2016
DOI: 10.1007/978-3-319-33936-8_19
|View full text |Cite
|
Sign up to set email alerts
|

A Reputation-Based Coalition Game to Prevent Smart Insider Jamming Attacks in MANETs

Abstract: Mobile Adhoc Networks (MANET) are susceptible to jamming attacks which can inhibit data transmissions. There has been considerable work done in the detection of external jamming attacks. However, detection of insider jamming attack in MANET has not received enough attention. The presence of an insider node that has constantly monitored the network and is privy to the network secrets can acquire sufficient information to cause irreparable damage. In this paper we propose a framework for a novel reputation-based… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…The main goal of their approach is to model the interactions between the attacker's attacking target selection and the source's relay selection. Furthermore, a reputation-based coalition game is proposed in [90] to detect the presence of smart jammer nodes when they are passively eavesdropping and collecting information about the network prior to launching the jamming attack. Another work [91] involves a distributed game theorybased multiagent anti-jamming (DMAA) algorithm as a solution against intelligent jammers.…”
Section: E Attacks Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…The main goal of their approach is to model the interactions between the attacker's attacking target selection and the source's relay selection. Furthermore, a reputation-based coalition game is proposed in [90] to detect the presence of smart jammer nodes when they are passively eavesdropping and collecting information about the network prior to launching the jamming attack. Another work [91] involves a distributed game theorybased multiagent anti-jamming (DMAA) algorithm as a solution against intelligent jammers.…”
Section: E Attacks Detectionmentioning
confidence: 99%
“…[84] SYN Flooding Attack NS-2 Packet delivery ratio, control overhead, delay, throughput, jitter. [90] Insider Jamming Attacks NS-2 Detection accuracy, detection delay, percentage of false positives, and the detection time of the insider jammer. [85] Not specified (Sybil attack, Selfish attack, RREQ flooding attack, and Black-hole attack) VPNPTool Certainty, uncertainty, hesitation.…”
Section: Ns-2mentioning
confidence: 99%
“…In [18], a survey of game-theoretic approaches for security requirements and threats mitigation in wireless sensor networks is discussed. In [19], a reputation-based coalition game was proposed to mitigate smart insider jamming attacks in MANET.…”
Section: ) Game Theory-based Analysis and Strategies For Jamming Attackmentioning
confidence: 99%
“…Each node will have a reputation table for all neighboring nodes. Our previous effort in [1] explains more about the legitimate grand coalition model.…”
Section: Legitimate Grand Coalition Modelmentioning
confidence: 99%
“…In a prior effort, we have proposed a reputation-based coalition game to detect insider threats in MANET [1]; in our approach, we proposed the formation of a grand coalition which will detect insider threats based on stored transmission rate and reputation for each node in the coalition. However, after an insider node is detected and removed from the coalition, it is possible for a group of insider nodes to collaborate and form an attack coalition and attempt to attack the original grand coalition.…”
Section: Introductionmentioning
confidence: 99%