An Optimal Method for Detecting Internal and External Intrusion in MANET

Mobile Ad hoc Network (MANET) is formed by a set of mobile hosts which communicate among themselves through radio waves. The hosts establish infrastructure and cooperate to forward data in a multi-hop fashion without a central administration. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions. In this paper, we proposed a method for prevention internal intruder and detection external intruder by using game theory in mobile ad hoc network. One optimal solution for reducing the resource consumption of detection external intruder is to elect a leader for each cluster to provide intrusion service to other nodes in the its cluster, we call this mode moderate mode. Moderate mode is only suitable when the probability of attack is low. Once the probability of attack is high, victim nodes should launch their own IDS to detect and thwart intrusions and we call robust mode. In this paper leader should not be malicious or selfish node and must detect external intrusion in its cluster with minimum cost. Our proposed method has three steps: the first step building trust relationship between nodes and estimation trust value for each node to prevent internal intrusion. In the second step we propose an optimal method for leader election by using trust value; and in the third step, finding the threshold value for notifying the victim node to launch its IDS once the probability of attack exceeds that value. In first and third step we apply Bayesian game theory. Our method due to using game theory, trust value and honest leader can effectively improve the network security, performance and reduce resource consumption.

[1]  Ratan K. Guha,et al.  Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[2]  Robert H. Deng,et al.  Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.

[3]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[4]  Prabir Bhattacharya,et al.  A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[5]  Guy Pujolle,et al.  A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.

[6]  P. Morris Introduction to Game Theory , 1994 .

[7]  Macia-FernandezG.,et al.  Anomaly-based network intrusion detection , 2009 .

[8]  Lata Narayanan,et al.  Games to induce specified equilibria , 2008, Theor. Comput. Sci..

[9]  Marco Aldinucci,et al.  Computational Science - ICCS 2008, 8th International Conference, Kraków, Poland, June 23-25, 2008, Proceedings, Part I , 2008, ICCS.

[10]  Yang Xiao,et al.  Intrusion detection techniques in mobile ad hoc and wireless sensor networks , 2007, IEEE Wireless Communications.

[11]  Chuang Lin,et al.  Game-Based Trust Establishment for Mobile Ad Hoc Networks , 2009, 2009 WRI International Conference on Communications and Mobile Computing.

[12]  Prabir Bhattacharya,et al.  A game-theoretic intrusion detection model for mobile ad hoc networks , 2008, Comput. Commun..

[13]  A. Patcha,et al.  A game theoretic approach to modeling intrusion detection in mobile ad hoc networks , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[14]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[15]  G. Pulla,et al.  A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .

[16]  Meng Wu,et al.  A Trust Evaluation Method for Node Cooperation in Mobile Ad Hoc Networks , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).

[17]  Prabir Bhattacharya,et al.  A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[18]  John S. Baras,et al.  On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.

[19]  Orhan Dagdeviren,et al.  A Hierarchical Leader Election Protocol for Mobile Ad Hoc Networks , 2008, ICCS.