2019
DOI: 10.1109/access.2019.2961059
|View full text |Cite
|
Sign up to set email alerts
|

Misbehavior Detection in Ephemeral Networks: A Local Voting Game in Presence of Uncertainty

Abstract: Emerging short-lived (ephemeral) connections between wireless mobile devices have raised concerns over the security of ephemeral networks. An important security challenge in these networks is to identify misbehaving nodes, especially in places where a centrally managed station is absent. To tackle this problem, a local voting-based scheme (game) in which neighboring nodes quickly decide whether to discredit an accused (target) node in mobile networks has been introduced in the literature. However, nodes' beli… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 31 publications
0
3
0
Order By: Relevance
“…The study introduced an authentication mechanism to mitigate node misbehaviour using a collaborative approach of diffusing information about the local selfish node. Behfarnia and Eslami [29] developed a voting game-based scheme to identify node misbehaviour. The technique implements a single-stage Bayesian game for capturing information related to node uncertainties.…”
Section: Studies On Misbehaviourmentioning
confidence: 99%
“…The study introduced an authentication mechanism to mitigate node misbehaviour using a collaborative approach of diffusing information about the local selfish node. Behfarnia and Eslami [29] developed a voting game-based scheme to identify node misbehaviour. The technique implements a single-stage Bayesian game for capturing information related to node uncertainties.…”
Section: Studies On Misbehaviourmentioning
confidence: 99%
“…The weakness of this method is that it only focuses on detecting the false alert's generation attack but does not consider other types of attacks facing the VNs. [37], [38] [39], [40] [41]- [46] [47]- [50] [45], [46], [51], [52] [53]- [59] [60], [61] [62], [63] Stackelberg [64], [65] [66]- [69] [70]- [73] Network slicing [74] Bayesian General [75], [76] [ Sedjelmaci et al [35] further developed a lightweight hybrid IDS for VNs considering both the mobility of vehicles and various types of attacks, neither of which were considered in their previous work [75]. Three intrusion detection agents are considered in the hybrid IDS framework: Local Intrusion Detection System (LIDS) at the cluster member level, Global Intrusion Detection System (GIDS) at the CH level, and Global Decision System (GDS) at RSU level.…”
Section: Gt In Vns Game Theory Approaches In Vehicular Network: a Surveymentioning
confidence: 99%
“…By adopting the monitoring strategies based on the NE, the volume of IDS traffic is significantly reduced while maintaining a satisfied detection rate and accuracy. The cyber defense game [64], [65] for VNs takes the works in [36] and [75] a step further by using a hierarchical Relate the target vehicles old pseudonym to its new pseudonym [132] Defender and attacker [76] with a case study of VNs. A voting-based Bayesian game between a benign node PLB and a target node PLT is proposed.…”
Section: Gt In Vns Game Theory Approaches In Vehicular Network: a Surveymentioning
confidence: 99%