Institute of Research and Journals (IRAJ)
The security approach mainly involves understanding the certain misbehavior of nodes e.g. feasibility of nodes to cooperate in a network, feasibility of an attack by malicious nodes in the cluster, etc. The framework also involves detection of malicious nodes by the destination node as well as isolation of the malicious node along with the capability of a regular node to update the neighborhood clusters about the attack information. An approach of the game theoretic is used for this purpose, where the simulation results show a satisfactory result by estimating the probability of cooperation as well as attack.