SlideShare a Scribd company logo
1 of 2
Logic Mind Technologies
Vijayangar (Near Maruthi Medicals), Bangalore-40
Ph: 8123668124 // 8123668066
Development of a Secure Routing Protocol using
Game Theory Model in Mobile Ad Hoc Networks
Abstract
In mobile ad-hoc networks (MANETs), nodes are mobile in nature. Collaboration between
mobile nodes is more significant in MANETs, which have as their greatest challenges
vulnerabilities to various security attacks and an inability to operate securely while preserving its
resources and performing secure routing among nodes. Therefore, it is essential to develop an
effective secure routing protocol to protect the nodes from anonymous behaviors. Currently,
game theory is a tool that analyzes, formulates and solves selfishness issues. It is seldom applied
to detect malicious behavior in networks. It deals, instead, with the strategic and rational
behavior of each node. In our study, we used the dynamic Bayesian signaling game to analyze
the strategy profile for regular and malicious nodes. This game also revealed the best actions of
individual strategies for each node. Perfect Bayesian equilibrium (PBE) provides a prominent
solution for signaling games to solve incomplete information by combining strategies and payoff
of players that constitute equilibrium. Using PBE strategies of nodes are private information of
regular and malicious nodes. Regular nodes should be cooperative during routing and update
their payoff, while malicious nodes take sophisticated risks by evaluating their risk of being
identified to decide when to decline. This approach minimizes the utility of malicious nodes and
it motivates better cooperation between nodes by using the reputation system. Regular nodes
monitor continuously to evaluate their neighbors using belief updating systems of the Bayes rule
SYSTEM SPECIFICATION
Software Specification
Operating system : Linux (Ubuntu)
Software : Network Simulator 2.35
Programming languages : Tool Command Language, AWK, C++
Hardware Specification
Main processor : Dual Core
Hard disk capacity : 80GB
Cache memory : 2 GB
PROJECT FLOW:
First Review:
Literature Survey
Paper Explanation
Design of Project
Project Enhancement explanation
Second Review:
Implementing 40% of Base Paper
Third Review
Implementing Remaining 60% of Base Paper with Future Enhancement (Modification)
For More Details please contact
Logic Mind Technologies
Vijayangar (NearMaruthi Medicals), Bangalore-40
Ph: 8123668124 // 8123668066
Mail: logicmindtech@gmail.com

More Related Content

What's hot

Defending against collaborative attacks by malicious nodes in mane ts a coope...
Defending against collaborative attacks by malicious nodes in mane ts a coope...Defending against collaborative attacks by malicious nodes in mane ts a coope...
Defending against collaborative attacks by malicious nodes in mane ts a coope...LogicMindtech Nologies
 
Defending against collaborative attacks by malicious nodes in mane ts a coope...
Defending against collaborative attacks by malicious nodes in mane ts a coope...Defending against collaborative attacks by malicious nodes in mane ts a coope...
Defending against collaborative attacks by malicious nodes in mane ts a coope...LogicMindtech Nologies
 
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsA Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsDrjabez
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsijtsrd
 
BrainQube - Work organization [XOHW17]
BrainQube - Work organization [XOHW17]BrainQube - Work organization [XOHW17]
BrainQube - Work organization [XOHW17]BrainQube at Necst
 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNIJCNCJournal
 
Classification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision TreeClassification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision TreeCSCJournals
 
Infiltrate 2015 - Data Driven Offense
Infiltrate 2015 - Data Driven Offense Infiltrate 2015 - Data Driven Offense
Infiltrate 2015 - Data Driven Offense Ram Shankar Siva Kumar
 
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLESIEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLESIngenious Techno Solution
 
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...IDES Editor
 
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...IDES Editor
 
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing TechniqueA survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Techniqueijsrd.com
 
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...Wright State University, Dayton, OH, USA
 
Forecasting number of vulnerabilities using long short-term neural memory net...
Forecasting number of vulnerabilities using long short-term neural memory net...Forecasting number of vulnerabilities using long short-term neural memory net...
Forecasting number of vulnerabilities using long short-term neural memory net...IJECEIAES
 
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor NetworksIntrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor Networksrahulmonikasharma
 

What's hot (17)

Defending against collaborative attacks by malicious nodes in mane ts a coope...
Defending against collaborative attacks by malicious nodes in mane ts a coope...Defending against collaborative attacks by malicious nodes in mane ts a coope...
Defending against collaborative attacks by malicious nodes in mane ts a coope...
 
