Abstract
Background: Mobile Ad hoc Networks (MANET’s) have recently attracted attention as it is independent of any pre-existing network infrastructure or centralized administration. Security in MANET’s thus becomes a major concern due to its open and dynamic architecture.
Objectives: We have introduced a dynamic mean field game theoretic approach to enable an individual node in MANETs to make strategic security defense decisions without centralized administration.
Methods: The nodes in MANET’s act as a router to forward data packets and exchange routing information. Ad-hoc On demand Distance Vector (AODV) protocol is one of the standard MANET routing protocols which can be easily attacked by the fraudulent nodes. The fraudulent nodes can be deceptive and mislead the transmission of data packets in the network by providing shorter path and highest destination sequence number. Game theory finds wide application as a statistical and mathematical tool to model such dynamic networks and provide security.
Results: We have implemented mean field game theory for addressing security issue in MANET’s. Each node in this dynamic distributed network knows the information about its own state as well as the average reflection of the whole mean field. The players can strategically make distributed security defense decisions under adverse conditions. Unlike static threshold-based scheme for security, the threshold is estimated dynamically in this study. Each node checks whether the received Route REPly (RREP) sequence number is higher than a dynamically updated threshold value.
Conclusion: The comparative performance analysis of Throughput (TR), Packet Delivery Rate (PDR) and Average Cost (AC) has been demonstrated. Game theory has a vital role to validate and justify the intuitive strategic actions taken by each player to maximize their utility by playing optimal strategy. On the basis of the dynamic threshold calculated, the higher throughput and PDR could be achieved by eliminating the misleading paths. Simulation results corroborate that our dynamic mean field game theoretic scheme outperforms the static scheme.
Discussion: A dynamic approach for mobile ad hoc networks is presented in this paper to improve the performance of the network in hostile environment. We have introduced a dynamic mean field game theoretic approach to enable an individual node in MANETs to make strategic security defense decisions without centralized administration. In this dynamic distributed network, each node in the proposed scheme only needs to know its own state information and the average reflection of the whole mean field.
Keywords: Mean field game, security, Mobile Ad hoc Network (MANET), AODV, threshold-based, Intrusion Detection System (IDS)
Graphical Abstract
[http://dx.doi.org/10.1109/JPROC.2010.2068390]
[http://dx.doi.org/10.1109/JPROC.2010.2068530]
[http://dx.doi.org/10.1109/AINAW.2007.257]
[http://dx.doi.org/10.1109/ICESC.2014.45]
[http://dx.doi.org/10.1109/BMEI.2010.5639549]
[http://dx.doi.org/10.1109/ACCESS.2015.2482981]
[http://dx.doi.org/10.1109/ICICT.2011.5983545]
[http://dx.doi.org/10.1109/JSEN.2014.2326971]
[http://dx.doi.org/10.1109/JSEN.2015.2450742]
[http://dx.doi.org/10.1109/TC.2013.151]
[http://dx.doi.org/10.1186/1687-1499-2013-188]
[http://dx.doi.org/10.1109/TVT.2012.2196061]
[http://dx.doi.org/10.1109/SURV.2012.062612.00056]
[http://dx.doi.org/10.2307/j.ctvjsf522]
[http://dx.doi.org/10.1109/CICYBS.2011.5949407]
[http://dx.doi.org/10.1109/TSG.2012.2224391]
[http://dx.doi.org/10.1109/TWC.2007.348307]
[http://dx.doi.org/10.1109/MILCOM.2009.5379901]
[http://dx.doi.org/10.1109/HPCC.and.EUC.2013.164]
[http://dx.doi.org/10.1109/TWC.2013.122313.131118]
[http://dx.doi.org/10.1109/COMST.2005.1593277]
[http://dx.doi.org/10.1109/TGCN.2019.2904093]
[http://dx.doi.org/10.1109/JSEN.2015.2432114]
[http://dx.doi.org/10.1109/SASOW.2012.15]
[http://dx.doi.org/10.1109/CDC.2012.6426481]
[http://dx.doi.org/10.1109/ICGCIoT.2015.7380637]
[http://dx.doi.org/10.1109/PIMRC.2013.6666724]
[http://dx.doi.org/10.1109/ACCT.2012.104]
[http://dx.doi.org/10.1016/j.is.2020.101494]
[http://dx.doi.org/10.1016/j.asoc.2019.105836]
[http://dx.doi.org/10.1007/s11277-019-06724-0]
[http://dx.doi.org/10.1007/978-981-15-1480-7_68]