Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Security for Wireless Ad--hoc Networks
Security for Wireless Ad--hoc Networks
Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
CHEMAS: Identify suspect nodes in selective forwarding attacks
Journal of Parallel and Distributed Computing
Cooperative black and gray hole attacks in mobile ad hoc networks
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Mitigation of colluding route falsification attacks by insider nodes in mobile ad hoc networks
Wireless Communications & Mobile Computing
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Cooperative strategy by Stackelberg games under energy constraint in multi-hop relay networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Maintaining defender's reputation in anomaly detection against insider attacks
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on game theory
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
IEEE Transactions on Wireless Communications
Model Checking Ad Hoc Network Routing Protocols: ARAN vs. endairA
SEFM '10 Proceedings of the 2010 8th IEEE International Conference on Software Engineering and Formal Methods
Network Security: A Decision and Game-Theoretic Approach
Network Security: A Decision and Game-Theoretic Approach
The Alohanet - surfing for wireless data [History of Communications]
IEEE Communications Magazine
Guest Editorial Non-Cooperative Behavior in Networking
IEEE Journal on Selected Areas in Communications
Automated equilibrium analysis of repeated games with private monitoring: a POMDP approach
Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 3
Hi-index | 0.24 |
In multihop wireless networks (MWNs), the selective forwarding attack is a special case of denial of service attack. In this attack, the malicious wireless nodes only forward a subset of the received packets, but drop the others. This attack becomes more severe if multiple attackers exist and collude together to disrupt the normal functioning of the secure protocols. By colluding, each attacker can even only drop a little packets, but the overall loss of the path will be high. However, most prior researches on selective forwarding attacks assume the attackers do not collude with each other. Furthermore, the previous works also lack of comprehensive security analysis. In this paper, by utilizing the game theoretic approach, we analyze the collusion in selective forwarding attacks. We first put forward a sub-route oriented punish and reward scheme, and propose an multi-attacker repeated colluding game. Then by static and dynamic analysis of this colluding attack game, we find the sub-game equilibriums which indicate the attackers' optimal attack strategies. Based on the analysis result, we establish a security policies for multihop wireless networks, to threaten and detect the malicious insider nodes which collude with each other to launch the selective forwarding attacks.