Defending against collaborative attacks by malicious nodes in mane ts a coope...
Defending against collaborative attacks by malicious nodes in mane ts a coope...Defending against collaborative attacks by malicious nodes in mane ts a coope...
Defending against collaborative attacks by malicious nodes in mane ts a coope...
 
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsA Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETs
 
BrainQube - Work organization [XOHW17]
BrainQube - Work organization [XOHW17]BrainQube - Work organization [XOHW17]
BrainQube - Work organization [XOHW17]
 
145 148
145 148145 148
145 148
 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
 
Classification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision TreeClassification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision Tree
 
BIOMETRIC REMOTE AUTHENTICATION
BIOMETRIC REMOTE AUTHENTICATIONBIOMETRIC REMOTE AUTHENTICATION
BIOMETRIC REMOTE AUTHENTICATION
 
Infiltrate 2015 - Data Driven Offense
Infiltrate 2015 - Data Driven Offense Infiltrate 2015 - Data Driven Offense
Infiltrate 2015 - Data Driven Offense
 
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLESIEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES
 
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
 
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
 
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing TechniqueA survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Technique
 
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
 
Forecasting number of vulnerabilities using long short-term neural memory net...
Forecasting number of vulnerabilities using long short-term neural memory net...Forecasting number of vulnerabilities using long short-term neural memory net...
Forecasting number of vulnerabilities using long short-term neural memory net...
 
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor NetworksIntrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
 

Viewers also liked

Fnbe journal assignment
Fnbe journal assignmentFnbe journal assignment
Fnbe journal assignmentAlexis Wei
 
คิคิ
คิคิคิคิ
คิคิfahfink15
 
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...LogicMindtech Nologies
 
φίλοι απο άλλες χώρες
φίλοι απο άλλες χώρεςφίλοι απο άλλες χώρες
φίλοι απο άλλες χώρεςac2005b
 
Cramér–rao lower bounds of rss based localization with anchor position uncert...
Cramér–rao lower bounds of rss based localization with anchor position uncert...Cramér–rao lower bounds of rss based localization with anchor position uncert...
Cramér–rao lower bounds of rss based localization with anchor position uncert...LogicMindtech Nologies
 
High throughput reliable multicast in multi-hop wireless mesh networks
High throughput reliable multicast in multi-hop wireless mesh networksHigh throughput reliable multicast in multi-hop wireless mesh networks
High throughput reliable multicast in multi-hop wireless mesh networksLogicMindtech Nologies
 
Efficient data query in intermittently connected mobile ad hoc social networks
Efficient data query in intermittently connected mobile ad hoc social networksEfficient data query in intermittently connected mobile ad hoc social networks
Efficient data query in intermittently connected mobile ad hoc social networksLogicMindtech Nologies
 
Defending against collaborative attacks by malicious nodes in mane ts a coope...
Defending against collaborative attacks by malicious nodes in mane ts a coope...Defending against collaborative attacks by malicious nodes in mane ts a coope...
Defending against collaborative attacks by malicious nodes in mane ts a coope...LogicMindtech Nologies
 
1107110030 Abdulloh Azzam
1107110030 Abdulloh Azzam1107110030 Abdulloh Azzam
1107110030 Abdulloh AzzamAbdullah Azzam
 
Division etnica y cultural en el ecuador
Division etnica y cultural en el ecuadorDivision etnica y cultural en el ecuador
Division etnica y cultural en el ecuadorMariaJoseAlba
 
