Generic placeholder image

Recent Patents on Engineering

Editor-in-Chief

ISSN (Print): 1872-2121
ISSN (Online): 2212-4047

Research Article

Bayesian Game Approach to Mitigate DoS Attack in Vehicular Ad-Hoc Networks

Author(s): Ilavendhan Anandaraj* and Saruladha Krishnamurthy

Volume 15, Issue 2, 2021

Published on: 28 April, 2020

Page: [150 - 160] Pages: 11

DOI: 10.2174/1872212114999200428100330

Price: $65

Abstract

Background: Trustful message transmission within the Vehicular ad-hoc Networks is needed as traffic related safety applications needs successful and reliable delivery of messages. The biggest issue is how only the trustworthy parties can be retained and the misbehaved are revoked. From the background analysis, it gives a detailed view of various vulnerabilities in these networks and the techniques used by the researchers to identify and mitigate the attack. Based on the drawbacks observed in the literature the proposed Bayesian Game Mechanism has been designed.

Objective: The major objective of this manuscript is to identify the Denial of Service Attack in Vehicular Ad-hoc Networks as it depletes availability of the resources. This attack is identified using Bayesian Game approach.

Methods: The Bayesian game approach is used to identify the attack. It analyzes the behavior of vehicles and classifies them into trustworthy or malicious.

Results: The simulation is conducted using Network simulator 2.34 and the traffic model is designed using by considering 100 nodes. From the results it is inferred that Packet drop ratio has been improved by 9.82 % and the delay and throughput has been minimized, when the proposed mechanism is used in the presence of attackers.

Conclusion: This paper identifies Denial of Service attack as the most vulnerable attack in this network and has designed game theoretic approach namely Bayesian approach for preventing this attack. The proposed method has minimized the delay and packet drop and improved the throughput when compared against the bench mark.

Keywords: Game theory, cooperative game, non-cooperative game, VANETs, SMDRP, PDA.

