The MANET is the most widely used networks due to the usage of wide range of multimedia applications over the wireless networks. One of the main features of nodes in mobile ad hoc networks (MANETs) is their collaboration with neighbors to propagate data. Exploiting this feature, malicious nodes collaborate with normal nodes to disturb network operation and reduce its efficiency. These nodes attack other network nodes and avoid being detected by other nodes through using the mobility characteristic of nodes in MANETs. Because of the infrastructure less network, battery constraint and the non-cooperative environment it is difficult to provide security to the network. Some nodes try to save their energy and start to exhibit malicious activities like dropping the packet by not forwarding etc. Due to such security problems in the network, the routing also becomes inefficient. Hence to improve the routing efficiency along with security, several techniques have been used so far. One of the effective ways to detect malicious nodes is using game theory. In this work, several such routing techniques have been compared and analyzed and a survey has been made. The different kinds of security attacks have been analyzed and the proposed solutions have been tabulated in this survey.
Published in | American Journal of Electrical and Computer Engineering (Volume 2, Issue 1) |
DOI | 10.11648/j.ajece.20180201.11 |
Page(s) | 1-4 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2018. Published by Science Publishing Group |
MANET, Malicious, Route Request, Route Reply, Authentication
[1] | Seema Mehla et. al. (2010) “Analyzing security of Authenticated Routing Protocol (ARAN), International Journal on Computer Science and Engineering Vol. 02, No. 03, 664-668. |
[2] | Chuanqi Gong, Sheng Wu and Yanmin Jing (2012) “ARAN protocol analysis and improvement”, International conference on System Science, Engineering Design and Manufacturing Informatization, vol. 02, 347-350. |
[3] | R. Pushpalakshmi and A. Vincent Antony Kumar (2010) “Security aware minimized dominating set based routing in MANET” Second International conference on Computing, Communication and Networking Technologies, 1-5. |
[4] | Yih-Chun Hu, David B. Johnson, Adrian Perrig (2003)” SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks” ELSEVIER, PA 15213. |
[5] | Yih Chun Hu, Adrian Perrig and David B. Johnson “Ariadne: A Secure On-Demand Routing Protocol for springer 2005Ad Hoc Networks”. |
[6] | S. Buchegger and J. Y. L. Boudec (2002), “Performance analysis of the CONFIDANT Protocol, cooperation of nodes - Fairness in dynamic ad hoc networks,” inProc. IEEE/ACMMOBIHOC, June |
[7] | P. Michiardi and R. Molva (2002), “CORE:Acollab orative reputation mechanism to enforce node cooperation in mobile ad hoc networks,” 6th Joint Working Conf. Commun. and Multimedia Security: Advanced Commun. And Multimedia Security, pp. 107–121. |
[8] | F. Li and J. Wu (2010), “Attack and Flee: Game theory based analysis on interactions among nodes in MANETs,” IEEE Trans. Syst., Man Cybern., vol. 40, pp. 612-622. |
[9] | Manshaei. M. H et al. (2013), “Game theory meets network security and privacy,” J. ACM Comput. Surv, vol. 45, no. 3. |
[10] | S. Yi, P. Naldurg and R. Krvets, “Security Aware Ad hoc Routing for Wireless networks”, Proc. 2nd ACM Symp. Mobile Ad Hoc net. and Comp. (Mobihoc’01), Long Beach, CA, Oct. 2001, pp. 299-302. |
[11] | M. G. Zapata and N. Asokan, “Secure Ad-Hoc On-demand Distance Vector Routing”, ACM Mobile Comp. and Commun. Review, vol. 3, no., July 2002, pp. 106-07. |
[12] | P. Papadimitratos and Z. J. Haas, “Securing the internet routing infrastructure”, IEEE Commun. Mag., vol. 10, no. 40, oct 2002, pp. 60-68. |
[13] | David B. Johnson and David A. Maltz, Dynamic Source Routing in Ad-Hoc Wireless Networks, Mobile Computing, edited by Tomasz Imielinski and Hank Korth, Kluwer Academic Publishers, Chapter 5, 1996, pp. 153-181. |
[14] | Charles E. Perkins, Elizabeth M. Royer and Samir R. Das, Ad Hoc On Demand Distance Vector (AODV) Routing, IETF Internet Draft draft-ietfmanet-aodv-08. txt, March 2001. |