BIがクラウドで更なる進化!  データとの連携を強化したデータビジュアライゼーション
BIがクラウドで更なる進化!  データとの連携を強化したデータビジュアライゼーションBIがクラウドで更なる進化!  データとの連携を強化したデータビジュアライゼーション
BIがクラウドで更なる進化!  データとの連携を強化したデータビジュアライゼーションHisashi Igarashi
 
EligibilityLetter%2520(1) (1)
EligibilityLetter%2520(1) (1)EligibilityLetter%2520(1) (1)
EligibilityLetter%2520(1) (1)heba abou diab
 
Opeed optimal energy efficient neighbor discovery scheme in opportunistic ne...
Opeed  optimal energy efficient neighbor discovery scheme in opportunistic ne...Opeed  optimal energy efficient neighbor discovery scheme in opportunistic ne...
Opeed optimal energy efficient neighbor discovery scheme in opportunistic ne...LogicMindtech Nologies
 

Viewers also liked (16)

Fnbe journal assignment
Fnbe journal assignmentFnbe journal assignment
Fnbe journal assignment
 
Coach Wooden letter v2
Coach Wooden letter v2Coach Wooden letter v2
Coach Wooden letter v2
 
คิคิ
คิคิคิคิ
คิคิ
 
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
 
φίλοι απο άλλες χώρες
φίλοι απο άλλες χώρεςφίλοι απο άλλες χώρες
φίλοι απο άλλες χώρες
 
alaa.cv
alaa.cvalaa.cv
alaa.cv
 
Cramér–rao lower bounds of rss based localization with anchor position uncert...
Cramér–rao lower bounds of rss based localization with anchor position uncert...Cramér–rao lower bounds of rss based localization with anchor position uncert...
Cramér–rao lower bounds of rss based localization with anchor position uncert...
 
High throughput reliable multicast in multi-hop wireless mesh networks
High throughput reliable multicast in multi-hop wireless mesh networksHigh throughput reliable multicast in multi-hop wireless mesh networks
High throughput reliable multicast in multi-hop wireless mesh networks
 
Efficient data query in intermittently connected mobile ad hoc social networks
Efficient data query in intermittently connected mobile ad hoc social networksEfficient data query in intermittently connected mobile ad hoc social networks
Efficient data query in intermittently connected mobile ad hoc social networks
 
Defending against collaborative attacks by malicious nodes in mane ts a coope...
Defending against collaborative attacks by malicious nodes in mane ts a coope...Defending against collaborative attacks by malicious nodes in mane ts a coope...
Defending against collaborative attacks by malicious nodes in mane ts a coope...
 
1107110030 Abdulloh Azzam
1107110030 Abdulloh Azzam1107110030 Abdulloh Azzam
1107110030 Abdulloh Azzam
 
Division etnica y cultural en el ecuador
Division etnica y cultural en el ecuadorDivision etnica y cultural en el ecuador
Division etnica y cultural en el ecuador
 
BIがクラウドで更なる進化!  データとの連携を強化したデータビジュアライゼーション
BIがクラウドで更なる進化!  データとの連携を強化したデータビジュアライゼーションBIがクラウドで更なる進化!  データとの連携を強化したデータビジュアライゼーション
BIがクラウドで更なる進化!  データとの連携を強化したデータビジュアライゼーション
 
Composicion gràfica
Composicion gràficaComposicion gràfica
Composicion gràfica
 
EligibilityLetter%2520(1) (1)
EligibilityLetter%2520(1) (1)EligibilityLetter%2520(1) (1)
EligibilityLetter%2520(1) (1)
 
Opeed optimal energy efficient neighbor discovery scheme in opportunistic ne...
Opeed  optimal energy efficient neighbor discovery scheme in opportunistic ne...Opeed  optimal energy efficient neighbor discovery scheme in opportunistic ne...
Opeed optimal energy efficient neighbor discovery scheme in opportunistic ne...
 