Graphical Abstract
[1]
Y. Liu, C. Cristina, and M. Hong, A Bayesian Game Approach for Intrusion Detection in Wireless Ad Hoc Networks ACM, October 2006..
[2]
B.R. Yenumula, and S. Srivathsan, "Game Theory Model for Selective Forward Attacks in Wireless Sensor Networks In the Proceedings of IEEE 17th Mediterranean Conference on Control and Automation, 2009,",
[3]
B. Yenumula, "A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks In the Proceedings of IEEE Third International Conference on Sensor Technologies and Applications, 2009, pp. 462-468",
[4]
M. Mohi, M. Ali, and M. Pooya, "A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks , In the Proceedings of IEEE WRI International Conference on Communications and Mobile Computing, 2009",
[5]
Y. Qiu, C. Zhide, and X. Li, "Active Defense Model of Wireless Sensor Networks Based on Evolutionary Game Theory In the Proceedings of IEEE WRI 6th International Conference on Wireless Communications Networking and Mobile Computing, 2010",
[6]
S.F. Mehran, "A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory , In the Proceedings of IEEE Transactions on Dependable and Secure Computing, vol.7, no. 1, pp. 1545-5971, 2007",
[7]
"Tansu and Sonja, "Security Games for Vehicular Networks", In the Proceedings of IEEE Transactions on Mobile Computing, vol.10, no. 1, pp. 1536-1233, 2010",
[8]
S. Zeadally, H. Ray, and C. Yuh-Shyan, Vehicular ad hoc networks (VANETS): status results and challenges.Springer Science+ Business Media, LLC, 2011..
[9]
D. Manuel, Serrat-Olmos, and H. Enrique, "Calafate and Pietro Manzoni "Accurate Detection of Black Holes in MANETs using Collaborative Bayesian Watchdogs,"", In the Proceedings of IEEE on Wireless Days, 2012.,
[10]
H-Y. Shi, and W-L. Wang, N-M Kwok, and Sheng, “Game Theory for Wireless Sensor Networks: A Survey.,In the Proceedings of Sensors, 2012, pp. 9055-9097.,
[11]
L. Shalini, Vijay, and M. Nema, "" Analysis of Attacks and Challenges in VANET"", In the proceedings of International Journal of Emerging Technology and Advanced Engineering, vol. 4, no. 7, 2014.,
[12]
H. Vin, and C. Ana, Security attacks and Solutions in Vehicular Ad-hoc Networks: A Survey"", In the proceeding of IJANS, vol. Vol. 4, no. 2, 2014.,
[13]
B. Subba, S. Biswas, and S. Karmakar, Intrusion Detection in Mobile Ad- hoc Networks:Bayesian game formulation In the Proceedings of International Journal of Engineering Science and Technology.. Elsevier, 2015, pp. 782-799..
[14]
S. Basant, B. Santosh, and K. Sushanta, “Enhancing secure routing in Mobile Ad Hoc Networks using a Dynamic Bayesian Signalling Game model,”In the Proceedings of International Journal of Computers and Electrical Engineering., vol. 41. Elsevier, 2015, pp. 301-313.
[15]
B. Mokhtar, and M. Azab, “Survey on Security Issues in Vehicular Ad Hod Networks”,In the Proceedings of Alexandria Engineering Journal., vol. 54. Elsevier, 2015, pp. 1115-1126.
[16]
U. Parmar, S. Sharanjit, and N. Guru, ""Overview of Various Attacks in VANET,"", In the Proceedings of International Journal of Engineering Research and General Science,vol.3, 2015, pp. 2091- 2730..
[17]
A. Ahmed, A. Alabdel, and H. Mohammad, "Evolutionary Game Theoretic Analysis of Distributed Denial of Service Attacks in a Wireless Network , In the Proceedings of IEEE on Information Science and Systems, 2016",
[18]
"Y. Taheri H. G. Garakani And N. M. Zadeh, "“ A Game Theory Approach for Malicious Node Detection in MANETs In the Proceedings of JISE, vol.32, 2016, pp. 559-573",
[19]
M.S. Abdalzaher, K. Seddik, M. Elsabrouty, O. Muta, and H. Furukawa, Abdel-Rahman, “A. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey., In the Proceedings of Sensors vol.16, 2016, p. 1003.
[20]
C. Doshi, V. Sreecharan, and K. Chandrasekaran, "Game-Theoretic Modeling of Gray Hole Attacks in Wireless Ad Hoc Networks ", In the Proceedings of the International Conference on Signal, Networks, Computing, and Systems, 2017
[http://dx.doi.org/10.1007/978-81-322-3592-7_21]
[21]
F. Li, Y. Yang, and J. Wu, "Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs", Proceedings of IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 40, pp. 612-622, 2009.
[22]
F. Li, and J. Wu, "Hit and run: A Bayesian game between malicious and regular nodes in mobile networks", In the Proceedings of IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol.40, 2008, pp. 612-622
[23]
A. Patcha, and J-M Park, A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks In the Proceedings of International Journal of Network Security, vol.2, no.2, pp. 131- 137, 2006..
[24]
X. Wu, and K.Y. David, "Mitigating Denial-of-Service Attacks in MANET by Incentive-based Packet Filtering: A Game-theoretic Approach", In the Proceedings of Third International Conference on Security and Privacy in Communications Networks and the Workshops, 2007.
[25]
