SEEE DIGIBOOK ON ENGINEERING & TECHNOLOGY, VOL. 01, FEB 2018 PP.(120-127)


Abstract—Net-centric Operations (NCO) including Net-Centric Warfare (NCW) has taken a paradigm shift in a way wars are fought involving intelligence, strategic decision making and deploying strategies which can effectively be demonstrated by probabilistic mathematical model known as ‘Game Theory’. In this paper the proposed work models the agent behavior which are represented by two players of a game one is a source/victim node and another being an intruder/attacker node initiates a game by deploying mixed strategies. The main idea is to tackle intruders for the benefit of the network by not purging it out of the network once it is being detected as intruder. The scenario of two-player non-cooperative zero sum game in a Wireless Mesh Network Setting is demonstrated wherein the payoff of the players which is the utility of the source/attacker is examined with varying dropping probability of packets and forwarding probability of packets through results. The scenario considered is theoretical model wherein an attacker/intruder is performing selective forwarding attacks.

Index Terms -Game Theory, Players, Strategies, Payoff, Utility, Wireless Mesh Network, Intrusion Tackling, Selective Forwarding.

REFERENCE

[1].R. Koch, “Blackout and Now ? Network Centric Warfare in an Anti-Access Area- Denial Theatre,” pp. 169–184, 2015.
[2].M. Maybury, “Toward the Assured Cyberspace Advantage : Air Force Cyber Vision 2025,” no. February, 2015.
[3].N. Warfare and W. Communications, “Modern warfare is increasingly network-centric,” no. 408, pp. 1–4, 2008.
[4].S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, and Q. Wu, “A Survey of Game Theory as Applied to Network Security ”
[5].A. K. Pathan, S. Khanam, H. Y. Saleem, and W. Mustafa, “Tackling Intruders in Wireless Mesh Networks” in Distributed Networks: Intelligence, Security and Applications, Qurban A.Memon, Ed.FL: CRC Press,2014,pp.167-190.
[6].Shila D.M. and Anjali, T., “Defending Selective Forwarding Attacks in WMNs”, IEEE International Conference on Electro/Information Technology 2008 (EIT’08), Iowa, USA, May 18-20, 2008, pp. 96-101.
[7].Nagaraj Balakrishnan, Reshmi S., and R. Arunkumar. “SMART REAL TIME RESCUE SYSTEM FOR FISHERMEN.” Pak. J. Biotechnol. Vol 15.1 (2018): 73-75.
[8].Cheikhrouhou, O., Laurent-Maknavicius, M., and Chaouchi, H., “Security Architecture in a Multihop Mesh Network”, 5th Conference on Safety and Architectures Networks SAR 2006, Seignosse, Landes, France, June 2006, pp. 1-10.
[9].Shila, D.M., Cheng, Y. and Anjali, T., “Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks”, The Proceedings of IEEE Globecom 2009, Nov. 30 2009-Dec. 4 2009, Honolulu, HI, USA, 2009, pp. 1-6.
[10].Parno, B., Perrig A., Gligor, V., “Distributed Detection of Node Replication Attacks in Sensor Networks”, Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P’05), 8-11 May 2005, pp. 49-63.
[11].Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., and Belding-Royer, E.M., “A Secure Routing Protocol for Ad Hoc Networks”, Proceedings of the 10 th IEEE International Conference on Network Protocols (ICNP’02), 12-15 Nov. 2002, pp.78-87.
[12].Salem, N.B. and Hubaux, J.P., “Securing Wireless Mesh Networks”, IEEE Wireless Communication, Volume: 13, Issue: 2, April 2006, pp. 50-55.
[13].Shila, D.M. and Anjali, T., “A Game Theoretic Approach to Gray Hole Attacks in Wireless Mesh Networks”, in Proc. IEEE MILCOM, San Diego, CA, Nov. 16-19 2008, pp. 1-7.
[14].Srivastava, V., Neel, J., MacKenzie, A.B., Menon, R., DaSilva, L. A., Hicks, J. E., Reed, J. H., and Gilles, R.P., “Using game theory to analyze wireless ad hoc networks”, IEEE Communications Surveys & Tutorials, Fourth Quarter 2005, Volume 7, No. 4, 2005, pp. 46-56.
[15].Javidi, M.M. and Aliahmadipour, L., “Game theory approaches for improving intrusion detection in MANETs”, Scientific Research and Essays, Vol. 6 (31), 16 December 2011, pp. 6535-6539.
[16].www.mathworks.com


Alok J Shukla1, Dr.Manju Nanda2, Kushal K S2
1 Manipal Institute of Technology, Manipal, India
2 CSIR National Aerospace Laboratories, Bangalore, India
alokjs89@gmail.com, manjun@nal.res.in, ksk261188@gmail.com