The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
in mobile social networks, legitimate transmitting nodes can be contrasted by malicious attackers acting on the purpose of disrupting communication. Our aim is to use game theory to identify malicious nodes. With respect to previous similar formulations, we consider a wider array of action options for the players, notably we include a choice about whether to engage or not in packet exchanging, and...
Machine-to-Machine (M2M) mobile networks are distributed systems which include various actuators and sensors. In terms of the security of M2M mobile networks, one very significant issue is the security of Sensor Networks (SNs). Particularly, the security of transferring data from sensors to their destinations is very critical. In this paper, focusing on intrusion detection techniques, we propose an...
The communication behaviour of mobile nodes in adhoc network are quite confusing to understand owing to the decentralized architecture and dynamic topology. The existing system has presented various security solutions in order to understand the malicious activity of the adversary. Therefore, designing a model to strengthen up the intrusion detection system based on the uncertain and unpredictable...
Mobile ad hoc networks (MANETs) is a multihop wireless communication network supporting mobile users (nodes) without any existing infrastructure and depend of the individual behavior of the nodes. This nature of MANETs imposes the cooperation among nodes to improve quality of service and security especially that mobility and energy are the most important criteria in MANETs. In such networks, devices...
In this paper, we'll try to discuss the cooperation of nodes representing one of the important factors in improving the quality of service (QoS) and security in mobile ad hoc networks (MANETs). The routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. In such networks, the Selfish behaviour is among the big challenges and can lead to...
In this paper, we propose a game theoretic model for zero-sum stochastic routing game in presence of the intelligent attackers in mobile ad hoc networks (MANETs). In each and every stage of the game, the source node observes the available multiple paths, the residual bandwidth of the paths, quality of the paths, and the strategy of the attackers from the previous stage of the game. Based on this observation,...
Network security will face tougher challenges for MANETs due to emerging purposive strategic attacks conducted by smart malicious nodes. All these purposive strategic attacks eventually run out of the throughput which results in network crashes. In this paper, we have proposed a two-level dynamic Bayesian game model to recognize these purposive strategic attacks in MANETs and establish a malicious...
Because of the lack of infrastructure in mobile ad hoc networks (MANETs), their proper functioning must rely on co-operations among mobile nodes. However, mobile nodes tend to save their own resources and might be reluctant to forward packets for other nodes. In this paper, we address the charging and accounting problems in MANETs. We develop a theoretical game model that offer advice to a central...
Trust-based solutions provide some form of payment to peers to encourage good behavior. The problem with trust management systems is that they require prior knowledge to work. In other words, peers are vulnerable to attack if they do not have knowledge or correct knowledge of other peers in a trust management system. Therefore, considering only trust is inadequate when a decision is made to identify...
Mobile ad hoc networks (MANETs) are wireless networks that lack infrastructure. Security requirements in MANET have to be much efficient due to specific characteristics of ad hoc network. Intrusion detection system (IDS) is an integral part of any mobile ad-hoc network (MANET). It is very important for IDS to function properly for the efficient functioning of a MANET. In this paper, we try to build...
In open environments, such as mobile peer-to-peer systems, participants may need to access resources from unknown users. A critical security concern in such systems is the access of faulty resources, thereby wasting the requester's time and energy and possibly causing damage to her system. A common approach to mitigating the problem involves reputation mechanisms; however, since reputation relies...
Research on security in peer-to-peer (P2P) systems is dominated by reputation-based solutions. These solutions propagate opinions about other peers in order to help identify the best set of peers to utilize. In this paper, we model peers with utility functions and use those functions to examine the case in which an individual peer participates in an unfamiliar and untrusted system, similar to one...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.