A Game-Based Survey for Security Issues in Vehicular Ad Hoc Network

Article Preview

Abstract:

A rapid growth in the number of vehicles contributes to more and more attention on vehicular ad hoc network (VANET) recently, and ensuring security plays a significant role in maintaining its stable operation. Because of some variable environmental factors, its impossible to evaluate a precise value of packets transmission success rate. To reduce the influence of errors on detection, we develop a novel two-person zero-sum intrusion detection game model for formulating confrontation behavior between intrusion detection system (IDS) and malicious node.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2427-2430

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M. Kodialam and T. V. Lakshman, Detecting Network Intrusions via Sampling: A Game Theoretic Approach, Bell Laboratories Lucent Technologies, April (2003).

DOI: 10.1109/infcom.2003.1209210

Google Scholar

[2] M. Mehrandish, H. Otrok, M. Debbabi, C. Assi and P. Bhattacharya, A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario, Proc. 49th annual of IEEE GLOBECOM, San Francisco, IEEE press, (2006).

DOI: 10.1109/glocom.2006.293

Google Scholar

[3] M. Mehrandish, C. Assi and M. Debbabi, A Game Theoretic Model to Handle Network Intrusions over Multiple Packets, In Proc. of IEEE International Conference on Communications (ICC), Turkey, June (2006).

DOI: 10.1109/icc.2006.255095

Google Scholar

[4] H. Otrok, N. Mohammed, L. Wang, M. Debbabi and P. Bhattacharya, A game-theoretic intrusion detection model for mobile ad-hoc networks, Journal of Computer Communications, 31(4): 708–721, (2008).

DOI: 10.1016/j.comcom.2007.10.024

Google Scholar

[5] Y. Liu, C. Comaniciu and H. Man, A Bayesian game approach for intrusion detection in wireless ad hoc networks, ACM International Conference Proceeding Series, Vol. 199, (2006).

DOI: 10.1145/1190195.1190198

Google Scholar

[6] N. Mohammed, H. Otrok, L. Wang, M. Debbabi and P. Bhattacharya, Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET, IEEE Transactions on Dependable and Secure Computing, vol. 99, no. 1, (2008).

DOI: 10.1109/tdsc.2009.22

Google Scholar

[7] S. Shen, Y. Li, H. Xu, Q. Cao, Signaling game based strategy of intrusion detection in wireless sensor networks, Computers & Mathematics with Applications 62: 2404–2416, (2011).

DOI: 10.1016/j.camwa.2011.07.027

Google Scholar

[8] D. Luo, Study on the Analytic Methods for Grey Decision-Making, Nanjing University of Aeronautics and Astronautics, N941, 120100, 1028709 04-0001, October (2004).

Google Scholar