A game theoretic model for stochastic routing in self-organized MANETs

In this paper, we propose a game theoretic model for zero-sum stochastic routing game in presence of the intelligent attackers in mobile ad hoc networks (MANETs). In each and every stage of the game, the source node observes the available multiple paths, the residual bandwidth of the paths, quality of the paths, and the strategy of the attackers from the previous stage of the game. Based on this observation, the source node selects an optimal routing strategy by using minimax-Q learning for secure multihop data flow from source to destination through a attack free path among the multiple paths. The selected optimal routing strategy of multihop data flow maximizes the expected payoff defined as the bandwidth utilization. The proposed technique achieves significant performance gains in terms of bandwidth utilization in MANETs. It also provides a randomized security of multihop data flow by accommodating the stochastic multihop data flow, the system dynamics, and the strategic behaviors of the attackers.

[1]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[2]  K. J. Ray Liu,et al.  A game theoretical framework for dynamic pricing-based routing in self-organized MANETs , 2008, IEEE Journal on Selected Areas in Communications.

[3]  Noam Nisan,et al.  Computationally feasible VCG mechanisms , 2000, EC '00.

[4]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[5]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[6]  Raja Datta,et al.  AODV-based technique for quick and secure local recovery from link failures in MANETs , 2013, Int. J. Commun. Networks Distributed Syst..

[7]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[8]  K. J. Ray Liu,et al.  Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks , 2007, IEEE Transactions on Mobile Computing.

[9]  K. J. Ray Liu,et al.  An optimal dynamic pricing framework for autonomous mobile ad hoc networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[10]  Shamik Sengupta,et al.  A Game Theoretic Framework for Power Control in Wireless Sensor Networks , 2010, IEEE Transactions on Computers.

[11]  João Pedro Hespanha,et al.  Enhancing security via stochastic routing , 2002, Proceedings. Eleventh International Conference on Computer Communications and Networks.

[12]  Tansu Alpcan,et al.  Security games for vehicular networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[13]  Bernhard Plattner,et al.  Multi-path Routing Protocols in Wireless Mobile Ad Hoc Networks: A Quantitative Comparison , 2006, NEW2AN.

[14]  Jie Wu,et al.  Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[15]  Alan Washburn,et al.  Two-Person Zero-Sum Games for Network Interdiction , 1995, Oper. Res..

[16]  Stephan Eidenbenz,et al.  Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents , 2003, MobiCom '03.

[17]  João Pedro Hespanha,et al.  Game Theoretic Stochastic Routing for Fault Tolerance and Security in Computer Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.

[18]  K. J. Ray Liu,et al.  An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.

[19]  Michael P. Wellman,et al.  Multiagent Reinforcement Learning: Theoretical Framework and an Algorithm , 1998, ICML.

[20]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[21]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.