Abstract
The unique distributed architecture of device-to-device (D2D) networks makes its devices and users more vulnerable to security and privacy threats, especially from malware. To protect the D2D network from the malware, we designed and implemented a novel routing protocol, Cluster-head Centered Fast Secure Routing. The protocol requires all of the member nodes to pass data packets through the Secure Routes selected by the cluster-head that optimizes routing decisions to reduces the possibility of the nodes receiving packets with malware. After our analysis, the strategy is the optimal coping strategy of the defender whenever the attacker using the Nash game strategy, the Stackelberg game strategy, considering the case of both zero-sum and the non-zero sum. Moreover, to ensure the security of the cluster-head, we have set up the Mobile Edge Computing servers at the edge of the D2D networks. Simulation results demonstrate that the proposed routing protocol can balance network security and Quality of Service, thus confirming that our proposed routing algorithm has practical significance.
























Similar content being viewed by others
References
Amopoulos, D., Kambourakis, G., Gritzalis, S., et al. (2012). Exposing mobile malware from the inside (or what is your mobile app really doing?). Peer-to-Peer Networking and Applications. https://doi.org/10.1007/s12083-012-0179-x.
Chen, Z., & Kountouris, M. (2016). D2D caching versus small cell caching: Where to cache content in a wireless network? In 2016 IEEE 17th international workshop on signal processing advances in wireless communications (SPAWC), Edinburgh, pp. 1–6.
Chengetanai, G. (2018). Minimising black hole attacks to enhance security in wireless mobile ad hoc networks. In 2018 IST-Africa week conference (IST-Africa), (pp. 1–7) Gaborone.
Damopoulos, D., Kambourakis, G., & Portokalidis, G. (2014). The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based ids for smartphones. In Proceedings of the 7th European workshop on system security, (pp. 1–6) Amsterdam. https://doi.org/10.1145/2592791.2592797.
Damopoulos, D., Menesidou, S. A., Kambourakis, G., Papadaki, M., Clarke, N., & Gritzalis, S. (2011). Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers. Security and Communication Networks. https://doi.org/10.1002/sec.341.
Elmahdi, E., Yoo, S., & Sharshembiev, K. (2018). Securing data forwarding against blackhole attacks in mobile ad hoc networks. In 2018 IEEE 8th annual computing and communication workshop and conference (CCWC), (pp. 463–467) Las Vegas. https://doi.org/10.1109/CCWC.2018.8301683.
Felegyhazi, M., Hubaux, J., & Buttyan, L. (2006). Nash equilibria of packet forwarding strategies in wireless ad hoc networks. IEEE Transactions on Mobile Computing,5(5), 463–476. https://doi.org/10.1109/tmc.2006.68.
Felt, A.P., Finifter, M., Chin, E., Hanna, S., & Wagner, D. (2011). A survey of mobile malware in the wild. In Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices, (pp. 3–14), Chicago, Illinois. https://doi.org/10.1145/2046614.2046618.
Gadekar, S., & Kadam, S. (2017). Secure optimized link state routing (OLSR) protocol against node isolation attack. In 2017 IEEE international conference on power, control, signals and instrumentation engineering (ICPCSI), (pp. 684–687) Chennai. https://doi.org/10.1109/icpcsi.2017.8391800.
Gaikwad, K. S., & Waykar, S. B. (2017). Detection and removal of node isolation attack in OLSR protocol using imaginary nodes with neighbour response in MANET. In: 2017 international conference on computing, communication, control and automation (ICCUBEA), (pp. 1–5) Pune. https://doi.org/10.1109/iccubea.2017.8463762.
Haus, M., Waqas, M., Ding, A. Y., Li, Y., Tarkoma, S., & Ott, J. (2017). Security and privacy in device-to-device (D2D) communication: A Review. IEEE Communications Surveys & Tutorials,19(2), 1054–1079.
Li, L., et al. (2020). Deep reinforcement learning approaches for content caching in cache-enabled D2D networks. IEEE Internet of Things Journal,7(1), 544–557.
