International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Game Theory Application for Misbehavior Detection and Prediction in VANET: Review and Challenges

Author NameAuthor Details

Mohamed Nabil, Abdelmajid Hajam, Omar Boutkhoum, Abdelkrim Haqiq

Mohamed Nabil[1]

Abdelmajid Hajam[2]

Omar Boutkhoum[3]

Abdelkrim Haqiq[4]

[1]LAROSERI laboratory, FS, Chouaib Doukkali University, El Jadida, Morocco

[2]LAVETE laboratory, FST, Hassan 1st University, Settat, Morocco

[3]LAROSERI laboratory, FS, Chouaib Doukkali University, El Jadida, Morocco

[4]IR2M laboratory, FST, Hassan 1st University, Settat, Morocco

Abstract

The particular features of vehicular ad hoc networks (VANETs) make them very vulnerable to attacks, especially when these latter become frequent and have intelligent behaviors. For these, the security of vehicular ad hoc networks is substantially important to protect them from the misbehavior of cyber-attacks. Game theory is one of the important tools that have been proposed to accurately model and analyze attack misbehavior. This paper presents a review of game theory-based intrusion detection, prediction, and reaction in VANETs for enriching the literature and helping design a new game theory-based framework. It gives state-of-the-art of game theory-based frameworks by showing their advantages and weaknesses against attacks. In addition, it determines their players and strategies, the proposed solutions and their descriptions, and the types of attacks envisaged. Then, it treats the challenges of designing an efficient framework for intrusion detection, prediction, and reaction against attacks.

