Security modeling of an ad hoc network under the constraint of energy by an approach in two steps: Clustering-Evolutionary game
RAIRO - Operations Research - Recherche Opérationnelle, Special issue: Research on Optimization and Graph Theory dedicated to COSI 2013 / Special issue: Recent Advances in Operations Research in Computational Biology, Bioinformatics and Medicine, Tome 50 (2016) no. 2, pp. 285-296

Voir la notice de l'article provenant de la source Numdam

Ad hoc networks are subject to multiple challenges, particularly the problem of limited resources such as energy and vulnerability in terms of security. Indeed, the nodes are subject to various attacks and malicious actions. Thus, each mobile is confronted with a dilemma: cooperate to ensure security, in this case the node spend a part of its energy, or not cooperate which allows it to save energy but making the security of the network more vulnerable. In this work, we develop an approach which takes into account two conflicting objectives: contribute to network security while reducing energy consumption. The approach is based on alternating two steps: Clustering-Evolutionary game. The clustering step is performed by an algorithm that takes into account the energy constraint in election of cluster-heads. The interactions between each pair of cluster-heads, when exchanging data, in their contribution to the security of the network, are modeled as an evolutionary game which is the second step of the proposed approach.

Reçu le :
Accepté le :
DOI : 10.1051/ro/2015047
Classification : 90B18, 91A22, 91C20, 91A10, 91A80
Keywords: Ad hoc networks, security, clustering, evolutionary games, replicator dynamic, convergence, simulation

Adel-Aissanou, Karima 1 ; Berri, Sara 1 ; Bouhaddi, Myria 1 ; Radjef, Mohammed Said 1

1 Research Unit of LaMOS (Modeling and Optimization of Systems), Faculty of Exact Sciences, University of Bejaia, 06000 Bejaia, Algeria.
@article{RO_2016__50_2_285_0,
     author = {Adel-Aissanou, Karima and Berri, Sara and Bouhaddi, Myria and Radjef, Mohammed Said},
     title = {Security modeling of an ad hoc network under the constraint of energy by an approach in two steps: {Clustering-Evolutionary} game},
     journal = {RAIRO - Operations Research - Recherche Op\'erationnelle},
     pages = {285--296},
     publisher = {EDP-Sciences},
     volume = {50},
     number = {2},
     year = {2016},
     doi = {10.1051/ro/2015047},
     mrnumber = {3479869},
     zbl = {1338.90092},
     language = {en},
     url = {http://geodesic.mathdoc.fr/articles/10.1051/ro/2015047/}
}
TY  - JOUR
AU  - Adel-Aissanou, Karima
AU  - Berri, Sara
AU  - Bouhaddi, Myria
AU  - Radjef, Mohammed Said
TI  - Security modeling of an ad hoc network under the constraint of energy by an approach in two steps: Clustering-Evolutionary game
JO  - RAIRO - Operations Research - Recherche Opérationnelle
PY  - 2016
SP  - 285
EP  - 296
VL  - 50
IS  - 2
PB  - EDP-Sciences
UR  - http://geodesic.mathdoc.fr/articles/10.1051/ro/2015047/
DO  - 10.1051/ro/2015047
LA  - en
ID  - RO_2016__50_2_285_0
ER  - 
%0 Journal Article
%A Adel-Aissanou, Karima
%A Berri, Sara
%A Bouhaddi, Myria
%A Radjef, Mohammed Said
%T Security modeling of an ad hoc network under the constraint of energy by an approach in two steps: Clustering-Evolutionary game
%J RAIRO - Operations Research - Recherche Opérationnelle
%D 2016
%P 285-296
%V 50
%N 2
%I EDP-Sciences
%U http://geodesic.mathdoc.fr/articles/10.1051/ro/2015047/
%R 10.1051/ro/2015047
%G en
%F RO_2016__50_2_285_0
Adel-Aissanou, Karima; Berri, Sara; Bouhaddi, Myria; Radjef, Mohammed Said. Security modeling of an ad hoc network under the constraint of energy by an approach in two steps: Clustering-Evolutionary game. RAIRO - Operations Research - Recherche Opérationnelle, Special issue: Research on Optimization and Graph Theory dedicated to COSI 2013 / Special issue: Recent Advances in Operations Research in Computational Biology, Bioinformatics and Medicine, Tome 50 (2016) no. 2, pp. 285-296. doi: 10.1051/ro/2015047

Cité par Sources :