Modeling malicious multi-attacker node collusion in MANETs via game theory

Althoughthe mitigation approaches towards securing the mobile adhoc networks against malicious nodes have been explored widely in recent years but there is a dearth of solutions that can prove effective in addressing the behavior of malicious nodes within a network. As a result, visualizing the ma...

Full description

Bibliographic Details
Main Authors: Khan, Burhan Ul Islam, Olanrewaju, Rashidah Funke, Matoo, Mohd Mueen Ul-Islam, Abdul Aziz, Afza, Ahmad Lone, Sajaad
Format: Article
Language:English
Published: IDOSI Publications 2017
Subjects:
Online Access:http://irep.iium.edu.my/56761/
http://irep.iium.edu.my/56761/1/Modeling%20Malicious%20Multi-Attacker%20Node%20Collusion.pdf
_version_ 1848784804458266624
author Khan, Burhan Ul Islam
Olanrewaju, Rashidah Funke
Matoo, Mohd Mueen Ul-Islam
Abdul Aziz, Afza
Ahmad Lone, Sajaad
author_facet Khan, Burhan Ul Islam
Olanrewaju, Rashidah Funke
Matoo, Mohd Mueen Ul-Islam
Abdul Aziz, Afza
Ahmad Lone, Sajaad
author_sort Khan, Burhan Ul Islam
building IIUM Repository
collection Online Access
description Althoughthe mitigation approaches towards securing the mobile adhoc networks against malicious nodes have been explored widely in recent years but there is a dearth of solutions that can prove effective in addressing the behavior of malicious nodes within a network. As a result, visualizing the malicious nodes effectively through various simulation techniques is considered to be the most challenging issue. Owing to the fact that malicious nodes do not employ any such approaches that are probable to be detected, they show confusing behavior which makes it nearly impossible to distinguish them as malicious or regular nodes. The proposed study highlights the ability of game theory for enhancing the multi-attacker collusion approach to represent the unpredictable behavior of nodes in cooperating, reporting, declining or attacking other nodes to achieve effective modelling of the range of mobile nodes in a mobile adhoc network.
first_indexed 2025-11-14T16:43:04Z
format Article
id iium-56761
institution International Islamic University Malaysia
institution_category Local University
language English
last_indexed 2025-11-14T16:43:04Z
publishDate 2017
publisher IDOSI Publications
recordtype eprints
repository_type Digital Repository
spelling iium-567612017-11-03T03:02:35Z http://irep.iium.edu.my/56761/ Modeling malicious multi-attacker node collusion in MANETs via game theory Khan, Burhan Ul Islam Olanrewaju, Rashidah Funke Matoo, Mohd Mueen Ul-Islam Abdul Aziz, Afza Ahmad Lone, Sajaad Q Science (General) QA Mathematics QA75 Electronic computers. Computer science Althoughthe mitigation approaches towards securing the mobile adhoc networks against malicious nodes have been explored widely in recent years but there is a dearth of solutions that can prove effective in addressing the behavior of malicious nodes within a network. As a result, visualizing the malicious nodes effectively through various simulation techniques is considered to be the most challenging issue. Owing to the fact that malicious nodes do not employ any such approaches that are probable to be detected, they show confusing behavior which makes it nearly impossible to distinguish them as malicious or regular nodes. The proposed study highlights the ability of game theory for enhancing the multi-attacker collusion approach to represent the unpredictable behavior of nodes in cooperating, reporting, declining or attacking other nodes to achieve effective modelling of the range of mobile nodes in a mobile adhoc network. IDOSI Publications 2017 Article PeerReviewed application/pdf en http://irep.iium.edu.my/56761/1/Modeling%20Malicious%20Multi-Attacker%20Node%20Collusion.pdf Khan, Burhan Ul Islam and Olanrewaju, Rashidah Funke and Matoo, Mohd Mueen Ul-Islam and Abdul Aziz, Afza and Ahmad Lone, Sajaad (2017) Modeling malicious multi-attacker node collusion in MANETs via game theory. Middle-East Journal of Scientific Research, 25 (3). pp. 568-579. ISSN 1990-9233 E-ISSN 1999-8147 https://www.idosi.org/mejsr/mejsr25(3)17.htm 10.5829/idosi.mejsr.2017.568.579
spellingShingle Q Science (General)
QA Mathematics
QA75 Electronic computers. Computer science
Khan, Burhan Ul Islam
Olanrewaju, Rashidah Funke
Matoo, Mohd Mueen Ul-Islam
Abdul Aziz, Afza
Ahmad Lone, Sajaad
Modeling malicious multi-attacker node collusion in MANETs via game theory
title Modeling malicious multi-attacker node collusion in MANETs via game theory
title_full Modeling malicious multi-attacker node collusion in MANETs via game theory
title_fullStr Modeling malicious multi-attacker node collusion in MANETs via game theory
title_full_unstemmed Modeling malicious multi-attacker node collusion in MANETs via game theory
title_short Modeling malicious multi-attacker node collusion in MANETs via game theory
title_sort modeling malicious multi-attacker node collusion in manets via game theory
topic Q Science (General)
QA Mathematics
QA75 Electronic computers. Computer science
url http://irep.iium.edu.my/56761/
http://irep.iium.edu.my/56761/
http://irep.iium.edu.my/56761/
http://irep.iium.edu.my/56761/1/Modeling%20Malicious%20Multi-Attacker%20Node%20Collusion.pdf