Similar to Development of a secure routing protocol using game theory model in mobile ad hoc networks

Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...
Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...
Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...LogicMindtech Nologies
 
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...LogicMindtech Nologies
 
BOTNET DETECTION USING VARIOUS MACHINE LEARNING ALGORITHMS: A REVIEW
BOTNET DETECTION USING VARIOUS MACHINE LEARNING ALGORITHMS: A REVIEWBOTNET DETECTION USING VARIOUS MACHINE LEARNING ALGORITHMS: A REVIEW
BOTNET DETECTION USING VARIOUS MACHINE LEARNING ALGORITHMS: A REVIEWIRJET Journal
 
Sentiment Analysis for Sarcasm Detection using Deep Learning
Sentiment Analysis for Sarcasm Detection using Deep LearningSentiment Analysis for Sarcasm Detection using Deep Learning
Sentiment Analysis for Sarcasm Detection using Deep LearningIRJET Journal
 
A hierarchical account aided reputation management system for mane ts
A hierarchical account aided reputation management system for mane tsA hierarchical account aided reputation management system for mane ts
A hierarchical account aided reputation management system for mane tsLogicMindtech Nologies
 
Botnet detection using Wgans for security
Botnet detection using Wgans for securityBotnet detection using Wgans for security
Botnet detection using Wgans for securityssuser3f5a831
 
Adaptive distributed outlier detection for ws ns
Adaptive distributed outlier detection for ws nsAdaptive distributed outlier detection for ws ns
Adaptive distributed outlier detection for ws nsLogicMindtech Nologies
 
Random broadcast based distributed consensus clock synchronization for mobile...
Random broadcast based distributed consensus clock synchronization for mobile...Random broadcast based distributed consensus clock synchronization for mobile...
Random broadcast based distributed consensus clock synchronization for mobile...LogicMindtech Nologies
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A comparative study of social network analysis tools
A comparative study of social network analysis toolsA comparative study of social network analysis tools
A comparative study of social network analysis toolsDavid Combe
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...AIRCC Publishing Corporation
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...ijcsit
 
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...LogicMindtech Nologies
 
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...LogicMindtech Nologies
 
Robust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention NetworkRobust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention NetworkShamika Ganesan
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
Analytical Study On Artificial Neural Network
Analytical Study On Artificial Neural NetworkAnalytical Study On Artificial Neural Network
Analytical Study On Artificial Neural NetworkKristen Carter
 
Conversational Networks for AutomaticOnline Moderation
Conversational Networks for AutomaticOnline ModerationConversational Networks for AutomaticOnline Moderation
Conversational Networks for AutomaticOnline ModerationJAYAPRAKASH JPINFOTECH
 

Similar to Development of a secure routing protocol using game theory model in mobile ad hoc networks (20)

Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...
Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...
Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...
 
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...
 
BOTNET DETECTION USING VARIOUS MACHINE LEARNING ALGORITHMS: A REVIEW
BOTNET DETECTION USING VARIOUS MACHINE LEARNING ALGORITHMS: A REVIEWBOTNET DETECTION USING VARIOUS MACHINE LEARNING ALGORITHMS: A REVIEW
BOTNET DETECTION USING VARIOUS MACHINE LEARNING ALGORITHMS: A REVIEW
 
Sentiment Analysis for Sarcasm Detection using Deep Learning
Sentiment Analysis for Sarcasm Detection using Deep LearningSentiment Analysis for Sarcasm Detection using Deep Learning
Sentiment Analysis for Sarcasm Detection using Deep Learning
 
A hierarchical account aided reputation management system for mane ts
A hierarchical account aided reputation management system for mane tsA hierarchical account aided reputation management system for mane ts
A hierarchical account aided reputation management system for mane ts
 
Botnet detection using Wgans for security
Botnet detection using Wgans for securityBotnet detection using Wgans for security
Botnet detection using Wgans for security
 
