Font Size: a A A

Research On Non-cooperative Game Of Communication Quality And Security Of Mobile Ad Hoc Networks

Posted on:2019-10-31Degree:MasterType:Thesis
Country:ChinaCandidate:Z M SunFull Text:PDF
GTID:2428330548958928Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
A mobile ad hoc network(MANET)is a continuously self-configuring,infrastructure-less network of mobile nodes connected wirelessly.Each device in a MANET is free to move independently in any direction,and will change the links to other nodes frequently.MANETs pose stringent requirements on quality-of-service(QoS)and security strength in parallel because of their open channels and highly dynamic topology.For enhancing the communication performance,mobile nodes attempt to optimize the availiale bandwidth of wireless,which however makes them vulnerable to adversaries' malicious attacks due to the open and mobile context.Conversely,improving the security level of communication always consumes bandwidth and thus degrades the communication quality.Harmonizing these two conflicting goals is an urgent challenge,especially in VNs that are characterized by restrictive resources,e.g.bandwidth and link lifetime.This paper aims to balance the anticipated QoS and security strength in context tofully utilize limited network and computing resources to attain a satisfactory performance rating without compromising any security.To this end,we use non-cooperative game theory to formulate node utility,synthesizing the channel capacity and security strength from the perspective of adaptively controlling the parameters of QoS and security.This paper includes two parts of work:First,we use non-cooperative game theory to formulate node utility of mobile nodes in Vehicle Networks(VNs),which are created by applying the principles of MANETs,synthesizing the channel capacity and security strength from the perspective of adaptively controlling the transmit power and encryption block length in Nakagami multipath fading(NMF)channels.Moreover,we theoretically derive thepure strategy Nash equilibrium and analyze the non-cooperative behavior of a‘‘communication player'' in controlling the transmit power and a ‘‘security player'' in deciding the encryption block length,both of whom together strive to maximize the utility function at minimum cost.Extensive numerical calculations are conducted to comprehensively investigate the reaction of the Nash equilibrium against the various combinations of the considered parameters.The results show that the proposed joint optimization method is capable of self-adapting to the vehicular context and improving the communication quality without compromising on security.Second,for enhancing universality of our work,we analyse the non-cooperative game model of communication and security based on Merkle tree.First,we formulate the independently utility functions for ”communication player” with respect to the throughput and for ”security player” making use of the authentication of Merkle tree we proposed,which is more precise and different form the mutual node utility in VNs context.Next,we theoretically figure out the Mixed Strategy Nash Equilibriums(MSNE)under two circumstances that the two players' stragtegies satisfy uniform distribution and normal distribution respectively.And we Futhermore,we analyze the non-cooperative behavior of”communication player” and ”security player” who try to maximize their own expected utilities at the minimum costs by adopting certain strategies.The extensive numerical calculations are conducted to comprehensively investigate how the expected utilities of each player and the MSNE response to the various combinations of the concerned parameters.The results show that the game theoretical approach we present enables a mobile node to make specific actions according to the MSNE we derived so that it can obtain the satisfactory communication quality with out sacrificing the security.
Keywords/Search Tags:MANETs, non-cooperative game, Nash Equilibrium, VNs, transmit power, encryption block length, Merkle tree, throughput, authentication
PDF Full Text Request
Related items