메뉴 건너뛰기




Volumn 6, Issue 5, 2007, Pages 507-521

Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks

Author keywords

Autonomous mobile ad hoc networks; Cooperation stimulation; Game theory; Security

Indexed keywords

AD HOC NETWORKS; COMPUTER CRIME; COMPUTER SIMULATION; MOBILE TELECOMMUNICATION SYSTEMS; SECURITY OF DATA;

EID: 33947628137     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2007.1026     Document Type: Article
Times cited : (75)

References (33)
  • 2
    • 25844488399 scopus 로고    scopus 로고
    • Enforcing Service Availability in Mobile Ad-Hoc Networks
    • L. Buttyan and J.P. Hubaux, "Enforcing Service Availability in Mobile Ad-Hoc Networks," Proc. ACM MobiHoc, 2000.
    • (2000) Proc. ACM MobiHoc
    • Buttyan, L.1    Hubaux, J.P.2
  • 3
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks
    • Oct
    • L. Buttyan and J.P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, Oct. 2003.
    • (2003) Mobile Networks and Applications , vol.8 , Issue.5 , pp. 579-592
    • Buttyan, L.1    Hubaux, J.P.2
  • 4
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks
    • S. Zhong, J. Chen, and Y.R. Yang, "Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks," Proc. IEEE INFOCOM, 2003.
    • (2003) Proc. IEEE INFOCOM
    • Zhong, S.1    Chen, J.2    Yang, Y.R.3
  • 5
    • 1542299118 scopus 로고    scopus 로고
    • Ad Hoc-VCG: A Truthful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents
    • L. Anderegg and S. Eidenbenz, "Ad Hoc-VCG: A Truthful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents," Proc. ACM MobiCom, 2003.
    • (2003) Proc. ACM MobiCom
    • Anderegg, L.1    Eidenbenz, S.2
  • 6
    • 32144433522 scopus 로고    scopus 로고
    • On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks - An Integrated Approach Using Game Theoretical and Cryptographic Techniques
    • S. Zhong, L. Li, Y.G. Liu, and Y.R. Yang, "On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks - An Integrated Approach Using Game Theoretical and Cryptographic Techniques," Proc. ACM MobiCom, pp. 117-131, 2005.
    • (2005) Proc. ACM MobiCom , pp. 117-131
    • Zhong, S.1    Li, L.2    Liu, Y.G.3    Yang, Y.R.4
  • 8
    • 85113133621 scopus 로고    scopus 로고
    • Core: A Collaborative REputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks
    • P. Michiardi and R. Molva, "Core: A Collaborative REputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks," Proc. IFIP - Comm. and Multimedia Security Conf., 2002.
    • (2002) Proc. IFIP - Comm. and Multimedia Security Conf
    • Michiardi, P.1    Molva, R.2
  • 10
    • 29144503110 scopus 로고    scopus 로고
    • Attack-Resistant Cooperation Stimulation in Autonomous Ad Hoc Networks
    • Dec
    • W. Yu and K.J.R. Liu, "Attack-Resistant Cooperation Stimulation in Autonomous Ad Hoc Networks," IEEE J. Selected Areas in Comm., vol. 23, no. 12, pp. 2260-2271, Dec. 2005.
    • (2005) IEEE J. Selected Areas in Comm , vol.23 , Issue.12 , pp. 2260-2271
    • Yu, W.1    Liu, K.J.R.2
  • 16
    • 33645673382 scopus 로고    scopus 로고
    • Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks
    • Sept.-Oct
    • M. Felegyhazi, J.-P. Hubaux, and L. Buttyan, "Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 5, no. 5, pp. 463-476, Sept.-Oct. 2006.
    • (2006) IEEE Trans. Mobile Computing , vol.5 , Issue.5 , pp. 463-476
    • Felegyhazi, M.1    Hubaux, J.-P.2    Buttyan, L.3
  • 18
    • 25844465866 scopus 로고    scopus 로고
    • HADOF: Defense against Routing Disruptions in Mobile Ad Hoc Networks
    • W. Yu, Y. Sun, and K.J.R. Liu, "HADOF: Defense against Routing Disruptions in Mobile Ad Hoc Networks," Proc. IEEE INFOCOM, 2005.
    • (2005) Proc. IEEE INFOCOM
    • Yu, W.1    Sun, Y.2    Liu, K.J.R.3
  • 19
    • 0004149207 scopus 로고
    • second ed. Oxford Univ. Press
    • R. Dawkins, The Selfish Gene, second ed. Oxford Univ. Press, 1990.
    • (1990) The Selfish Gene
    • Dawkins, R.1
  • 21
    • 0033357103 scopus 로고    scopus 로고
    • Securing Ad Hoc Networks
    • Nov./Dec
    • L. Zhou and Z. Haas, "Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, no. 6, Nov./Dec. 1999.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6
    • Zhou, L.1    Haas, Z.2
  • 23
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
    • Y.-C. Hu, A. Perrig, and D.B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Proc. ACM MobiCom, 2002.
    • (2002) Proc. ACM MobiCom
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 28
    • 0041973497 scopus 로고    scopus 로고
    • Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
    • Y.-C. Hu, A. Perrig, and D.B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," Proc. IEEE INFOCOM, 2003.
    • (2003) Proc. IEEE INFOCOM
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 29
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
    • Y.-C. Hu, A. Perrig, and D.B. Johnson, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Ad Hoc Networks J., vol. 1, pp. 175-192, 2003.
    • (2003) Ad Hoc Networks J , vol.1 , pp. 175-192
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 32
    • 33947692584 scopus 로고    scopus 로고
    • IEEE Standard 802.11-1007, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Computer Soc. LAN MAN Standards Committee, 1999.
    • IEEE Standard 802.11-1007, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Computer Soc. LAN MAN Standards Committee, 1999.
  • 33
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing
    • D.B. Johnson and D.A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing," Mobile Computing, pp. 153-181, 1996.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.