Adaptive distributed outlier detection for ws ns
Adaptive distributed outlier detection for ws nsAdaptive distributed outlier detection for ws ns
Adaptive distributed outlier detection for ws ns
 
Random broadcast based distributed consensus clock synchronization for mobile...
Random broadcast based distributed consensus clock synchronization for mobile...Random broadcast based distributed consensus clock synchronization for mobile...
Random broadcast based distributed consensus clock synchronization for mobile...
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A comparative study of social network analysis tools
A comparative study of social network analysis toolsA comparative study of social network analysis tools
A comparative study of social network analysis tools
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
 
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
 
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
 
Robust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention NetworkRobust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention Network
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
Analytical Study On Artificial Neural Network
Analytical Study On Artificial Neural NetworkAnalytical Study On Artificial Neural Network
Analytical Study On Artificial Neural Network
 
Conversational Networks for AutomaticOnline Moderation
Conversational Networks for AutomaticOnline ModerationConversational Networks for AutomaticOnline Moderation
Conversational Networks for AutomaticOnline Moderation
 

More from LogicMindtech Nologies

Utilizing image scales towards totally training free blind image quality asse...
Utilizing image scales towards totally training free blind image quality asse...Utilizing image scales towards totally training free blind image quality asse...
Utilizing image scales towards totally training free blind image quality asse...LogicMindtech Nologies
 
Thermal imaging as a biometrics approach to facial signature authentication
Thermal imaging as a biometrics approach to facial signature authenticationThermal imaging as a biometrics approach to facial signature authentication
Thermal imaging as a biometrics approach to facial signature authenticationLogicMindtech Nologies
 
Targeting accurate object extraction from an image a comprehensive study of ...
Targeting accurate object extraction from an image  a comprehensive study of ...Targeting accurate object extraction from an image  a comprehensive study of ...
Targeting accurate object extraction from an image a comprehensive study of ...LogicMindtech Nologies
 
Sparse dissimilarity constrained coding for glaucoma screening
Sparse dissimilarity constrained coding for glaucoma screeningSparse dissimilarity constrained coding for glaucoma screening
Sparse dissimilarity constrained coding for glaucoma screeningLogicMindtech Nologies
 
Sar sift a sift like algorithm for sar images
Sar sift  a sift like algorithm for sar imagesSar sift  a sift like algorithm for sar images
Sar sift a sift like algorithm for sar imagesLogicMindtech Nologies
 
On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...
On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...
On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...LogicMindtech Nologies
 
Multi scale two-directional two-dimensional
Multi scale two-directional two-dimensionalMulti scale two-directional two-dimensional
Multi scale two-directional two-dimensionalLogicMindtech Nologies
 
Measuring calorie and nutrition from food image
Measuring calorie and nutrition from food imageMeasuring calorie and nutrition from food image
Measuring calorie and nutrition from food imageLogicMindtech Nologies
 
Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...LogicMindtech Nologies
 
Joint super resolution and denoising from a single depth image
Joint super resolution and denoising from a single depth imageJoint super resolution and denoising from a single depth image
Joint super resolution and denoising from a single depth imageLogicMindtech Nologies
 
Iterative vessel segmentation of fundus images
Iterative vessel segmentation of fundus imagesIterative vessel segmentation of fundus images
Iterative vessel segmentation of fundus imagesLogicMindtech Nologies
 
Influence of color to gray conversion on the performance of document image bi...
Influence of color to gray conversion on the performance of document image bi...Influence of color to gray conversion on the performance of document image bi...
Influence of color to gray conversion on the performance of document image bi...LogicMindtech Nologies
 
Improving pixel based change detection accuracy using an object-based approac...
Improving pixel based change detection accuracy using an object-based approac...Improving pixel based change detection accuracy using an object-based approac...
Improving pixel based change detection accuracy using an object-based approac...LogicMindtech Nologies
 
