Advanced Security Mechanism for Mobile Ad hoc Networks

International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1 Issue 5 (June 2014)
ISSN: 2349-2163
http://ijirae.com
Advanced Security Mechanism for Mobile Ad hoc Networks
using Game Theoretic Approach
Dr. S.K. Mahendran
Director, Department of Master of Computer Applications,
SVS Institute of Computer Applications,
Coimbatore, Tamil Nadu, India
Abstract --Game philosophy can deliver a useful tool to study the safety problem in mobile ad hoc networks (MANETs).
Most of obtainable works on smearing game theories to safety only consider two players in the security game typical: an
assailant and a protector. While this supposition may be valid for a network with centralized administration, it is not
truthful in MANETs, where centralized administration is not available. In this paper, using recent improvements in mean
field game theory, we propose a unique game hypothetical approach with multiple players for safety in MANETs. The mean
field game theory provides a powerful mathematical tool for problems with a large number of players. The future scheme
can enable an individual node in MANETs to make strategic security defense decisions without centralized administration.
Furthermore, each node in the planned scheme only needs to know its own state information and the collective
consequence of the other nodes in the MANET. Consequently, the proposed scheme is a fully dispersed scheme. Simulation
results are obtainable to illustrate the effectiveness of the proposed scheme.
I. INTRODUCTION
As wireless networking develops nearly universal, safety has become one of the important issues in the exploration
field of mobile ad hoc networks (MANETs). In a MANET, mobile nodes can separately organize and interconnect with each
other over bandwidth uncomfortable wireless relatives. A wireless mobile node can purpose both as a network router for
routing packets from the other nodes and as a network host for conveying and receiving data. The topology of the MANET
changes vigorously and randomly because of nodes mobility. Many dispersed procedures have been studied to control the
networking organization, routing, and link scheduling. On the other hand, the unique characteristics of MANETs present some
new challenges to sanctuary design due to the lack of any central authority and shared wireless. There are various security
threats that exist in MANETs, such as denial of service, black hole, resource consumption, location disclosure, wormhole, host
impersonation, information disclosure, and interference [1], [2].
A number of investigators have investigated the safety issues in MANETs. Essentially, there are two balancing
classes of approaches to secure a MANET: deterrence based approaches, such as verification, and discovery based approaches,
such as intrusion discovery systems (IDSs) [2], [3], [4]. Zhang and Lee in [5] not only presented the basic supplies for IDS that
works in the MANETs environment, but also proposed a general intrusion detection and response mechanism for MANETs. In
their proposed scheme, each IDS manager is involved in the intrusion detection and response tasks autonomously.
Verification is a noteworthy type of responses initiated by IDS. After a verification process, only genuine users can
continue using the network resources and bargained users will be excluded [6].Freshly, game theoretic methods have been
recommended to recover network security [7], [8]. Game theory is a valuable tool to provide a mathematical context for
demonstrating and examining verdict difficulties, since it can address problems where manifold players with contradictory
goals or incentives compete with each other.
In game theory, one player’s outcome depends not only on his/her verdicts, but also on those of others’ decisions.
Similarly, the success of a security scheme in MANETs depends not only on the actual defense approaches, but also on the
movements taken by the assailants. Bedi et al. demonstrated the interface between the assailant and the defender as a static
game in two occurrence scenarios: one assailant for DoS and multiple attackers for DDoS [9]. The concept of multi stage
dynamic non obliging game with incomplete information was presented in [10], where a separate node with IDS can detect the
attack with a probability depending on its belief updated according to its received messages. In [11], the authors integrated the
ad hoc on-demand distance vector (AODV) routing protocol for MANETs with the game theoretic method. The benefit is that
each node can transmission its packets through the route with less vigor consumption of host IDS and less possibility of attack
with the optimal decision. A context that combines the N-intertwined epidemic model with non-cooperative game prototypical
was anticipated in [12], where the authors showed that the network’s superiority largely depends on the original topology.
2.RELATED WORKS
While some outstanding exploration has been done on addressing the safe keeping concerns in MANETs using game academic
methods, most of the existing work only considered a security game model with two players in the security game prototypical:
an assailant and a protector. For the problematic situations with multiple assailants versus manifold protectors, the sanctuary
game is usually modeled as a two player game in which the whole of the defenders is preserved as one player, as is the whole
of assailants. While this supposition may be valid for a network with federal supervision, it is not representative in MANETs,
______________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved
Page - 216
International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1 Issue 5 (June 2014)
ISSN: 2349-2163
http://ijirae.com
where federal administration is not available. Accordingly, each separate node in a MANET should be treated distinctly in the
security game model.
