Table of Contents Author Guidelines Submit a Manuscript
Journal of Computer Networks and Communications
Volume 2016, Article ID 4289176, 13 pages
http://dx.doi.org/10.1155/2016/4289176
Research Article

Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game

Department of Electrical and Computer Engineering, Tennessee State University, Nashville, TN 37209, USA

Received 15 January 2016; Accepted 22 March 2016

Academic Editor: Eduardo da Silva

Copyright © 2016 Ashraf Al Sharah et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Albanese, A. De Benedictis, S. Jajodia, and D. Torrieri, “A probabilistic framework for jammer identification in MANETs,” Ad Hoc Networks, vol. 14, pp. 84–94, 2014. View at Publisher · View at Google Scholar · View at Scopus
  2. P. Sharma and A. Suryawanshi, “Enhanced security scheme against Jamming attack in mobile Ad hoc network,” in Proceedings of the International Conference on Advances in Engineering and Technology Research (ICAETR ’14), pp. 1–5, IEEE, Unnao, India, August 2014. View at Publisher · View at Google Scholar · View at Scopus
  3. K. Pelechrinis, M. Iliofotou, and S. V. Krishnamurthy, “Denial of service attacks in wireless networks: the case of jammers,” IEEE Communications Surveys and Tutorials, vol. 13, no. 2, pp. 245–257, 2011. View at Publisher · View at Google Scholar · View at Scopus
  4. A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou, “A survey on jamming attacks and countermeasures in WSNs,” IEEE Communications Surveys and Tutorials, vol. 11, no. 4, pp. 42–56, 2009. View at Publisher · View at Google Scholar · View at Scopus
  5. R. L. Pickholtz, D. L. Schilling, and L. B. Milstein, “Theory of spread-spectrum communications–a tutorial,” IEEE Transactions on Communications, vol. 30, no. 5, pp. 855–884, 1982. View at Publisher · View at Google Scholar · View at Scopus
  6. DSSS-wikipedia, http://en.wikipedia.org/wiki/Direct-sequencespreadspectrum.
  7. UWB-wikipedia, http://en.wikipedia.org/wiki/Ultrawideband.
  8. W. Stutzman and G. Thiele, Antenna Theory and Design, John Wiley & Sons, New York, NY, USA, 2nd edition, 1997.
  9. P. Goudarzi, “A non-cooperative quality optimization game for scalable video delivery over MANETs,” Wireless Networks, vol. 19, no. 5, pp. 755–770, 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. X. Guan, M. Chen, and T. Ohtsuki, “Non-cooperative game-based packet ferry forwarding for sparse mobile wireless networks,” Wireless Communications and Mobile Computing, vol. 15, no. 12, pp. 1633–1648, 2015. View at Publisher · View at Google Scholar · View at Scopus
  11. P. R. Baggidi, D. Giri Prasad, and T. Srinivas, “Security enhancement in mobile ad hoc networks using non-zero non-cooperative game theory,” International Journal of Research in Computer and Communication Technology, vol. 2, no. 8, pp. 614–621, 2013. View at Google Scholar
  12. B. Paramasiva and K. M. Pitchai, “Modeling intrusion detection in mobile ad hoc networks as a non cooperative game,” in Proceedings of the International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME ’13), pp. 300–306, IEEE, Salem, India, February 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. B. Zong, F. Xu, J. Jiao, and J. Lv, “A broker-assisting trust and reputation system based on artificial neural network,” in Proceedings of the IEEE International Conference on Systems, Man and Cybernetics (SMC ’09), pp. 4710–4715, San Antonio, Tex, USA, October 2009. View at Publisher · View at Google Scholar
  14. M. T. Refaei, L. A. DaSilva, M. Eltoweissy, and T. Nadeem, “Adaptation of reputation management systems to dynamic network conditions in ad hoc networks,” IEEE Transactions on Computers, vol. 59, no. 5, pp. 707–719, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  15. H. Nguyen, T. Pongthawornkamol, and K. Nahrstedt, “A novel approach to identify insider-based jamming attacks in multi-channel wireless networks,” in Proceedings of the IEEE Military Communications Conference (MILCOM ’09), pp. 1–7, IEEE, Boston, Mass, USA, October 2009. View at Publisher · View at Google Scholar · View at Scopus