Index Terms

Game Theory

Intrusion Detection

Intrusion Prediction

Intelligent Attacks

Game-based Frameworks

VANETs

Reference

  1. 1.
    S. Olariu et M. C. Weigle, Éd., Vehicular Networks: From Theory to Practice. New York: Chapman and Hall/CRC, 2009. doi: 10.1201/9781420085891.
  2. 2.
    A. I. Ameur, A. Lakas, Y. M. Bachir, et O. S. Oubbati, “ Peer-to-peer overlay techniques for vehicular ad hoc networks: Survey and challenges ”, Veh. Commun., p. 100455, 2022.
  3. 3.
    S. Al-Sultan, M. M. Al-Doori, A. H. Al-Bayatti, et H. Zedan, “ A comprehensive survey on vehicular Ad Hoc network ”, J. Netw. Comput. Appl., vol. 37, p. 380?392, janv. 2014, doi: 10.1016/j.jnca.2013.02.036.
  4. 4.
    A. Zekri et W. Jia, “ Heterogeneous vehicular communications: A comprehensive study ”, Ad Hoc Netw., vol. 75, p. 52?79, 2018.
  5. 5.
    M. L. Sichitiu et M. Kihl, “ Inter-vehicle communication systems: a survey ”, IEEE Commun. Surv. Tutor., vol. 10, no 2, p. 88?105, 2008.
  6. 6.
    R. S. Raw, M. Kumar, et N. Singh, “ Security challenges, issues and their solutions for VANET ”, Int. J. Netw. Secur. Its Appl., vol. 5, no 5, p. 95, 2013.
  7. 7.
    G. Samara, W. A. H. Al-Salihy, et R. Sures, “ Security Analysis of Vehicular Ad Hoc Nerworks (VANET) ”, in 2010 Second International Conference on Network Applications, Protocols and Services, sept. 2010, p. 55?60. doi: 10.1109/NETAPPS.2010.17.
  8. 8.
    N. K. Chaubey, “ Security analysis of vehicular ad hoc networks (VANETs): a comprehensive study ”, Int. J. Secur. Its Appl., vol. 10, no 5, p. 261?274, 2016.
  9. 9.
    K. Lim et D. Manivannan, “ An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks ”, Veh. Commun., vol. 4, p. 30?37, avr. 2016, doi: 10.1016/j.vehcom.2016.03.001.
  10. 10.
    V. H. La et A. R. Cavalli, “ Security attacks and solutions in vehicular ad hoc networks: a survey ”, Int. J. AdHoc Netw. Syst. IJANS, vol. 4, no 2, p. 1?20, 2014.
  11. 11.
    A. Y. Dak, S. Yahya, et M. Kassim, “ A literature survey on security challenges in VANETs ”, Int. J. Comput. Theory Eng., vol. 4, no 6, p. 1007, 2012.
  12. 12.
    M. Raya, A. Aziz, et J.-P. Hubaux, “ Efficient secure aggregation in VANETs ”, in Proceedings of the 3rd international workshop on Vehicular ad hoc networks, 2006, p. 67?75.
  13. 13.
    H. Hasrouny, A. E. Samhat, C. Bassil, et A. Laouiti, “ VANet security challenges and solutions: A survey ”, Veh. Commun., vol. 7, p. 7?20, 2017.
  14. 14.
    P. Sakarindr et N. Ansari, “ Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks ”, IEEE Wirel. Commun., vol. 14, no 5, p. 8?20, 2007.
  15. 15.
    T. Alpcan et S. Buchegger, “ Security Games for Vehicular Networks ”, IEEE Trans. Mob. Comput., vol. 10, no 2, p. 280?290, févr. 2011, doi: 10.1109/TMC.2010.146.
  16. 16.
    H. Sedjelmaci, M. Hadji, et N. Ansari, “ Cyber security game for intelligent transportation systems ”, IEEE Netw., vol. 33, no 4, p. 216?222, 2019.
  17. 17.
    J. Von Neumann et O. Morgenstern, Theory of games and economic behavior, 2nd rev. ed. in Theory of games and economic behavior, 2nd rev. ed. Princeton, NJ, US: Princeton University Press, 1947, p. xviii, 641.
  18. 18.
    J. W. Weibull, “ Evolution, rationality and equilibrium in games ”, Eur. Econ. Rev., vol. 42, no 3?5, p. 641?649, 1998.
  19. 19.
    J. W. Friedman, Game Theory with Applications to Economics. New York: Oxford University Press, 1986.
  20. 20.
    B. Subba, S. Biswas, et S. Karmakar, “ A game theory based multi layered intrusion detection framework for VANET ”, Future Gener. Comput. Syst., vol. 82, p. 12?28, mai 2018, doi: 10.1016/j.future.2017.12.008.
  21. 21.
    J. Sun et al., “ An intrusion detection based on Bayesian game theory for UAV network ”, in 11th EAI International Conference on Mobile Multimedia Communications, 2018, p. 56?67.
  22. 22.
    J. Zhang, F.-Y. Wang, K. Wang, W.-H. Lin, X. Xu, et C. Chen, “ Data-driven intelligent transportation systems: A survey ”, IEEE Trans. Intell. Transp. Syst., vol. 12, no 4, p. 1624?1639, 2011.
  23. 23.
    M. N. Mejri, N. Achir, et M. Hamdi, “ A new security games based reaction algorithm against DOS attacks in VANETs ”, in 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), IEEE, 2016, p. 837?840.
  24. 24.
    H. Sedjelmaci, S. M. Senouci, et T. Bouali, “ Predict and prevent from misbehaving intruders in heterogeneous vehicular networks ”, Veh. Commun., vol. 10, p. 74?83, 2017.
  25. 25.
    A. Mabrouk, A. Kobbane, et M. El Koutbi, “ Signaling Game-based Approach to Improve Security in Vehicular Networks. ”, in VEHITS, 2018, p. 495?500.
  26. 26.
    H. Sedjelmaci, I. H. Brahmi, A. Boudguiga, et W. Klaudel, “ A generic cyber defense scheme based on stackelberg game for vehicular network ”, in 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), IEEE, 2018, p. 1?6.
  27. 27.
    H. Sedjelmaci, I. H. Brahmi, N. Ansari, et M. H. Rehmani, “ Cyber security framework for vehicular network based on a hierarchical game ”, IEEE Trans. Emerg. Top. Comput., vol. 9, no 1, p. 429?440, 2019.
  28. 28.
    T. Halabi, O. A. Wahab, R. Al Mallah, et M. Zulkernine, “ Protecting the Internet of vehicles against advanced persistent threats: a bayesian Stackelberg game ”, IEEE Trans. Reliab., vol. 70, no 3, p. 970?985, 2021.
  29. 29.
    I. Stellios, P. Kotzanikolaou, et M. Psarakis, “ Advanced persistent threats and zero-day exploits in industrial Internet of Things ”, Secur. Priv. Trends Ind. Internet Things, p. 47?68, 2019.
  30. 30.
    A. Alshamrani, S. Myneni, A. Chowdhary, et D. Huang, “ A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities ”, IEEE Commun. Surv. Tutor., vol. 21, no 2, p. 1851?1877, 2019.
  31. 31.
    J. C. Harsanyi, “ Games with Incomplete Information Played by “Bayesian” Players Part II. Bayesian Equilibrium Points ”, Manag. Sci., vol. 14, no 5, p. 320?334, janv. 1968, doi: 10.1287/mnsc.14.5.320.
  32. 32.
    A. Anwar, T. Halabi, et M. Zulkernine, “ Scalable Collaborative Intrusion Detection in Autonomous Vehicular Networks: A hierarchical framework based on game theory ”, Internet Things, vol. 20, p. 100631, 2022.
  33. 33.
    A. Behfarnia et A. Eslami, “ Misbehavior detection in ephemeral networks: A local voting game in presence of uncertainty ”, IEEE Access, vol. 7, p. 184629?184642, 2019.
SCOPUS
SCImago Journal & Country Rank