X. Wu, and K.Y. David, Mitigating Denial-of-Service Attacks in MANET by Distributed Packet Filtering: A Game-theoretic Approach., ACM, 2007, pp. 20-22.
[26]
W. Wang, M. Chatterjee, K. Kwiat, and Q. Li, “A game theoretic approach to detect and co-exist with malicious nodes in wireless networks.”, In the proceedings of International Journal on Computer Networks., vol. 71. Elsevier, 2014, pp. 63-83. [http://dx.doi.org/10.1016/j.comnet.2014.06.008]
[27]
Q. Zhu, C. Fung, R. Boutaba, and T. Basar, A game-theoretical approach to incentive design in collaborative intrusion detection networks., In the Proceedings of GameNets, 2009.
[28]
K.C. Nguyen, and T. Alpcan, and Basar, "Security games with incomplete information," In the proceedings of IEEE ICC. 2009, pp. 1-6.,
[29]
S. Sengupta, M. Chatterjee, and K.A. Kwiat, "A game-theoretic framework for power control in wireless sensor networks", In the Proceedings of IEEE Trans. Comput, vol. 59, no. 2, 2010, pp. 231- 242
[http://dx.doi.org/10.1109/TC.2009.82]
[30]
J. Zhang, and Q. Zhang, "Stackelberg Game for utility-based cooperative cognitive radio networks", In the Proceedings of ACM Mobihoc, 2009
[31]
H.S. Lim, G. Ghinita, and E. Bertino, "M. A game-theoretic approach for high assurance of data trustworthiness in sensor networks", In the Proceedings of the 28th International Conference on Data Engineering (ICDE), Arlington, VA, USA, 2012, pp. 1192-1203.
[32]
Z. Han, Game Theory in Wireless and Communication Networks: Theory, Models, and Applications., Cambridge University Press: Cambridge, UK, 2012.
[33]
P. Guan, and J. Zhuang, "Modeling Resources Allocation in Attacker-Defender Games with “Warm Up” CSF", Risk Anal., vol. 36, no. 4, pp. 776-791, 2016. [http://dx.doi.org/10.1111/risa.12502 PMID: 26713543].
[34]
K. Akkarajitsakul, E. Hossain, D. Niyato, and D.I. Kim, "Game-theoretic approaches for multiple access in wireless networks: A survey Commun", Surv. Tutor, vol. 13, pp. 372-395, 2011. [http://dx.doi.org/10.1109/SURV.2011.122310.000119].
[35]
H.Y. Shi, W.L. Wang, N.M. Kwok, and S.Y. Chen, "Game theory for wireless sensor networks: A survey", Sensors (Basel), vol. 12, no. 7, pp. 9055-9097, 2012. [http://dx.doi.org/10.3390/s120709055 PMID: 23012533].
[36]
B. Benmammar, and F. KRIEF, ""Game theory applications in wireless networks: A survey."", In the Proceedings of the 13th International Conference on Software Engineering, Parallel and Distributed Systems (SEPADS'14), Gdansk, Poland, 2014, pp. 15-17,
[37]
S. Shen, G. Yue, Q. Cao, and F. Yu, "A survey of game theory in wireless sensor networks security", J. Netw, vol. 6, pp. 521-532, 2011. [http://dx.doi.org/10.4304/jnw.6.3.521-532].
[38]
K. Komathy, and P. Narayanasamy, "Trust-based evolutionary game model assisting AODV routing against selfishness", J. Netw. Comput. Appl., vol. 31, pp. 446-471, 2008.
[http://dx.doi.org/10.1016/j.jnca.2008.02.002]
[39]
Y. Zhang, and M. Guizani, Game Theory for Wireless Communications and Networking. 2011..
[http://dx.doi.org/10.1201/b10975]
[40]
E. Karapistoli, "Economides, “A. Defending jamming attacks in wireless sensor networks using Stackelberg monitoring strategies", Proceedings of the IEEE/CIC International Conference on Communications in China (ICCC) Shanghai, China, 2014pp. 161-165
[http://dx.doi.org/10.1109/ICCChina.2014.7008264]
[41]
V. Viswacheda, "Ali Chekima, “Detection and Mitigation of DoS Attacks in VANET using Minimum Delay Routing Protocol", Proceedings of Eighth International Conference on Soft Computing and Pattern Recognition, 2018
[42]
S. Kumar, and Kulwinder, ""Detect and Mitigation of Denial of Service Attacks in VANETs Using Packet Detection Algorithm,"", In Proceedings of International Journal for Research in Applied Science and Engineering Technology, vol.6, March 2018.,
[43]
C. Guntewar, and Vaishali, ""A Review on Byzantin Attack Detection and Prevention using Game Theory,"", In Proceedings of International Journal of Computer Science and Information Technology, vol. 6.,
[44]
Y. He, S. Limin, Weidong, and Hong, ""A Game Theory Based Analysis of Data Privacy in Vehicular Sensor Networks,"", In Proceedings of International Journal of Distributed Sensor Networks, 2014.,
[45]
B. Subba, S. Biswas, and S. Karmakar, A Game theory based multi layer intrusion detection framework for VANET Proceeding of Future Generation Computer Systems, 2017..
[http://dx.doi.org/10.1016/j.future.2017.12.008]
[46]
M. Mohsin, I. R. Mehdi, and S. Asad, A Game theory based trust model for vehicular Ad-hoc Networks In Proceedings of Computer Networks, 2017..
[http://dx.doi.org/10.1016/j.comnet.2017.04.024]
[47]
A. Ilavendhan, and K. Saruladha, "Comparative study of game theoretic approaches to mitigate network layer attacks in VANETs", Proceedings of ICT Express, vol. 4, 2018
[http://dx.doi.org/10.1016/j.icte.2017.12.002]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy