Game theoretic approach in multipath routing for tradeoff between routing security and performance

This paper minimizes the routing security risk while limiting the delivery ratio under an ideal value by 1) finding multiple paths between source and destination node; 2) employing the game theory to obtain the most reliability paths and further optimize shares allocation on these paths; 3) integrating secret sharing scheme, and achieving tradeoff between security risk and delivery ratio according to the tradeoff coefficient. Besides improving fault tolerance, it also improves security. In particular, it makes the eavesdropping attacks maximally difficult as the attackers would have to eavesdrop on all possible paths. Simulation evaluations validate our theoretical results and demonstrate how the routing protocol performs in terms of both security risk and performance.

[1]  A. Acquisti,et al.  Digital privacy : theory, technologies, and practices , 2007 .

[2]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[3]  Lin Chen,et al.  On Multipath Routing in Multihop Wireless Networks: Security, Performance, and Their Tradeoff , 2009, EURASIP J. Wirel. Commun. Netw..

[4]  George Danezis,et al.  Introducing Traffic Analysis , 2007 .

[5]  Panagiotis Papadimitratos,et al.  Path set selection in mobile ad hoc networks , 2002, MobiHoc '02.

[6]  João Pedro Hespanha,et al.  Game Theoretic Stochastic Routing for Fault Tolerance and Security in Computer Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.

[7]  D. Rubenstein,et al.  Distributed Algorithms for Secure Multipath Routing in Attack-Resistant Networks , 2007, IEEE/ACM Transactions on Networking.

[8]  MengChu Zhou,et al.  A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments , 2009, IEEE Transactions on Vehicular Technology.

[9]  Kemal Ertugrul Tepe,et al.  Game theoretic approach in routing protocol for wireless ad hoc networks , 2009, Ad Hoc Networks.

[10]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[11]  Radha Poovendran,et al.  Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis , 2009, IEEE Transactions on Dependable and Secure Computing.

[12]  Yau-Hwang Kuo,et al.  Fairness and QoS Guarantees of WiMAX OFDMA Scheduling with Fuzzy Controls , 2009, EURASIP J. Wirel. Commun. Netw..

[13]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[14]  Hui Tian,et al.  A Game Theory Based Load-Balancing Routing with Cooperation Stimulation for Wireless Ad hoc Networks , 2009, 2009 11th IEEE International Conference on High Performance Computing and Communications.

[15]  Jean-Louis Rougier,et al.  Routing Games for Traffic Engineering , 2009, 2009 IEEE International Conference on Communications.

[16]  Yuguang Fang,et al.  SPREAD: Improving network security by multipath routing in mobile ad hoc networks , 2007, Wirel. Networks.

[17]  K. Venkatesh Sharma,et al.  Dynamic Routing with Security Considerations , 2010 .