A Survey on Game Theory Approaches for Improving Security in MANET

The MANET is the most widely used networks due to the usage of wide range of multimedia applications over the wireless networks. One of the main features of nodes in mobile ad hoc networks (MANETs) is their collaboration with neighbors to propagate data. Exploiting this feature, malicious nodes collaborate with normal nodes to disturb network operation and reduce its efficiency. These nodes attack other network nodes and avoid being detected by other nodes through using the mobility characteristic of nodes in MANETs. Because of the infrastructure less network, battery constraint and the non-cooperative environment it is difficult to provide security to the network. Some nodes try to save their energy and start to exhibit malicious activities like dropping the packet by not forwarding etc. Due to such security problems in the network, the routing also becomes inefficient. Hence to improve the routing efficiency along with security, several techniques have been used so far. One of the effective ways to detect malicious nodes is using game theory. In this work, several such routing techniques have been compared and analyzed and a survey has been made. The different kinds of security attacks have been analyzed and the proposed solutions have been tabulated in this survey.

[1]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[2]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[3]  Chuanqi Gong,et al.  ARAN protocol analysis and improvement , 2012, 2012 3rd International Conference on System Science, Engineering Design and Manufacturing Informatization.

[4]  Manel Guerrero Zapata Secure ad hoc on-demand distance vector routing , 2002, MOCO.

[5]  Preeti Nagrath,et al.  Analyzing security of Authenticated Routing Protocol (ARAN) , 2010 .

[6]  Robin Kravets,et al.  Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.

[7]  A. Vincent Antony Kumar,et al.  Security aware minimized dominating set based routing in MANET , 2010, 2010 Second International conference on Computing, Communication and Networking Technologies.

[8]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[9]  Jie Wu,et al.  Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[10]  Zygmunt J. Haas,et al.  Securing the Internet routing infrastructure , 2002, IEEE Commun. Mag..

[11]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[12]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.