15th International Conference on Advanced Computing and Communications (ADCOM 2007) 2007
DOI: 10.1109/adcom.2007.58
|View full text |Cite
|
Sign up to set email alerts
|

A Game Theoretical Approach for Efficient Deployment of Intrusion Detection System in Mobile Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 81 publications
(8 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…These address different challenges including secure routing and packet forwarding [13,27,[29][30][31], trust establishment [15,27], intrusion detection [15,21,23,24,26], and optimization of energy costs [17][18][19]22].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…These address different challenges including secure routing and packet forwarding [13,27,[29][30][31], trust establishment [15,27], intrusion detection [15,21,23,24,26], and optimization of energy costs [17][18][19]22].…”
Section: Related Workmentioning
confidence: 99%
“…They proposed to use the equilibrium monitoring strategies to operate between a lightweight IDS and a heavyweight IDS. In [19], Marchang et al proposed a game-theoretic model of IDS for MANETs. They have used game theory to model the interactions between the IDS and the attacker to determine whether it is essential to always keep the IDS running without impacting its effectiveness in a negative manner.…”
Section: Related Workmentioning
confidence: 99%
“…Marchang and Tripathi proposed a model based on game theory for the effective deployment of intrusion detection mechanism in MANETs. The model is based on two‐player non‐cooperative zero‐sum game theory.…”
Section: Intrusion Detection Techniquesmentioning
confidence: 99%
“…It is very difficult to adopt the game theory‐based IDSs for MANET environment, as game theory suffers from computation overhead in recalculating the system parameters for dynamically changed environment. The non‐cooperative game theory‐based intrusion detection schemes seem to decrease the performance when the number of nodes is increasing. Bayesian networks‐based IDSs techniques are good in exploiting the correlations and interdependencies between variables and data attributes.…”
Section: Intrusion Detection Techniquesmentioning
confidence: 99%
“…In their models, each player's optimal strategy depends only on the payoff function of the opponent and the game is assumed to have complete information. [9][10][11] have given the similar model, but the game is assumed to have incomplete information.…”
Section: Related Workmentioning
confidence: 99%