메뉴 건너뛰기




Volumn 5, Issue 2, 2007, Pages 145-153

Preventing DoS attacks in wireless sensor networks: A repeated game theory approach

Author keywords

Game theory; intrusion detection; Security; Sensor networks

Indexed keywords

DENIAL OF SERVICE ATTACKS; DESIGN OBJECTIVES; DOS ATTACKS; FORWARD PACKETS; INTRUSION DETECTORS; MISBEHAVING NODES; PACKET THROUGHPUT; REPEATED GAMES; SECURITY;

EID: 38149061688     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (129)

References (29)
  • 2
    • 24144441735 scopus 로고    scopus 로고
    • Preventing DoS attack in sensor and actor networks: A game theoretic approach
    • Seoul, Korea, May
    • A. Agah, S. K. Das and K. Basu, "Preventing DoS attack in sensor and actor networks: A game theoretic approach," IEEE International Conference on Communications (ICC), pp:3218-3222, Seoul, Korea, May 2005.
    • (2005) IEEE International Conference on Communications (ICC) , pp. 3218-3222
    • Agah, A.1    Das, S.K.2    Basu, K.3
  • 10
  • 11
    • 0004118144 scopus 로고    scopus 로고
    • Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks
    • Swiss Federal Institute of Technology
    • L. Buttyaan, J. P. Hubaux, "Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks, "Technical Report DSC/2001/001, Department of Communication Systems, Swiss Federal Institute of Technology, 2001.
    • (2001) Technical Report DSC/2001/001, Department of Communication Systems
    • Buttyaan, L.1    Hubaux, J.P.2
  • 12
    • 0142103313 scopus 로고    scopus 로고
    • Security and Privacy in Sensor Networks
    • H. Chan and A. Perrig, "Security and Privacy in Sensor Networks," IEEE Computer, vol.36, no.10, 2003, pp:103-105.
    • (2003) IEEE Computer , vol.36 , Issue.10 , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 15
  • 16
    • 17144396436 scopus 로고    scopus 로고
    • Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks- the Static Case
    • Venice, Italy, September
    • M. Felegyhazi, L. Buttyan and J. P. Hubaux, "Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks- the Static Case," Proceedings of Personal Wireless Communications (PWC '03), Venice, Italy, September 2003.
    • (2003) Proceedings of Personal Wireless Communications (PWC '03)
    • Felegyhazi, M.1    Buttyan, L.2    Hubaux, J.P.3
  • 17
    • 33750335591 scopus 로고    scopus 로고
    • Security considerations in ad hoc sensor networks
    • F. Hu and N. K. Sharma, "Security considerations in ad hoc sensor networks," Ad Hoc Networks, 2003.
    • (2003) Ad Hoc Networks
    • Hu, F.1    Sharma, N.K.2
  • 20
    • 10644289075 scopus 로고    scopus 로고
    • Core: A Collaborative Reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • P. Michiardi, R. Molva, "Core: A Collaborative Reputation mechanism to enforce node cooperation in mobile ad hoc networks," in Communications and Multimedia Security Conference, 2002.
    • (2002) in Communications and Multimedia Security Conference
    • Michiardi, P.1    Molva, R.2
  • 21
    • 10644269064 scopus 로고    scopus 로고
    • Prevention of denial of service attack and selfishness in mobile ad hoc networks
    • Institute Euŕecom, France
    • P. Michiardi, R. Molva, "Prevention of denial of service attack and selfishness in mobile ad hoc networks," Research Report RR-02-063, Institute Euŕecom, France, 2002.
    • (2002) Research Report RR-02-063
    • Michiardi, P.1    Molva, R.2
  • 22
    • 1542358393 scopus 로고    scopus 로고
    • Game theoretic analysis of security in mobile ad hoc networks
    • Research Report, France
    • P. Michiardi and R.Molva, "Game theoretic analysis of security in mobile ad hoc networks," Institute Eurecom, Research Report, France, 2002.
    • (2002) Institute Eurecom
    • Michiardi, P.1    Molva, R.2
  • 23
    • 3042542420 scopus 로고    scopus 로고
    • Simulation-based analysis of security exposures in mobile ad hoc networks
    • Protocols, Services and Applications, Florance, Italy, February
    • P. Michiardi and R.Molva, "Simulation-based analysis of security exposures in mobile ad hoc networks," in European Wireless 2002: Next Generation Wireless Networks: Technologies, Protocols, Services and Applications, Florance, Italy, February 2002.
    • (2002) in European Wireless 2002: Next Generation Wireless Networks: Technologies
    • Michiardi, P.1    Molva, R.2
  • 28
    • 84874809418 scopus 로고    scopus 로고
    • Repeated Games
    • download date Feb
    • J. Ratliff, "Repeated Games," http://www.virtualperfection.com/gametheory, download date Feb. 2005.
    • (2005)
    • Ratliff, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.