Total views : 1356

A Hybrid Intrusion Detection by Game Theory Approaches in MANET


  • Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, Iran, Islamic Republic of


In general, mobile ad hoc networks (MANET) are formed dynamically by an autonomous system of mobile nodes that are connected via wireless links without using an existing network infrastructure or centralized administration. The hosts establish infrastructure and cooperate to forward data in a multi-hop fashion. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions. In this paper, we proposed a method for prevention internal intruder and detection external intruder by using game theory in mobile ad hoc network. One optimal solution for reducing the resource consumption of detection external intruder is to elect a cluster head for each cluster to provide intrusion service to other nodes in the its cluster, we call this mode, normal mode. Normal mode is only suitable when the probability of attack is low. Once the probability of attack is high, victim nodes should launch their own IDS to detect and thwart intrusions and we call perfect mode. In this paper cluster head should not be malicious or selfish node and must detect external intrusion in its cluster with enough resource and honest behavior. Our hybrid method has three phases: the first phase building trust relationship between nodes and estimation trust value for each node to prevent internal intrusion. In the second phase we propose an optimal method for cluster head election by using trust value; and in the third phase, finding the threshold value for notifying the victim node to launch its IDS once the probability of attack exceeds that value. In first and third phase we apply Bayesian game. Our hybrid method due to using game theory, trust value and honest cluster head election algorithm can effectively improve the network security, performance and reduce resource consumption.


Mobile Ad Hoc Network Mobile Ad Hoc Network (MANET), Intrusion Detection System (IDS), Cluster Head, Trust Value, Game Theory

Full Text:

 |  (PDF views: 834)


  • Agah A and Das K (2007) Preventing DoS attacks in wireless sensornetworks: a repeated game theory approach. Intl. J. Network Security. 5, 145-153.
  • Capra L (2004) Toward a human trust model for mobile ad-hoc networks. Proce. 2nd UK-UbiNet Workshop. Cambridge Univ.
  • Dagadeviren O and Erciyes K (2008) A Hierarchical cluster head election protocol for mobile ad hoc network. Lect. Notes in Comput. Sci. pp: 509-518.
  • Eschenauer L, Gligor V and Baras J (2002) Trust establishment in mobile ad-hoc networks. MS. Thesis.University of Maryland Cambridge.
  • Ganchev A, Narayanan L and Shende S (2008) Games to induce specified equilibria. Elsevier Theoretical Comput. Sci. 409, 341-350.
  • Garcıa-Teodoroa p, Dıaz-Verdejoa J, Macia- Fernandeza G and Vazquezb E (2009) Anomaly-based network intrusion detection: Techniques, Sys. & Challenges. Elsevier. 28,18-28.
  • Hu Y and Perrig A (2004) A survey of secure wireless ad hoc routing. IEEE Security &d Privacy. 2, 28-39.
  • Huang Y and Lee W (2003) A cooperative intrusion detection system for ad hoc networks. ACM Workshop Security of ad hoc & Sensor Network.
  • Jiang X, Lin C, Yin H, Chen Z and Su L (2009) Gamebased trust establishment for mobile ad hoc networks. IEEE Intl. Conf. Commun. & Mobile Comput., CMC. pp: 475-479.
  • Kachirski O and Guha R (2003) Effective intrusion detection using multi sensors in wireless ad hoc networks. Intl. Conf. Sys. Sci. 8.
  • Kodialam M and LakshmanT (2003) detecting network intrusions via sampling:agame theoretic approach. IEEE Comput. & Commun. INFOCOM. pp: 1880-1889.
  • Kuchaki Rafsanjani M (2009) Evaluating intrusion detection system and comparison of intrusion detection and detecting misbehaving nodes for MANET. Advanced Technologies. Ch.6. Kankesu Jayanthakumaran (Ed.). In-Teh. Croatia. 91-104.
  • Lima M, Santos A and Pujolle G (2009) A survey of survivability in mobile ad hoc networks. IEEE Commun. Sur. & Tutorials. 11, 66-77.
  • Liu P and zang W (2005) Incentive based modeling and inference of attacker intent, objectives, and strategies. J. ACM Trans. Info. & Sys. Security (TISSEC). 8,1-41.
  • Marchang N and Tripathi R (2007) A game theoretical approach for efficient deployment of intrusion detection system in mobile ad hoc networks. Intl. Conf. Advanced Comput. & Commun. pp: 460-464.
  • Mitrokotsa A, Komninos N and Douligeris C (2007) Intrusion detection with neural network and watermarking Techniques for MANET. IEEE Conf. Turkey. pp: 118-127.
  • Mohammed N, Otrok H, Wang L, Debbabi M and Bhattacharya P (2008) A mechanism design-based multicluster head election scheme for Intrusion detection in manet. IEEE Trans. Dependable & Secure Comput. pp: 89-103.
  • Morris P (1994) introduction to game theory. Springer. 1st edition.
  • Otrok H, Mohammed N, Wang L, Debbabi M and Bhattacharya P (2008) A moderate to robust game theoretical model for intrusion detection in manets. IEEE Intl. Conf. Wireless & Mobile Comput. Networking & Commun. WIMOB. pp: 608-612.
  • Otrok H, Mohammed N, Wang L, Debbabi M and Bhattacharya P (2008) A game-theoretic intrusion detection model for mobile ad hoc networks. Elsevier. Algorithmic & Theoretical Aspects of Wireless ad hoc & Sensor Networks. 31, 708-721.
  • Patcha A and Park J (2006) A game theoretic formulation for intrusion detection in mobile ad hoc networks. Intl. J. Network Security. 2,131-137.
  • Poongothai T and Jayarajan K (2008) A noncooperative game approach for intrusion detection in mobile ad hoc networks. IEEE Comput. Commun. & Networking. pp:1-4.
  • Ren K, Li T, Wan Z, Bao FR, Deng R and Kim K (2004) Highly reliable trust establishment scheme in ad hoc networks. Elsevier. Comput. Networks. 45, 687-699.
  • Seshadri K, Ramana A andKasiviswanth N (2010) A survey on trust management for mobile ad hoc networks. Intl. J. Network Security & Its Appl.(IJNSA). 2, 75-85.
  • Wang K, Wu M and Shen S (2008) A trust evaluation method for node cooperation in mobile ad hoc networks. IEEE Conf. Information Technol. pp: 1000-1005.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.