Security modeling of an ad hoc network under the constraint of energy by an approach in two steps: Clustering-Evolutionary game

Ad hoc networks are subject to multiple challenges, particularly the problem of limited resources such as energy and vulnerability in terms of security. Indeed, the nodes are subject to various attacks and malicious actions. Thus, each mobile is confronted with a dilemma: cooperate to ensure security, in this case the node spend a part of its energy, or not cooperate which allows it to save energy but making the security of the network more vulnerable. In this work, we develop an approach which takes into account two conflicting objectives: contribute to network security while reducing energy consumption. The approach is based on alternating two steps: Clustering-Evolutionary game. The clustering step is performed by an algorithm that takes into account the energy constraint in election of cluster-heads. The interactions between each pair of cluster-heads, when exchanging data, in their contribution to the security of the network, are modeled as an evolutionary game which is the second step of the proposed approach.

[1]  Christophe Duhamel,et al.  Strategies for designing energy-efficient clusters-based WSN topologies , 2012, J. Heuristics.

[2]  J. M. Smith,et al.  The Logic of Animal Conflict , 1973, Nature.

[3]  Lin Chen,et al.  A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks , 2009, IEEE Transactions on Information Forensics and Security.

[4]  P. Taylor,et al.  Evolutionarily Stable Strategies and Game Dynamics , 1978 .

[5]  Mahesh Motwani,et al.  Survey of clustering algorithms for MANET , 2009, ArXiv.

[6]  Niki Pissinou,et al.  Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks: Application to Network Security and Privacy , 2011, 2011 IEEE International Conference on Communications (ICC).

[7]  Roger B. Myerson,et al.  Game theory - Analysis of Conflict , 1991 .

[8]  Sajal K. Das,et al.  WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks , 2002, Cluster Computing.

[9]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[10]  Prabir Bhattacharya,et al.  This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING 1 Mechanism Design-Based Secure Leader Elec , 2022 .

[11]  Laya Aliahmadipour,et al.  Game theory approaches for improving intrusion detection in MANETs , 2011 .

[12]  Noufissa Mikou,et al.  A stochastic model to study the impact of the transmission frequency of hello messages on the connectivity of ad hoc networks , 2014, Telecommun. Syst..

[13]  A. Ephremides,et al.  A design concept for reliable mobile radio networks with frequency hopping signaling , 1987, Proceedings of the IEEE.

[14]  Hao Sun,et al.  Using Bayesian Game Model for Intrusion Detection in Wireless Ad Hoc Networks , 2010, Int. J. Commun. Netw. Syst. Sci..

[15]  Jeannette M. Wing,et al.  Game strategies in network security , 2005, International Journal of Information Security.

[16]  Christian Bettstetter,et al.  On the Connectivity of Ad Hoc Networks , 2004, Comput. J..

[17]  Mario Gerla,et al.  Multicluster, mobile, multimedia radio network , 1995, Wirel. Networks.