Indian Journal of Science and Technology
Year: 2012, Volume: 5, Issue: 2, Pages: 1-9
Marjan Kuchaki Rafsanjani1*, laya Aliahmadipour1 and Mohammad Masoud Javidi1
In general, mobile ad hoc networks (MANET) are formed dynamically by an autonomous system of mobile nodes that are connected via wireless links without using an existing network infrastructure or centralized administration. The hosts establish infrastructure and cooperate to forward data in a multi-hop fashion. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions. In this paper, we proposed a method for prevention internal intruder and detection external intruder by using game theory in mobile ad hoc network. One optimal solution for reducing the resource consumption of detection external intruder is to elect a cluster head for each cluster to provide intrusion service to other nodes in the its cluster, we call this mode, normal mode. Normal mode is only suitable when the probability of attack is low. Once the probability of attack is high, victim nodes should launch their own IDS to detect and thwart intrusions and we call perfect mode. In this paper cluster head should not be malicious or selfish node and must detect external intrusion in its cluster with enough resource and honest behavior. Our hybrid method has three phases: the first phase building trust relationship between nodes and estimation trust value for each node to prevent internal intrusion. In the second phase we propose an optimal method for cluster head election by using trust value; and in the third phase, finding the threshold value for notifying the victim node to launch its IDS once the probability of attack exceeds that value. In first and third phase we apply Bayesian game. Our hybrid method due to using game theory, trust value and honest cluster head election algorithm can effectively improve the network security, performance and reduce resource consumption.
Keywords: Mobile Ad hoc Network (MANET), Intrusion detection system (IDS), Cluster head, Trust value, Game theory.
Subscribe now for latest articles and news.