Previous [ 1] [ 2] [ 3] [ 4] [ 5] [ 6] [ 7] [ 8] [ 9] [ 10] [ 11] [ 12] [ 13] [ 14] [ 15] [ 16]


Journal of Information Science and Engineering, Vol. 32 No. 3, pp. 559-573 (May 2016)


A Game Theory Approach for Malicious Node Detection in MANETs


YASER TAHERI1, HOSSEIN GHARAEE GARAKANI2 AND NASER MOHAMMADZADEH1
1Department of Computer Engineering
Shahed University
Tehran, 3319118651 Iran
2Department of Network Security and Information Technology Research Center
Tehran, 1439955471 Iran
E-mail: {y.taheri; mohammadzadeh}@shahed.ac.ir; gharaee@itrc.ac.ir

One of the main features of nodes in mobile ad hoc networks (MANETs) is their cooperation with neighbors to propagate data. Misusing this feature, malicious nodes cooperate with normal nodes to disrupt network operation and reduce its efficiency. These nodes attack other network nodes and prevent being detected by other nodes through using the mobility characteristic of nodes in MANETs. One of the effective ways to detect malicious nodes is using game theory. Focusing on this issue, in this paper, an approach is presented for malicious node detection using Games Theory. Data exchange between two nodes forms a game, and the history of the successful and unsuccessful sending/receiving of data, is stored to be used for future decisions. Malicious nodes are detected by the game components, sent and received data as well as information that have been stored in different stages. The experimental results indicate that if the density of malicious nodes approximately reaches 20%, and the game is repeated more than four times between neighboring nodes, the proposed approach raises the malicious node detection rate to 91%. However, if the density of malicious nodes is more than 30%, the algorithm can detect more than 87% of them after being repeated six times.

Keywords: network security, MANETs, malicious node, intrusion detection, game theory

Full Text () Retrieve PDF document (201605_03.pdf)

Received May 18, 2015; revised October 1, 2015; accepted November 19, 2015.
Communicated by Xiaohong Jiang.