from unknown behaviors. In the
current research study, the game-theory approach is utilized for
analytical purpose and addresses the security problems in
MANETs. The game-theoretic approach is mainly adopted to find
the malicious activities in the networks. In the proposed work, a
Bayesian-Signaling game model is proposed which analyses the
behavior of both regular/normal and malicious nodes. The game
model proposed also provides the finest actions of autonomous
tactics for every node. A Bayesian-Equilibrium (BE) offers the
best solution for games to resolve the incomplete information by
joining strategies and players payoff which form an equilibrium.
By exploiting the BE mechanism, the system can detect the
behavior of regular as well as malicious nodes. Therefore,
Efficient ComputationalModelling based on Game Theory or
ECM-GT methodology will reduce the utility of malicious nodes
and increase the utility of regular nodes. Also, it stimulates the
best co-operation among the nodes by exploiting the reputation
system. On comparing our results with the existing systems, it was
found that the proposed algorithm performed better in the
detection of malicious nodes, throughput, false positive rate and
detection of attacks. |
format |
Article |
author |
Khan, Burhan Ul Islam Olanrewaju, Rashidah Funke Anwar, Farhat Mir, Roohie Naaz |
author_facet |
Khan, Burhan Ul Islam Olanrewaju, Rashidah Funke Anwar, Farhat Mir, Roohie Naaz |
author_sort |
Khan, Burhan Ul Islam |
title |
ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET |
title_short |
ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET |
title_full |
ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET |
title_fullStr |
ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET |
title_full_unstemmed |
ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET |
title_sort |
ecm-gt: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in manet |
publisher |
Blue Eyes Intelligence Engineering & Sciences Publication |
publishDate |
2019 |
url |
http://irep.iium.edu.my/72187/1/F3833048619.pdf http://irep.iium.edu.my/72187/7/72187_International%20Journal%20of%20Soft%20Computing%20and%20Engineering_scopus.pdf http://irep.iium.edu.my/72187/ https://www.ijitee.org/wp-content/uploads/papers/v8i7/F3833048619.pdf |
_version_ |
1651865914549731328 |
score |
13.211869 |