American Journal of Electrical and Computer Engineering

| Peer-Reviewed |

A Survey on Game Theory Approaches for Improving Security in MANET

Received: 02 May 2018    Accepted: 29 May 2018    Published: 12 June 2018
Views:       Downloads:

Share This Article

Abstract

The MANET is the most widely used networks due to the usage of wide range of multimedia applications over the wireless networks. One of the main features of nodes in mobile ad hoc networks (MANETs) is their collaboration with neighbors to propagate data. Exploiting this feature, malicious nodes collaborate with normal nodes to disturb network operation and reduce its efficiency. These nodes attack other network nodes and avoid being detected by other nodes through using the mobility characteristic of nodes in MANETs. Because of the infrastructure less network, battery constraint and the non-cooperative environment it is difficult to provide security to the network. Some nodes try to save their energy and start to exhibit malicious activities like dropping the packet by not forwarding etc. Due to such security problems in the network, the routing also becomes inefficient. Hence to improve the routing efficiency along with security, several techniques have been used so far. One of the effective ways to detect malicious nodes is using game theory. In this work, several such routing techniques have been compared and analyzed and a survey has been made. The different kinds of security attacks have been analyzed and the proposed solutions have been tabulated in this survey.

DOI 10.11648/j.ajece.20180201.11
Published in American Journal of Electrical and Computer Engineering (Volume 2, Issue 1, June 2018)
Page(s) 1-4
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

MANET, Malicious, Route Request, Route Reply, Authentication

References
[1] Seema Mehla et. al. (2010) “Analyzing security of Authenticated Routing Protocol (ARAN), International Journal on Computer Science and Engineering Vol. 02, No. 03, 664-668.
[2] Chuanqi Gong, Sheng Wu and Yanmin Jing (2012) “ARAN protocol analysis and improvement”, International conference on System Science, Engineering Design and Manufacturing Informatization, vol. 02, 347-350.
[3] R. Pushpalakshmi and A. Vincent Antony Kumar (2010) “Security aware minimized dominating set based routing in MANET” Second International conference on Computing, Communication and Networking Technologies, 1-5.
[4] Yih-Chun Hu, David B. Johnson, Adrian Perrig (2003)” SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks” ELSEVIER, PA 15213.
[5] Yih Chun Hu, Adrian Perrig and David B. Johnson “Ariadne: A Secure On-Demand Routing Protocol for springer 2005Ad Hoc Networks”.
[6] S. Buchegger and J. Y. L. Boudec (2002), “Performance analysis of the CONFIDANT Protocol, cooperation of nodes - Fairness in dynamic ad hoc networks,” inProc. IEEE/ACMMOBIHOC, June
[7] P. Michiardi and R. Molva (2002), “CORE:Acollab orative reputation mechanism to enforce node cooperation in mobile ad hoc networks,” 6th Joint Working Conf. Commun. and Multimedia Security: Advanced Commun. And Multimedia Security, pp. 107–121.
[8] F. Li and J. Wu (2010), “Attack and Flee: Game theory based analysis on interactions among nodes in MANETs,” IEEE Trans. Syst., Man Cybern., vol. 40, pp. 612-622.
[9] Manshaei. M. H et al. (2013), “Game theory meets network security and privacy,” J. ACM Comput. Surv, vol. 45, no. 3.
[10] S. Yi, P. Naldurg and R. Krvets, “Security Aware Ad hoc Routing for Wireless networks”, Proc. 2nd ACM Symp. Mobile Ad Hoc net. and Comp. (Mobihoc’01), Long Beach, CA, Oct. 2001, pp. 299-302.
[11] M. G. Zapata and N. Asokan, “Secure Ad-Hoc On-demand Distance Vector Routing”, ACM Mobile Comp. and Commun. Review, vol. 3, no., July 2002, pp. 106-07.
[12] P. Papadimitratos and Z. J. Haas, “Securing the internet routing infrastructure”, IEEE Commun. Mag., vol. 10, no. 40, oct 2002, pp. 60-68.
[13] David B. Johnson and David A. Maltz, Dynamic Source Routing in Ad-Hoc Wireless Networks, Mobile Computing, edited by Tomasz Imielinski and Hank Korth, Kluwer Academic Publishers, Chapter 5, 1996, pp. 153-181.
[14] Charles E. Perkins, Elizabeth M. Royer and Samir R. Das, Ad Hoc On Demand Distance Vector (AODV) Routing, IETF Internet Draft draft-ietfmanet-aodv-08. txt, March 2001.
Author Information
  • Department of Electronics and Communication Engineering, Rajalakshmi Institute of Technology, Chennai, India