Panaousis, E., Alpcan, T., Fereidooni, H., & Conti, M. (2014). Secure message delivery games for device-to-device communications. In R. Poovendran & W. Saad (Eds.), Decision and game theory for security, GameSec 2014. Lecture Notes in Computer Science (vol. 8840, pp. 195–215), Cham: Springer. https://doi.org/10.1007/978-3-319-12601-2_11.
Panaousis, E., Karapistoli, E., Elsemary, H., Alpcan, T., Khuzani, M., & Economides, A. A. (2017). Game theoretic path selection to support security in device-to-device communications. Ad Hoc Networks,56, 28–42.
Papaleo, G., Cambiaso, E., Patti L., & Aiello, M. (2016). Malware development on mobile environments. In 2016 IEEE 4th international conference on future Internet of Things and cloud workshops (FiCloudW), (pp. 270–275), Vienna. https://doi.org/10.1109/w-ficloud.2016.62.
Paramasivan, B., Prakash, M. J. V., & Kaliappan, M. (2015). Development of a secure routing protocol using game theory model in mobile ad hoc networks. Journal of Communications and Networks,17(1), 75–83. https://doi.org/10.1109/JCN.2015.000012.
Qian, Z., & Wang, X. (2016). Overview of D2D technologies for 5G communication networks. Journal on Communications,37(7), 1–14.
Saracino, A., Sgandurra, D., Dini, G., & Martinelli, F. (2018). MADAM: Effective and efficient behavior-based android malware detection and prevention. IEEE Transactions on Dependable and Secure Computing,15(1), 83–97. https://doi.org/10.1109/TDSC.2016.2536605.
Sharma, S., Jain, A., & Gupta, N. (2016). Modified ZRP to identify cooperative attacks. In 2016 Second international conference on computational intelligence and communication technology (CICT), (pp. 302–307) Ghaziabad. https://doi.org/10.1109/cict.2016.66.
Shiroma, T., Nakajima, T., Wu, C., & Yoshinaga, T. (2017). A light-weight cooperative caching strategy by D2D content sharing. In 2017 Fifth international symposium on computing and networking (CANDAR), Aomori, pp. 159–165.
Suarez-Tangil, G., Tapiador, J. E., Peris-Lopez, P., & Ribagorda, A. (2013). Evolution, detection and analysis of malware for smart devices. IEEE Communications Surveys & Tutorials.,16(2), 961–987. https://doi.org/10.1109/SURV.2013.101613.00077.
Sun, M., Zheng Lui, M., John C. S., & Jiang, X. (2014). Design and implementation of an android host-based intrusion prevention system. In Proceedings of the 30th annual computer security applications conference, (pp. 226–235) New Orleans, Louisiana. https://doi.org/10.1145/2664243.2664245.
von Neumann, J., Morgenstern, O., Kuhn, H., et al. (2019) Theory of Game-s and economic behavior. In 60th Anniversary Commemorative Edition. Princeton: Princeton University Press. Retrieved 16 December 2019, from https://www.de-gruyter.com/view/product/451360.
Yu, W., Ji, Z., & Liu, K. J. R. (2007). Securing cooperative ad-hoc networks under noise and imperfect monitoring: strategies and game theoretic analysis. IEEE Transactions on Information Forensics and Security,2(2), 240–253. https://doi.org/10.1109/TIFS.2007.897270.
Yu, W., & Liu, K. J. R. (2007). Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks. IEEE Transactions on Mobile Computing,6(5), 507–521. https://doi.org/10.1109/tmc.2007.1026.
Yu, W., & Liu, K. J. R. (2008). Secure cooperation in autonomous mobile ad-hoc networks under noise and imperfect monitoring: A game-theoretic approach. IEEE Transactions on Information Forensics and Security,3(2), 317–330. https://doi.org/10.1109/TIFS.2008.922453.
Acknowledgements
This work was supported in part by the Chongqing Basic Science and Frontier Technology Research Project (cstc2017jcyjBX0047).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Lv, Y., Feng, W., Xiao, A. et al. Cluster-head Centered Fast Secure Routing based on Game theory for Device-to-Device Communication. Wireless Pers Commun 113, 2079–2106 (2020). https://doi.org/10.1007/s11277-020-07308-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07308-z