Image quality assessment for fake biometric detection application to iris f...
Image quality assessment for fake biometric detection  application to iris  f...Image quality assessment for fake biometric detection  application to iris  f...
Image quality assessment for fake biometric detection application to iris f...LogicMindtech Nologies
 
Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...LogicMindtech Nologies
 
Haze removal for a single remote sensing image based on deformed haze imaging...
Haze removal for a single remote sensing image based on deformed haze imaging...Haze removal for a single remote sensing image based on deformed haze imaging...
Haze removal for a single remote sensing image based on deformed haze imaging...LogicMindtech Nologies
 
Face recognition by exploiting local gabor
Face recognition by exploiting local gaborFace recognition by exploiting local gabor
Face recognition by exploiting local gaborLogicMindtech Nologies
 
Enhancing color images of extremely low light scenes based on rgb nir images ...
Enhancing color images of extremely low light scenes based on rgb nir images ...Enhancing color images of extremely low light scenes based on rgb nir images ...
Enhancing color images of extremely low light scenes based on rgb nir images ...LogicMindtech Nologies
 

More from LogicMindtech Nologies (20)

Utilizing image scales towards totally training free blind image quality asse...
Utilizing image scales towards totally training free blind image quality asse...Utilizing image scales towards totally training free blind image quality asse...
Utilizing image scales towards totally training free blind image quality asse...
 
Thermal imaging as a biometrics approach to facial signature authentication
Thermal imaging as a biometrics approach to facial signature authenticationThermal imaging as a biometrics approach to facial signature authentication
Thermal imaging as a biometrics approach to facial signature authentication
 
Template ip
Template ipTemplate ip
Template ip
 
Targeting accurate object extraction from an image a comprehensive study of ...
Targeting accurate object extraction from an image  a comprehensive study of ...Targeting accurate object extraction from an image  a comprehensive study of ...
Targeting accurate object extraction from an image a comprehensive study of ...
 
Sparse dissimilarity constrained coding for glaucoma screening
Sparse dissimilarity constrained coding for glaucoma screeningSparse dissimilarity constrained coding for glaucoma screening
Sparse dissimilarity constrained coding for glaucoma screening
 
Sar sift a sift like algorithm for sar images
Sar sift  a sift like algorithm for sar imagesSar sift  a sift like algorithm for sar images
Sar sift a sift like algorithm for sar images
 
Optic disc boundary and vessel origin
Optic disc boundary and vessel originOptic disc boundary and vessel origin
Optic disc boundary and vessel origin
 
On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...
On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...
On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...
 
Multi scale two-directional two-dimensional
Multi scale two-directional two-dimensionalMulti scale two-directional two-dimensional
Multi scale two-directional two-dimensional
 
Measuring calorie and nutrition from food image
Measuring calorie and nutrition from food imageMeasuring calorie and nutrition from food image
Measuring calorie and nutrition from food image
 
Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...
 
Joint super resolution and denoising from a single depth image
Joint super resolution and denoising from a single depth imageJoint super resolution and denoising from a single depth image
Joint super resolution and denoising from a single depth image
 
Iterative vessel segmentation of fundus images
Iterative vessel segmentation of fundus imagesIterative vessel segmentation of fundus images
Iterative vessel segmentation of fundus images
 
Influence of color to gray conversion on the performance of document image bi...
Influence of color to gray conversion on the performance of document image bi...Influence of color to gray conversion on the performance of document image bi...
Influence of color to gray conversion on the performance of document image bi...
 
Improving pixel based change detection accuracy using an object-based approac...
Improving pixel based change detection accuracy using an object-based approac...Improving pixel based change detection accuracy using an object-based approac...
Improving pixel based change detection accuracy using an object-based approac...
 
Image quality assessment for fake biometric detection application to iris f...
Image quality assessment for fake biometric detection  application to iris  f...Image quality assessment for fake biometric detection  application to iris  f...
Image quality assessment for fake biometric detection application to iris f...
 
Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...
 