Fig. 1. A N-node MANET with an attacker
In this paper, using recent developments in mean field game theory [14], we recommend a novel game theoretic
approach for security in MANETs. The mean field game theory provides a powerful mathematical tool for problems with a
large number of players. It has been successfully used by economists, collectivists, and contrives in different areas, among
others [15]. In communication networks, several researchers have tried to use mean field estimate method and mean field game
philosophies to solve the energy efficiency and medium access control [13] problems. To the best of our information, using
mean field game hypothetical approach for safety in MANETs has not been considered in the existing works. The contributions
of this work are as follows.
3. PROPOSED WORK
We propose a Dynamic Field Game Approach (DFGA) to enable an individual node in MANETs to make strategic
security defense decisions without centralized administration. Since safety defense mechanisms in a wireless mobile node
consume precious system resources (e.g., energy), the proposed scheme considers not only the security requirement of
MANETs but also the system resources. In the proposed mean field game hypothetical approach, each node only needs to
know its own state information and the collective effect of the other nodes in the MANET. Accordingly, the anticipated
scheme is a fully distributed arrangement. I-node MANET and an attacker are obtainable. Then the security problem of this
system is formulated as and I +1 mean field game. The genuine nodes are independent because there is no centralized
administration in the MANET.
When the attacker has successfully attacked the MANET, some rewards (e.g., secret information) can be acquired by
the attacker from the MANET. If the attacker failed because of the target node introduction the defense action, some rewards
(e.g., attack information) will be given to the target MANET node for its successful defense. Furthermore, the assailant and the
protectors all need to pay the cost (e.g., energy feasting) for their individual actions. We model this scheme as an i+1 mean
field game model as follows. We deliberate the defending MANET nodes as the N minor players. The foremost player’s state
is defined as a combination of vigor and information assets, which can be denoted by∝
+∝
.Meanwhile, the minor
players’ state is defined as a combination of energy and security assets, which is denoted by∝
+∝
.
When one state is “full vitality” and the key thespian could select the deed to strongly attack the whole network. As a
result, the energy cost is much higher than the one when the state is “deprived vitality” and the foremost player does not
occurrence. We define the instantaneous cost of the major player as follows:
( (x), (x), ( ) (x))
( )
(x))must also represent the regular reflection of the whole mean field to the major player’s bout.
In MANETs, it is difficult to unswervingly and sharp obtain ( ) (x))which represents the typical state of all the
inconsequential players, due to the dynamic changing topology and the lack of centralized administration. To overcome the
fundamental complexity and method can remain used to estimate the random ration process ( ) (x)) with a limiting process. In
MANETs, that the random process’s update is driven by the attacker’s current state and the current average state of MANETs.
We assume the minor player has two states. The limiting process ( )should contain two vectors: ( ) = { ( ), (x).The
setup of the above nodes’ transition matrices and cost matrices below can be done as follows. In constructing these values, we
______________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved
Page - 217
International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1 Issue 5 (June 2014)
ISSN: 2349-2163
http://ijirae.com
assume that most node properties can be made known, which should be realistic particularly for MANETs where initial
planning and device management is an a priori requirement.
By “node properties” we mean the states and information that are used as input to the transition and cost matrices. If
these properties are not available, the matrices can be learned on-line when the system is running. We can see that, when the
state of the major player is negative attacking, the values of v are always below zero. The result also reflects that more attacks
may not produce more rewards, if the defenders’ successful detection rate is fixed. This is because the cost of occurrence may
be much sophisticated than the rewards for the major player. Throughout the game process, we consider the assailant always
runs with its optimal strategy, so we can obtain the assailant’s states by detecting its action here. These optimal state transition
laws can work well for the minor player, no matter which action the major player chooses. The average lifetime and the
negotiating probability of the MANET are also compared. We also consider the condition of the nodes in the MANET with
sufficient energy. The decrease of conceding probability and the improvement of lifetime using the optimal strategy are
depicted.
4. RESULTS AND DISCUSSION
The proposed protocol DFGA is simulated with NS2 simulator with the below settings and also compared with the AODV
protocol with the performance metrics packet delivery ratio, delay and throughput. Results show that DFGA outperforms better
in all the aspects than the AODV protocol. The settings used for the simulation are as below:
No. of Nodes
200
Terrain Size
100, 150, 200, 150
(in meters)
MAC
Radio
Transmission Range
Simulation Time
Traffic Source
Packet Size
Mobility Model
Initial Energy
Speed
802.11b
50 to 250 meters
100 seconds
CBR (Constant Bit Rate)
256 Kbits
Random Waypoint
Model
1 to 3 Joules
2.5 m/s
4.1 Packet Delivery Ratio
It is the ratio of the number of packets received successfully and the total number of packets transmitted
Fig.1: Transmission Range vs Packet Delivery Ratio
4.2 Throughput
Throughput is the ratio of number of packets sent and total number of packets.
