Voir la notice de l'article provenant de la source Numdam
Ad hoc networks are subject to multiple challenges, particularly the problem of limited resources such as energy and vulnerability in terms of security. Indeed, the nodes are subject to various attacks and malicious actions. Thus, each mobile is confronted with a dilemma: cooperate to ensure security, in this case the node spend a part of its energy, or not cooperate which allows it to save energy but making the security of the network more vulnerable. In this work, we develop an approach which takes into account two conflicting objectives: contribute to network security while reducing energy consumption. The approach is based on alternating two steps: Clustering-Evolutionary game. The clustering step is performed by an algorithm that takes into account the energy constraint in election of cluster-heads. The interactions between each pair of cluster-heads, when exchanging data, in their contribution to the security of the network, are modeled as an evolutionary game which is the second step of the proposed approach.
Adel-Aissanou, Karima 1 ; Berri, Sara 1 ; Bouhaddi, Myria 1 ; Radjef, Mohammed Said 1
@article{RO_2016__50_2_285_0, author = {Adel-Aissanou, Karima and Berri, Sara and Bouhaddi, Myria and Radjef, Mohammed Said}, title = {Security modeling of an ad hoc network under the constraint of energy by an approach in two steps: {Clustering-Evolutionary} game}, journal = {RAIRO - Operations Research - Recherche Op\'erationnelle}, pages = {285--296}, publisher = {EDP-Sciences}, volume = {50}, number = {2}, year = {2016}, doi = {10.1051/ro/2015047}, mrnumber = {3479869}, zbl = {1338.90092}, language = {en}, url = {http://geodesic.mathdoc.fr/articles/10.1051/ro/2015047/} }
TY - JOUR AU - Adel-Aissanou, Karima AU - Berri, Sara AU - Bouhaddi, Myria AU - Radjef, Mohammed Said TI - Security modeling of an ad hoc network under the constraint of energy by an approach in two steps: Clustering-Evolutionary game JO - RAIRO - Operations Research - Recherche Opérationnelle PY - 2016 SP - 285 EP - 296 VL - 50 IS - 2 PB - EDP-Sciences UR - http://geodesic.mathdoc.fr/articles/10.1051/ro/2015047/ DO - 10.1051/ro/2015047 LA - en ID - RO_2016__50_2_285_0 ER -
%0 Journal Article %A Adel-Aissanou, Karima %A Berri, Sara %A Bouhaddi, Myria %A Radjef, Mohammed Said %T Security modeling of an ad hoc network under the constraint of energy by an approach in two steps: Clustering-Evolutionary game %J RAIRO - Operations Research - Recherche Opérationnelle %D 2016 %P 285-296 %V 50 %N 2 %I EDP-Sciences %U http://geodesic.mathdoc.fr/articles/10.1051/ro/2015047/ %R 10.1051/ro/2015047 %G en %F RO_2016__50_2_285_0
Adel-Aissanou, Karima; Berri, Sara; Bouhaddi, Myria; Radjef, Mohammed Said. Security modeling of an ad hoc network under the constraint of energy by an approach in two steps: Clustering-Evolutionary game. RAIRO - Operations Research - Recherche Opérationnelle, Special issue: Research on Optimization and Graph Theory dedicated to COSI 2013 / Special issue: Recent Advances in Operations Research in Computational Biology, Bioinformatics and Medicine, Tome 50 (2016) no. 2, pp. 285-296. doi: 10.1051/ro/2015047
Cité par Sources :