Share Email Print
cover

Proceedings Paper

Mean field game theoretic approach for security in mobile ad-hoc networks
Author(s): Yanwei Wang; Helen Tang; F. Richard Yu; Minyi Huang
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

Game theory can provide a useful tool to study the security problem in mobile ad hoc networks (MANETs). Most existing work on applying game theories to security only considers two players in the security game model: an attacker and a defender. While this assumption is valid for a network with centralized administration, it may not be realistic in MANETs, where centralized administration is not available. Consequently, each individual node in a MANET should be treated separately in the security game model. In this paper, using recent advances in mean field game theory, we propose a novel game theoretic approach for security in MANETs. Mean field game theory provides a powerful mathematical tool for problems with a large number of players. Since security defence mechanisms consume precious system resources (e.g., energy), the proposed scheme considers not only the security requirement of MANETs but also the system resources. In addition, each node only needs to know its own state information and the aggregate effect of the other nodes in the MANET. Therefore, the proposed scheme is a fully distributed scheme. Simulation results are presented to illustrate the effectiveness of the proposed scheme.

Paper Details

Date Published: 28 May 2013
PDF: 8 pages
Proc. SPIE 8755, Mobile Multimedia/Image Processing, Security, and Applications 2013, 875509 (28 May 2013); doi: 10.1117/12.2015281
Show Author Affiliations
Yanwei Wang, Carleton Univ. (Canada)
Helen Tang, Defence Research and Develeopment Canada, Ottawa (Canada)
F. Richard Yu, Carleton Univ. (Canada)
Minyi Huang, Carleton Univ. (Canada)


Published in SPIE Proceedings Vol. 8755:
Mobile Multimedia/Image Processing, Security, and Applications 2013
Sos S. Agaian; Sabah A. Jassim; Eliza Yingzi Du, Editor(s)

© SPIE. Terms of Use
Back to Top