Game theoretic modeling of gray hole attacks in wireless ad hoc networks

dc.contributor.authorKetankumar, C.K.
dc.contributor.authorSankaranarayanan, S.
dc.contributor.authorLakshman, V.
dc.contributor.authorChandrasekaran, K.
dc.date.accessioned2026-02-06T06:38:56Z
dc.date.issued2017
dc.description.abstractWireless ad hoc networks rely on the cooperation of participating nodes to undertake activities such as routing. Malicious nodes participating in the network may refuse to forward packets and instead discard them to mount a denial-of-service attack called a packet drop or blackhole attack. Blackhole attacks can however be easily detected using common networking tools like trace route as all packets passing through the malicious node is dropped. A gray hole attack on the other hand accomplishes denial of service by selectively dropping packets thus escaping detection. In this paper, a novel two player incomplete information extensive form game is used to model the defender and the attacker both of whom are considered rational agents in an effort to determine their optimal (equilibrium) strategies under different values for the parameters true detection rate, false alarm rate, packet value, packets forwarded per unit time, probability of the node being a gray hole, cost of exposure of the attacker and cost of not using a node for the defender. The respective equilibrium strategies if followed guarantee maximum possible protection for the defender and maximal possible damage potential for the attacker. © Springer India 2017.
dc.identifier.citationLecture Notes in Electrical Engineering, 2017, Vol.395, , p. 217-226
dc.identifier.issn18761100
dc.identifier.urihttps://doi.org/10.1007/978-81-322-3592-7_21
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/31996
dc.publisherSpringer Verlag service@springer.de
dc.subjectBlackhole attack
dc.subjectGame theory for security
dc.subjectGray hole attack
dc.subjectPacket drop attack
dc.subjectWANETs
dc.subjectWireless ad hoc networks
dc.titleGame theoretic modeling of gray hole attacks in wireless ad hoc networks

Files