Cite This Article
  • APA Style

    Rahul Krishnan. (2018). A Survey on Game Theory Approaches for Improving Security in MANET. American Journal of Electrical and Computer Engineering, 2(1), 1-4. https://doi.org/10.11648/j.ajece.20180201.11

    Copy | Download

    ACS Style

    Rahul Krishnan. A Survey on Game Theory Approaches for Improving Security in MANET. Am. J. Electr. Comput. Eng. 2018, 2(1), 1-4. doi: 10.11648/j.ajece.20180201.11

    Copy | Download

    AMA Style

    Rahul Krishnan. A Survey on Game Theory Approaches for Improving Security in MANET. Am J Electr Comput Eng. 2018;2(1):1-4. doi: 10.11648/j.ajece.20180201.11

    Copy | Download

  • @article{10.11648/j.ajece.20180201.11,
      author = {Rahul Krishnan},
      title = {A Survey on Game Theory Approaches for Improving Security in MANET},
      journal = {American Journal of Electrical and Computer Engineering},
      volume = {2},
      number = {1},
      pages = {1-4},
      doi = {10.11648/j.ajece.20180201.11},
      url = {https://doi.org/10.11648/j.ajece.20180201.11},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.ajece.20180201.11},
      abstract = {The MANET is the most widely used networks due to the usage of wide range of multimedia applications over the wireless networks. One of the main features of nodes in mobile ad hoc networks (MANETs) is their collaboration with neighbors to propagate data. Exploiting this feature, malicious nodes collaborate with normal nodes to disturb network operation and reduce its efficiency. These nodes attack other network nodes and avoid being detected by other nodes through using the mobility characteristic of nodes in MANETs. Because of the infrastructure less network, battery constraint and the non-cooperative environment it is difficult to provide security to the network. Some nodes try to save their energy and start to exhibit malicious activities like dropping the packet by not forwarding etc. Due to such security problems in the network, the routing also becomes inefficient. Hence to improve the routing efficiency along with security, several techniques have been used so far. One of the effective ways to detect malicious nodes is using game theory. In this work, several such routing techniques have been compared and analyzed and a survey has been made. The different kinds of security attacks have been analyzed and the proposed solutions have been tabulated in this survey.},
     year = {2018}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - A Survey on Game Theory Approaches for Improving Security in MANET
    AU  - Rahul Krishnan
    Y1  - 2018/06/12
    PY  - 2018
    N1  - https://doi.org/10.11648/j.ajece.20180201.11
    DO  - 10.11648/j.ajece.20180201.11
    T2  - American Journal of Electrical and Computer Engineering
    JF  - American Journal of Electrical and Computer Engineering
    JO  - American Journal of Electrical and Computer Engineering
    SP  - 1
    EP  - 4
    PB  - Science Publishing Group
    SN  - 2640-0502
    UR  - https://doi.org/10.11648/j.ajece.20180201.11
    AB  - The MANET is the most widely used networks due to the usage of wide range of multimedia applications over the wireless networks. One of the main features of nodes in mobile ad hoc networks (MANETs) is their collaboration with neighbors to propagate data. Exploiting this feature, malicious nodes collaborate with normal nodes to disturb network operation and reduce its efficiency. These nodes attack other network nodes and avoid being detected by other nodes through using the mobility characteristic of nodes in MANETs. Because of the infrastructure less network, battery constraint and the non-cooperative environment it is difficult to provide security to the network. Some nodes try to save their energy and start to exhibit malicious activities like dropping the packet by not forwarding etc. Due to such security problems in the network, the routing also becomes inefficient. Hence to improve the routing efficiency along with security, several techniques have been used so far. One of the effective ways to detect malicious nodes is using game theory. In this work, several such routing techniques have been compared and analyzed and a survey has been made. The different kinds of security attacks have been analyzed and the proposed solutions have been tabulated in this survey.
    VL  - 2
    IS  - 1
    ER  - 

    Copy | Download

  • Sections