Research Article
Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game
Algorithm 1
Algorithm for coalition formation.
(1) Start for all nodes, | (2) Begin the 1st round of formation | (3) Pick a node with the highest | (4) Broadcast forming option to the neighboring nodes in the network | (5) if is beyond threshold and ≥2 nodes match then | (6) Form a small coalition | (7) else | (8) Do not pick any node | (9) end if | (10) Update transmission rate table in AFAT [30] with the rate of newest members | (11) Begin the 2nd round | (12) Pick a node with the highest security value, | (13) if the first option has been matched successfully then | (14) Pick the next best option available | (15) else | (16) Broadcast the forming option to the neighbors again | (17) end if | (18) if there is an intersecting node- nodes that belongs to more than one small coalition then | (19) Merge the small coalitions | (20) else | (21) Re-broadcast forming option again to the network | (22) end if | (23) if ≥ payoff from any disjoint set of smaller coalition then | (24) Form a grand coalition | (25) else | (26) Repeat step (11) | (27) end if |
|