DocumentCode :
857397
Title :
Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis
Author :
Yu, Wei ; Ji, Zhu ; Liu, K. J Ray
Author_Institution :
Microsoft Corp., Redmond, WA
Volume :
2
Issue :
2
fYear :
2007
fDate :
6/1/2007 12:00:00 AM
Firstpage :
240
Lastpage :
253
Abstract :
In cooperative ad-hoc networks, nodes belong to the same authority and pursue the common goals, and will usually unconditionally help each other. Consequently, without necessary countermeasures, such networks are extremely vulnerable to insider attacks, especially under noise and imperfect monitoring. In this paper, we present a game theoretic analysis of securing cooperative ad-hoc networks against insider attacks in the presence of noise and imperfect monitoring. By focusing on the most basic networking function, namely routing and packet forwarding, we model the interactions between good nodes and insider attackers as secure routing and packet forwarding games. The worst case scenarios are studied where initially good nodes do not know who the attackers are while insider attackers know who are good. The optimal defense strategies have been devised in the sense that no other strategies can further increase the good nodes´ payoff under attacks. Meanwhile, the optimal attacking strategies and the maximum possible damage that can be caused by attackers have been discussed. Extensive simulation studies have also been conducted to evaluate the effectiveness of the proposed strategies
Keywords :
ad hoc networks; game theory; telecommunication network routing; telecommunication security; game theoretic analysis; imperfect monitoring; networking function; optimal attacking strategies; packet forwarding; secure routing; securing cooperative ad-hoc networks; Ad hoc networks; Communication system security; Game theory; Monitoring; Network topology; Protection; Routing; Telecommunication traffic; Working environment noise; Ad-hoc networks, game theory, security;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2007.897270
Filename :
4202579
Link To Document :
بازگشت