APA Style
Rahul Krishnan. (2018). A Survey on Game Theory Approaches for Improving Security in MANET. American Journal of Electrical and Computer Engineering, 2(1), 1-4. https://doi.org/10.11648/j.ajece.20180201.11
ACS Style
Rahul Krishnan. A Survey on Game Theory Approaches for Improving Security in MANET. Am. J. Electr. Comput. Eng. 2018, 2(1), 1-4. doi: 10.11648/j.ajece.20180201.11
AMA Style
Rahul Krishnan. A Survey on Game Theory Approaches for Improving Security in MANET. Am J Electr Comput Eng. 2018;2(1):1-4. doi: 10.11648/j.ajece.20180201.11
@article{10.11648/j.ajece.20180201.11, author = {Rahul Krishnan}, title = {A Survey on Game Theory Approaches for Improving Security in MANET}, journal = {American Journal of Electrical and Computer Engineering}, volume = {2}, number = {1}, pages = {1-4}, doi = {10.11648/j.ajece.20180201.11}, url = {https://doi.org/10.11648/j.ajece.20180201.11}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajece.20180201.11}, abstract = {The MANET is the most widely used networks due to the usage of wide range of multimedia applications over the wireless networks. One of the main features of nodes in mobile ad hoc networks (MANETs) is their collaboration with neighbors to propagate data. Exploiting this feature, malicious nodes collaborate with normal nodes to disturb network operation and reduce its efficiency. These nodes attack other network nodes and avoid being detected by other nodes through using the mobility characteristic of nodes in MANETs. Because of the infrastructure less network, battery constraint and the non-cooperative environment it is difficult to provide security to the network. Some nodes try to save their energy and start to exhibit malicious activities like dropping the packet by not forwarding etc. Due to such security problems in the network, the routing also becomes inefficient. Hence to improve the routing efficiency along with security, several techniques have been used so far. One of the effective ways to detect malicious nodes is using game theory. In this work, several such routing techniques have been compared and analyzed and a survey has been made. The different kinds of security attacks have been analyzed and the proposed solutions have been tabulated in this survey.}, year = {2018} }
TY - JOUR T1 - A Survey on Game Theory Approaches for Improving Security in MANET AU - Rahul Krishnan Y1 - 2018/06/12 PY - 2018 N1 - https://doi.org/10.11648/j.ajece.20180201.11 DO - 10.11648/j.ajece.20180201.11 T2 - American Journal of Electrical and Computer Engineering JF - American Journal of Electrical and Computer Engineering JO - American Journal of Electrical and Computer Engineering SP - 1 EP - 4 PB - Science Publishing Group SN - 2640-0502 UR - https://doi.org/10.11648/j.ajece.20180201.11 AB - The MANET is the most widely used networks due to the usage of wide range of multimedia applications over the wireless networks. One of the main features of nodes in mobile ad hoc networks (MANETs) is their collaboration with neighbors to propagate data. Exploiting this feature, malicious nodes collaborate with normal nodes to disturb network operation and reduce its efficiency. These nodes attack other network nodes and avoid being detected by other nodes through using the mobility characteristic of nodes in MANETs. Because of the infrastructure less network, battery constraint and the non-cooperative environment it is difficult to provide security to the network. Some nodes try to save their energy and start to exhibit malicious activities like dropping the packet by not forwarding etc. Due to such security problems in the network, the routing also becomes inefficient. Hence to improve the routing efficiency along with security, several techniques have been used so far. One of the effective ways to detect malicious nodes is using game theory. In this work, several such routing techniques have been compared and analyzed and a survey has been made. The different kinds of security attacks have been analyzed and the proposed solutions have been tabulated in this survey. VL - 2 IS - 1 ER -