2021
DOI: 10.1109/access.2021.3073343
|View full text |Cite
|
Sign up to set email alerts
|

Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs

Abstract: Mobile Adhoc Network (MANET) has been a core topic of research since the last decade. Currently, this form of networking paradigm is increasingly being construed as an integral part of upcoming urban applications of Internet-of-Things (IoT), consisting of massive connectivity of diverse types of nodes. There is a significant barrier to the applicability of existing routing approaches in conventional MANETs when integrated with IoT. This routing mismatch can lead to security risks for the MANET-based applicatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 55 publications
0
7
0
Order By: Relevance
“…Reputation-based technique [77], [78], [79] SAODV detection rates range from 90 to 100 per cent, while AODV detection rate is about 70 per cent.…”
Section: Comparison Of Node Misbehaviour Detection Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Reputation-based technique [77], [78], [79] SAODV detection rates range from 90 to 100 per cent, while AODV detection rate is about 70 per cent.…”
Section: Comparison Of Node Misbehaviour Detection Methodsmentioning
confidence: 99%
“…The fundamental goal of a reputation-based MANET solution is to identify problematic nodes through the monitoring process [77], [78], [79]. Every node in a network observes and recognises the behaviour of its neighbours in real-time, a technique known as direct or first-hand experience of reputation information.…”
Section: Reputation-basedmentioning
confidence: 99%
“…The main purpose of the proposed scheme is to develop a framework capable of resisting the participation of misbehaved nodes, as well as strategies that can identify any form of nodes with an unauthorised presence in the data-forwarding process other than regular nodes. The work is an extension of our previous research [55][56][57][58] in which game theory on MANET is incorporated in addressing security vulnerabilities due to the presence of misbehaving nodes in a much larger scenario involving mobile IoT systems and cloud environments. The framework architecture for this purpose is shown in Figure 1.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…Malicious nodes may now be accurately predicted by each normal node, thanks to the new model's enhanced capacity to do exact computations. Game theory's baseline method is outperformed by the suggested mathematical model in MATLAB simulations [7].…”
Section: Related Workmentioning
confidence: 99%