  16. L. Li, S. Zhu, D. Torrieri, and S. Jajodia, “Self-healing wireless networks under insider jamming attacks,” in Proceedings of the IEEE Conference on Communications and Network Security (CNS ’14), pp. 220–228, San Francisco, Calif, USA, October 2014. View at Publisher · View at Google Scholar · View at Scopus
  17. S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM ’00), pp. 255–265, August 2000. View at Scopus
  18. P. Michiardi and R. Molva, “Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks,” in Proceedings of the IFIP TC6/TC11 6th Joint Working Conference on Communications and Multimedia Security, Portorož, Slovenia, September 2002.
  19. A. Cheng and E. Friedman, “Sybilproof reputation mechanisms,” in Proceedings of the ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems, Philadelphia, Pa, USA, 2005.
  20. S. Buchegger and J.-Y. Le Boudec, “Self-policing mobile ad hoc networks by reputation systems,” IEEE Communications Magazine, vol. 43, no. 7, pp. 101–107, 2005. View at Publisher · View at Google Scholar · View at Scopus
  21. P. Michiardi and R. Molva, “A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks,” in Proceedings of the Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt ’03), pp. 3–5, Sophia Antipolis, France, March 2003.
  22. G. Thamilarasu and R. Sridhar, “Game theoretic modeling of jamming attacks in ad hoc networks,” in Proceedings of the 18th International Conference on Computer Communications and Networks (ICCCN ’09), pp. 1–6, San Francisco, Calif, USA, August 2009. View at Publisher · View at Google Scholar
  23. D. Slater, P. Tague, R. Poovendran, and M. Li, “A game-theoretic framework for jamming attacks and mitigation in commercial aircraft wireless networks,” in Proceedings of the AIAA Infotech at Aerospace Conference and Exhibit and AIAA Unmanned, Unlimited Conference, Seattle, Wash, USA, April 2009. View at Scopus
  24. Y. E. Sagduyu, R. A. Berry, and A. Ephremides, “Jamming games in wireless networks with incomplete information,” IEEE Communications Magazine, vol. 49, no. 8, pp. 112–118, 2011. View at Publisher · View at Google Scholar · View at Scopus
  25. S. Bhattacharya and T. Başar, “Game-theoretic analysis of an aerial jamming attack on a UAV communication network,” in Proceedings of the American Control Conference (ACC ’10), pp. 818–823, Baltimore, Md, USA, July 2010. View at Scopus
  26. W. Yu and K. J. R. Liu, “Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 6, no. 5, pp. 507–521, 2007. View at Publisher · View at Google Scholar · View at Scopus
  27. Z. Han and H. V. Poor, “Coalition games with cooperative transmission: a cure for the curse of boundary nodes in selfish packet-forwarding wireless networks,” IEEE Transactions on Communications, vol. 57, no. 1, pp. 203–213, 2009. View at Publisher · View at Google Scholar · View at Scopus
  28. F. B. Saghezchi, A. Radwan, and J. Rodriguez, “A coalitional gametheoretic approach to isolate selfish nodes in multihop cellular network,” in Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC ’14), Madeira, Portugal, June 2014.
  29. S. Mathur, L. Sankar, and N. B. Mandayam, “Coalitions in cooperative wireless networks,” IEEE Journal on Selected Areas in Communications, vol. 26, no. 7, pp. 1104–1115, 2008. View at Publisher · View at Google Scholar · View at Scopus
  30. A. Al-Sharah and S. Shetty, “Accumulative feedback adaptation transmission rate in mobile ad-hoc networks,” in Proceedings of the International Conference and Workshop on Computing and Communication (IEMCON ’15), pp. 1–5, Vancouver, Canada, October 2015. View at Publisher · View at Google Scholar
  31. T. S. Ferguson, Game Theory, Mathematics Department, University of California, Los Angeles, Calif, USA, 2nd edition, 2014.
  32. X. Li, Achieving secure and cooperative wireless networks with trust modelling and game theory [Ph.D. thesis], 2009.
  33. X. Liao, D. Hao, and K. Sakurai, “Classification on attacks in wireless ad hoc networks: a game theoretic view,” in Proceedings of the 7th International Conference on Networked Computing and Advanced Information Management (NCM ’11), pp. 144–149, Gyeongju, The Republic of Korea, June 2011. View at Scopus
  34. A. Balasubratuanian and J. Ghosh, “A reputation based scheme for stimulating cooperation in MANETs,” in Proceedings of the 19th International Teletraffic Congress (ITC ’19), Beijing, China, September 2005.