IIUM Repository

Game theory analysis and modeling of sophisticated multi-collusion attack in MANETs

Khan, Burhan Ul Islam and Anwar, Farhat and Olanrewaju, Rashidah Funke and Mat Kiah, Miss Laiha and Mir, Roohie Naaz (2021) Game theory analysis and modeling of sophisticated multi-collusion attack in MANETs. IEEE Access, 9. 61778 -61792. ISSN 2169-3536 (In Press)

PDF - Published Version
Download (6MB) | Preview
[img] PDF (Article) - Published Version
Restricted to Registered users only

Download (6MB) | Request a copy
PDF (Scopus In Press) - Accepted Version
Download (392kB) | Preview


Mobile Adhoc Network (MANET) has been a core topic of research since the last decade. Currently, this form of networking paradigm is increasingly being construed as an integral part of upcoming urban applications of Internet-of-Things (IoT), consisting of massive connectivity of diverse types of nodes. There is a significant barrier to the applicability of existing routing approaches in conventional MANETs when integrated with IoT. This routing mismatch can lead to security risks for the MANET-based application tied with the IoT platform. This paper examines a pragmatic scenario as a test case wherein the mobile nodes must exchange multimedia signals for supporting real-time streaming applications. There exist two essential security requirements viz. i) securing the data packet and ii) understanding the unpredictable behavior of the attacker. The current study considers sophistication on the part of attacker nodes. They are aware of each other’s identity and thereby collude to conduct lethal attacks, which is rarely reflected in existing security modeling statistics. This research harnesses the potential modeling aspect of game theory to model the multiple-collusion attacker scenario. It contributes towards i) modeling strategies of regular/malicious nodes and ii) applying optimization principle using novel auxiliary information to formulate the optimal strategies. The model advances each regular node’s capability to carry out precise computation about the opponent player’s strategy prediction, i.e., malicious node. The simulation outcome of the proposed mathematical model in MATLAB ascertains that it outperforms the game theory’s baseline approach.

Item Type: Article (Journal)
Additional Information: 6796/89661
Uncontrolled Keywords: Colluder, game theory, mobile adhoc network, multi-collusion attacker, multistage game,secure routing.
Subjects: T Technology > T Technology (General)
T Technology > T Technology (General) > T10.5 Communication of technical information
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Engineering
Kulliyyah of Engineering > Department of Electrical and Computer Engineering
Depositing User: Dr. Rashidah Funke Olanrewaju
Date Deposited: 03 May 2021 20:41
Last Modified: 03 May 2021 20:41
URI: http://irep.iium.edu.my/id/eprint/89661

Actions (login required)

View Item View Item


Downloads per month over past year