Haze removal for a single remote sensing image based on deformed haze imaging...
Haze removal for a single remote sensing image based on deformed haze imaging...Haze removal for a single remote sensing image based on deformed haze imaging...
Haze removal for a single remote sensing image based on deformed haze imaging...
 
Face recognition by exploiting local gabor
Face recognition by exploiting local gaborFace recognition by exploiting local gabor
Face recognition by exploiting local gabor
 
Enhancing color images of extremely low light scenes based on rgb nir images ...
Enhancing color images of extremely low light scenes based on rgb nir images ...Enhancing color images of extremely low light scenes based on rgb nir images ...
Enhancing color images of extremely low light scenes based on rgb nir images ...
 

Recently uploaded

Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2ChandrakantDivate1
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdfKamal Acharya
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdfAlexander Litvinenko
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
Danikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdfDanikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdfthietkevietthinh
 
INTERRUPT CONTROLLER 8259 MICROPROCESSOR
INTERRUPT CONTROLLER 8259 MICROPROCESSORINTERRUPT CONTROLLER 8259 MICROPROCESSOR
INTERRUPT CONTROLLER 8259 MICROPROCESSORTanishkaHira1
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelDrAjayKumarYadav4
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptjigup7320
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptamrabdallah9
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 

Recently uploaded (20)

Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Danikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdfDanikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdf
 
INTERRUPT CONTROLLER 8259 MICROPROCESSOR
INTERRUPT CONTROLLER 8259 MICROPROCESSORINTERRUPT CONTROLLER 8259 MICROPROCESSOR
INTERRUPT CONTROLLER 8259 MICROPROCESSOR
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 

Development of a secure routing protocol using game theory model in mobile ad hoc networks

  • 1. Logic Mind Technologies Vijayangar (Near Maruthi Medicals), Bangalore-40 Ph: 8123668124 // 8123668066 Development of a Secure Routing Protocol using Game Theory Model in Mobile Ad Hoc Networks Abstract In mobile ad-hoc networks (MANETs), nodes are mobile in nature. Collaboration between mobile nodes is more significant in MANETs, which have as their greatest challenges vulnerabilities to various security attacks and an inability to operate securely while preserving its resources and performing secure routing among nodes. Therefore, it is essential to develop an effective secure routing protocol to protect the nodes from anonymous behaviors. Currently, game theory is a tool that analyzes, formulates and solves selfishness issues. It is seldom applied to detect malicious behavior in networks. It deals, instead, with the strategic and rational behavior of each node. In our study, we used the dynamic Bayesian signaling game to analyze the strategy profile for regular and malicious nodes. This game also revealed the best actions of individual strategies for each node. Perfect Bayesian equilibrium (PBE) provides a prominent solution for signaling games to solve incomplete information by combining strategies and payoff of players that constitute equilibrium. Using PBE strategies of nodes are private information of regular and malicious nodes. Regular nodes should be cooperative during routing and update their payoff, while malicious nodes take sophisticated risks by evaluating their risk of being identified to decide when to decline. This approach minimizes the utility of malicious nodes and it motivates better cooperation between nodes by using the reputation system. Regular nodes monitor continuously to evaluate their neighbors using belief updating systems of the Bayes rule
  • 2. SYSTEM SPECIFICATION Software Specification Operating system : Linux (Ubuntu) Software : Network Simulator 2.35 Programming languages : Tool Command Language, AWK, C++ Hardware Specification Main processor : Dual Core Hard disk capacity : 80GB Cache memory : 2 GB PROJECT FLOW: First Review: Literature Survey Paper Explanation Design of Project Project Enhancement explanation Second Review: Implementing 40% of Base Paper Third Review Implementing Remaining 60% of Base Paper with Future Enhancement (Modification) For More Details please contact Logic Mind Technologies Vijayangar (NearMaruthi Medicals), Bangalore-40 Ph: 8123668124 // 8123668066 Mail: logicmindtech@gmail.com