Paper
28 May 2013 Mean field game theoretic approach for security in mobile ad-hoc networks
Yanwei Wang, Helen Tang, F. Richard Yu, Minyi Huang
Author Affiliations +
Abstract
Game theory can provide a useful tool to study the security problem in mobile ad hoc networks (MANETs). Most existing work on applying game theories to security only considers two players in the security game model: an attacker and a defender. While this assumption is valid for a network with centralized administration, it may not be realistic in MANETs, where centralized administration is not available. Consequently, each individual node in a MANET should be treated separately in the security game model. In this paper, using recent advances in mean field game theory, we propose a novel game theoretic approach for security in MANETs. Mean field game theory provides a powerful mathematical tool for problems with a large number of players. Since security defence mechanisms consume precious system resources (e.g., energy), the proposed scheme considers not only the security requirement of MANETs but also the system resources. In addition, each node only needs to know its own state information and the aggregate effect of the other nodes in the MANET. Therefore, the proposed scheme is a fully distributed scheme. Simulation results are presented to illustrate the effectiveness of the proposed scheme.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Yanwei Wang, Helen Tang, F. Richard Yu, and Minyi Huang "Mean field game theoretic approach for security in mobile ad-hoc networks", Proc. SPIE 8755, Mobile Multimedia/Image Processing, Security, and Applications 2013, 875509 (28 May 2013); https://doi.org/10.1117/12.2015281
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Network security

Defense and security

Mathematical modeling

Computer security

Matrices

Systems modeling

Back to Top