______________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved
Page - 218
International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1 Issue 5 (June 2014)
ISSN: 2349-2163
http://ijirae.com
Fig.2: Transmission Range vs Throughput
4.3 DELAY
The delay is averaged over all surviving data packets from the sources to the destinations.
Fig.3: Transmission Range vs Delay
4.4 Energy
It is the total power consumed by the node for the transferring of data from on node to another till it reaches the destination
Fig.4: Transmission Range vs Energy
5.CONCLUSION
In this paper, a novel field game theoretic methodology for security in MANETs is modeled for communications
among a malicious node and a large quantity of genuine MANET nodes. Unlike the existing works on security game modeling,
the proposed scheme can enable an individual node in MANETs to make distributed security defense pronouncements in all
aspects. Both security requirement and system resources were considered in the proposed organization. The simulation results
verified that, with the optimal strategy, the legitimate nodes can choose distributed actions intelligently to reduce their energy
ingesting and security value damage. The average generation of the MANET can be improved significantly and the
compromising probability can be reduced as well, that is with the performance metrics packet delivery ratio, throughput, delay
and energy. DFGA protocol played a vital role in securing the data from source and destination when compared to AODV and
also it outperforms in saving reducing the energy consuming. In our future work, we will extend our proposed scheme to the
scenario of multiple assailants and multiple defenders.
______________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved
Page - 219
International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1 Issue 5 (June 2014)
ISSN: 2349-2163
http://ijirae.com
References
[1] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in mobile ad hoc networks: challenges and solutions,” IEEE Trans.
Wireless Commun., vol. 11, pp. 38–47, Feb. 2004.
[2] Q. Guan, F. R. Yu, S. Jiang, and V. Leung, “Joint topology control and authentication design in mobile ad hoc networks
with cooperative communications,” IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2674– 2685, July 2012.
[3] Q. Guan, F. R. Yu, S. Jiang, and V. Leung, “Joint topology control and authentication design in mobile ad hoc networks
with cooperative communications,” IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2674– 2685, July 2012. [4] J. Liu, F. R.
Yu, C.-H. Lung, and H. Tang, “Optimal combined intrusion detection and biometric-based continuous authentication in
high security mobile ad hoc networks,” IEEE Trans. Wireless Commun., vol. 8, no. 2, pp. 806–815, Feb. 2009.
[5] S. Bu, F. R. Yu, X. P. Liu, and H. Tang, “Structural results for combined continuous user authentication and intrusion
detection in high security mobile ad-hoc networks,” IEEE Trans. Wireless Commun., vol. 10, no. 9, pp. 3064–3073, Sept.
2011.
[6] Y. Zhang and W. Lee, “Intrusion detection in wireless ad hoc networks,” in Proc. 2000 ACM MOBICOM, pp. 275–283.
[7] T. Alpcan and T. Basar, Network Security: A Decision and Game Theoretic Approach. Cambridge University Press, 2010.
[8] X. Liang and Y. Xiao, “Game theory for network security,” IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 472–486,
2013.
[9] H. Bedi, S. Roy, and S. Shiva, “Game theory-based defense mecha- nisms against ddos attacks on TCP/TCP-friendly
flows,” in Proc. 2011 Computational Intelligence Cyber Security, pp. 129–136.
[10] A. Patcha and J. M. Park, “A game theoretic formulation for intrusion detection in mobile ad hoc networks,” Int’l J. Netw.
Security, vol. 2, no. 2, pp. 131–137, 2006.
[11] E. A. Panaousis and C. Politis, “A game theoretic approach for securing AODV in emergency mobile ad hoc networks,”
in Proc. 2009 IEEE Conf. Local Comput. Netw., vol. 53, pp. 985–992.
[12] J. Omic, A. Orda, and P. Van Mieghem, “Protecting against network in- fections: a game theoretic perspective,” in Proc.
2009 IEEE INFOCOM, pp. 1485–1493
[13] M. Huang, P. Caines, and R. Malhame, “The NCE (mean field) principle with locality dependent cost interactions,” IEEE
Trans. Auto. Control, vol. 55, no. 12, pp. 2799–2805, Dec. 2010.
[14] M. Y. Huang, “Mean field stochastic games with discrete states and mixed players,” in Proc. 2012 GameNets. [15] F.
Meriaux, V. Varma, and S. Lasaulce, “Mean field energy games in wireless networks,” in Proc. 2012 Asilomar Conf.
Signals, Syst., Comput.
[16] H. Tembine, P. Vilanova, M. Assaad, and M. Debbah, “Mean field stochastic games for SINR-based medium access
control,” in Proc. 2011 Int’l ICST Conf. Performance Evaluation Methodologies Tools.
______________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved
Page - 220