Protection Augmentation in Mobile Ad Hoc Networks Using Game Theory

Game theory can provide a useful tool to study the security problem in mobile ad hoc networks (MANETs). Most of existing works on applying game theories to security only consider two players in the security game model: an attacker and a defender. While this assumption may be valid for a network with centralized administration, it is not realistic in MANETs, where centralized administration is not available. In this paper, using recent advances in mean field game theory, we propose a novel game theoretic approach with multiple players for security in MANETs. The mean field game theory provides a powerful mathematical tool for problems with a large number of players. The proposed scheme can enable an individual node in MANETs to make strategic security defence decisions without centralized administration. In addition, since security defence mechanisms consume precious system resources (e.g., energy), the proposed scheme considers not only the security requirement of MANETs but also the system resources. Moreover, each node in the proposed scheme only needs to know its own state information and the aggregate effect of the other nodes in the MANET. Therefore, the proposed scheme is a fully distributed scheme. Simulation results are presented to illustrate the effectiveness of the proposed scheme. Index Terms: Mean field game, security, mobile ad hoc network (MANET).

[1]  Jie Wu,et al.  Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[2]  Martin L. Puterman,et al.  Markov Decision Processes: Discrete Stochastic Dynamic Programming , 1994 .

[3]  Sankardas Roy,et al.  Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows , 2011, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).

[4]  Minyi Huang,et al.  Mean Field Stochastic Games with Discrete States and Mixed Players , 2012, GAMENETS.

[5]  Marco Carvalho Security in Mobile Ad Hoc Networks , 2008, IEEE Security & Privacy.

[6]  F. Richard Yu,et al.  A game theoretic approach for security and Quality of Service (QoS) co-design in MANETs with cooperative communications , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.

[7]  Yang Xiao,et al.  Game Theory for Network Security , 2013, IEEE Communications Surveys & Tutorials.

[8]  Peter Xiaoping Liu,et al.  Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks , 2011, IEEE Transactions on Wireless Communications.

[9]  Jie Liu,et al.  Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks , 2009, IEEE Transactions on Wireless Communications.

[10]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[11]  Christos Politis,et al.  A game theoretic approach for securing AODV in emergency Mobile Ad Hoc Networks , 2009, 2009 IEEE 34th Conference on Local Computer Networks.

[12]  F. Richard Yu,et al.  Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks , 2013, EURASIP J. Wirel. Commun. Netw..

[13]  Jung-Min Park,et al.  A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks , 2006, Int. J. Netw. Secur..

[14]  Hamidou Tembine,et al.  Mean field stochastic games for SINR-based medium access control , 2011, VALUETOOLS.

[15]  Chao Liang,et al.  Power Management in MIMO Ad Hoc Networks: A Game-Theoretic Approach , 2007, IEEE Transactions on Wireless Communications.

[16]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[17]  Peter E. Caines,et al.  The NCE (Mean Field) Principle With Locality Dependent Cost Interactions , 2010, IEEE Transactions on Automatic Control.

[18]  Amitabh Mishra,et al.  Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.

[19]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[20]  Samson Lasaulce,et al.  Mean field energy games in wireless networks , 2012, 2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[21]  Xiaoyu Ni,et al.  Security analysis of the Bootstrap protocol for deny-by-default Mobile Ad-hoc Networks , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[22]  Victor C. M. Leung,et al.  Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications , 2012, IEEE Transactions on Vehicular Technology.

[23]  V. Vetriselvi,et al.  Cluster Based Co-operative Game Theory Approach for Intrusion Detection in Mobile Ad-Hoc Grid , 2008, 2008 16th International Conference on Advanced Computing and Communications.

[24]  Piet Van Mieghem,et al.  Protecting Against Network Infections: A Game Theoretic Perspective , 2009, IEEE INFOCOM 2009.

[25]  Tansu Alpcan,et al.  Network Security , 2010 .