Please use this identifier to cite or link to this item:
https://idr.nitk.ac.in/jspui/handle/123456789/8128
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Doshi, C.K. | |
dc.contributor.author | Sankaranarayanan, S. | |
dc.contributor.author | Lakshman, V.B. | |
dc.contributor.author | Chandrasekaran, K. | |
dc.date.accessioned | 2020-03-30T10:18:06Z | - |
dc.date.available | 2020-03-30T10:18:06Z | - |
dc.date.issued | 2017 | |
dc.identifier.citation | Lecture Notes in Electrical Engineering, 2017, Vol.395, , pp.217-226 | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/8128 | - |
dc.description.abstract | Wireless ad hoc networks rely on the cooperation of participating nodes to undertake activities such as routing. Malicious nodes participating in the network may refuse to forward packets and instead discard them to mount a denial-of-service attack called a packet drop or blackhole attack. Blackhole attacks can however be easily detected using common networking tools like trace route as all packets passing through the malicious node is dropped. A gray hole attack on the other hand accomplishes denial of service by selectively dropping packets thus escaping detection. In this paper, a novel two player incomplete information extensive form game is used to model the defender and the attacker both of whom are considered rational agents in an effort to determine their optimal (equilibrium) strategies under different values for the parameters true detection rate, false alarm rate, packet value, packets forwarded per unit time, probability of the node being a gray hole, cost of exposure of the attacker and cost of not using a node for the defender. The respective equilibrium strategies if followed guarantee maximum possible protection for the defender and maximal possible damage potential for the attacker. � Springer India 2017. | en_US |
dc.title | Game theoretic modeling of gray hole attacks in wireless ad hoc networks | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.