2016
DOI: 10.1155/2016/4289176
|View full text |Cite
|
Sign up to set email alerts
|

Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game

Abstract: Security in mobile ad hoc networks (MANETs) is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent external attacks on MANET are not applicable for defense against insider jamming attacks. There is a need for a formal framework to characterize the information required by adversaries to launch insider jamming attacks. In this paper, we propose a novel reputation-based coalition game in MANETs to detect and mitigate insider ja… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…Al Sharah 35 proposed a novel reputation‐based coalition game in MANETs to detect and mitigate insider jamming attacks. Since there is no centralized controller in MANETs, the nodes rely heavily on availability of transmission rates and a reputation for each individual node in the coalition to detect the presence of internal jamming node.…”
Section: Related Workmentioning
confidence: 99%
“…Al Sharah 35 proposed a novel reputation‐based coalition game in MANETs to detect and mitigate insider jamming attacks. Since there is no centralized controller in MANETs, the nodes rely heavily on availability of transmission rates and a reputation for each individual node in the coalition to detect the presence of internal jamming node.…”
Section: Related Workmentioning
confidence: 99%
“…A reputation-based coalition game-theoretic approach is proposed in [83] to detect and exclude insider jamming attacks on MANETs. In this approach, the nodes rely heavily on the availability of transmission rates and a reputation for each individual node in the coalition to detect the presence of an internal jamming node.…”
Section: E Attacks Detectionmentioning
confidence: 99%
“…Perfect bayesian equilibrium. [78] Non-cooperative Not specified Bayesian game Not specified [74] Non-cooperative Not specified Bayesian game Not specified [9] Non-cooperative Matrix Reactive and proactive game Nash equilibrium [79] Not specified Extensive Dynamic mean field game Not specified [80] Not specified Not specified Not specified Not specified [81] Non-cooperative Not specified Evolutionary game ESS Attacks Detection [82] Non-cooperative Extensive Subgame theory Subgame perfect equilibrium [84] Non-cooperative Matrix Nonzero sum game Nash equilibrium [85] Non-cooperative Matrix Zero-sum stochastic games Nash equilibrium [86] Non-cooperative Matrix Zero-sum Nash equilibrium [88] Non-cooperative Matrix Selfish games Nash's balance [87] Non-cooperative Not specified Bayesian signalling game Perfect nash equilibrium [83] Cooperative Not specified Coalition game Not specified [90] Cooperative Not specified Coalition game Not specified [89] Non-cooperative Matrix Static game Nash equilibrium [91] Non-cooperative Not specified Markov game Not specified…”
Section: Game Model Form Modeling Game Type Concept Solutionmentioning
confidence: 99%
“…We focus on localizing the jammers after some jammed regions have been detected. So, we do not consider the process of detecting jamming attack (a lot of researches are focused on this technique [4][5][6][7][8][9][10] ).…”
Section: Network Modelmentioning
confidence: 99%
“…The methods to detect the jamming problems have been widely researched by scholars and professions. [4][5][6][7][8][9][10] In addition to these solutions toward the jamming problems, different strategies and techniques which counter the attacks from adversaries, including frequency-hopping spread spectrum (FHSS) and directsequence spread spectrum (DSSS), ultra-wide band (UWB) technology, antenna polarization, and directional transmission methods, have been developed through time. 11 But, these solutions overwhelmingly rely on cryptography, which means the mechanism of key establishment must be decided by consensus in advance.…”
Section: Introductionmentioning
confidence: 99%