IIUM Repository

ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET

Khan, Burhan Ul Islam and Olanrewaju, Rashidah Funke and Anwar, Farhat and Mir, Roohie Naaz (2019) ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET. International Journal of Soft Computing and Engineering, 8 (7). pp. 506-519. ISSN 2278-3075

[img] PDF - Published Version
Restricted to Registered users only

Download (546kB) | Request a copy
PDF (Scopus)
Download (385kB) | Preview


Game Theory is a useful tool for exploring the issues concerning Mobile Ad-Hoc Network (or MANET) security. In MANETs, coordination among the portable nodes is more significant, which encompasses their vulnerability challenges to several security assaults and the inability to run securely, when storing its resources and manage secure routing between the nodes. Hence, it is imperative to design an efficient routing protocol to secure all nodes from unknown behaviors. In the current research study, the game-theory approach is utilized for analytical purpose and addresses the security problems in MANETs. The game-theoretic approach is mainly adopted to find the malicious activities in the networks. In the proposed work, a Bayesian-Signaling game model is proposed which analyses the behavior of both regular/normal and malicious nodes. The game model proposed also provides the finest actions of autonomous tactics for every node. A Bayesian-Equilibrium (BE) offers the best solution for games to resolve the incomplete information by joining strategies and players payoff which form an equilibrium. By exploiting the BE mechanism, the system can detect the behavior of regular as well as malicious nodes. Therefore, Efficient ComputationalModelling based on Game Theory or ECM-GT methodology will reduce the utility of malicious nodes and increase the utility of regular nodes. Also, it stimulates the best co-operation among the nodes by exploiting the reputation system. On comparing our results with the existing systems, it was found that the proposed algorithm performed better in the detection of malicious nodes, throughput, false positive rate and detection of attacks.

Item Type: Article (Journal)
Additional Information: 6796/72187
Uncontrolled Keywords: Bayesian-Equilibrium, Game-Theory, Bayesian signaling model, MANETs, Secure routing protocol
Subjects: T Technology > T Technology (General) > T10.5 Communication of technical information
T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Engineering
Kulliyyah of Engineering > Department of Electrical and Computer Engineering
Depositing User: Dr. Rashidah Funke Olanrewaju
Date Deposited: 16 May 2019 08:20
Last Modified: 24 Nov 2019 23:37
URI: http://irep.iium.edu.my/id/eprint/72187

Actions (login required)

View Item View Item


Downloads per month over past year