A game theoretic approach to gray hole attacks in Wireless Mesh Networks

D. Shila, T. Anjali
{"title":"A game theoretic approach to gray hole attacks in Wireless Mesh Networks","authors":"D. Shila, T. Anjali","doi":"10.1109/MILCOM.2008.4753657","DOIUrl":null,"url":null,"abstract":"Wireless Mesh Networks (WMNs) are multi hop networks in which the mesh clients rely on static mesh routers (or directly via other mesh clients) to relay data from one point to another in a multihop fashion. WMN gained significant attention because of the numerous applications it supports, e.g., broadband home networking, community and neighborhood networks, delivering video, building automation, in entertainment and sporting venues etc. But the main challenge of these multihop networks is the susceptibility to various security threats. In this paper, we address the problem of gray hole attack in which a malicious node refuses to forward a subset of the packets it receives. We present the attack in a simple network of mesh routers in the framework of a non-cooperative Markov game between genuine and malicious mesh router. The main objective of the legitimate node (Player I) is to maximize its throughput by minimizing the loss caused by the attackers. On the other hand , the main goal of the attacker (Player II) is to minimize the throughput of the network by dropping the data packets. We investigate the nash equilibrium of the non cooperative game by allowing the nodes to select their own actions that optimizes the individual performance in terms of the packet delivery ratio.","PeriodicalId":434891,"journal":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference","volume":"248 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"21","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 2008 - 2008 IEEE Military Communications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.2008.4753657","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 21

Abstract

Wireless Mesh Networks (WMNs) are multi hop networks in which the mesh clients rely on static mesh routers (or directly via other mesh clients) to relay data from one point to another in a multihop fashion. WMN gained significant attention because of the numerous applications it supports, e.g., broadband home networking, community and neighborhood networks, delivering video, building automation, in entertainment and sporting venues etc. But the main challenge of these multihop networks is the susceptibility to various security threats. In this paper, we address the problem of gray hole attack in which a malicious node refuses to forward a subset of the packets it receives. We present the attack in a simple network of mesh routers in the framework of a non-cooperative Markov game between genuine and malicious mesh router. The main objective of the legitimate node (Player I) is to maximize its throughput by minimizing the loss caused by the attackers. On the other hand , the main goal of the attacker (Player II) is to minimize the throughput of the network by dropping the data packets. We investigate the nash equilibrium of the non cooperative game by allowing the nodes to select their own actions that optimizes the individual performance in terms of the packet delivery ratio.
无线网状网络中灰洞攻击的博弈论方法
无线网状网络(WMNs)是多跳网络,其中网状客户端依赖静态网状路由器(或直接通过其他网状客户端)以多跳方式将数据从一个点中继到另一个点。WMN因其支持的众多应用而获得了极大的关注,例如宽带家庭网络、社区和邻里网络、视频传输、楼宇自动化、娱乐和体育场馆等。但多跳网络的主要挑战是易受各种安全威胁的影响。在本文中,我们解决了灰洞攻击的问题,在灰洞攻击中,恶意节点拒绝转发它收到的数据包的子集。在正版和恶意版路由器之间的非合作马尔可夫博弈框架下,我们在一个简单的网状路由器网络中提出了这种攻击。合法节点(参与人I)的主要目标是通过最小化攻击者造成的损失来最大化其吞吐量。另一方面,攻击者(Player II)的主要目标是通过丢弃数据包来最小化网络吞吐量。我们研究了非合作博弈的纳什均衡,允许节点选择自己的行为,以优化个体的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信