메뉴 건너뛰기




Volumn , Issue , 2008, Pages 432-440

Hit and run: A Bayesian game between regular and malicious nodes in MANETs

Author keywords

[No Author keywords available]

Indexed keywords

MALICIOUS NODES;

EID: 51749093355     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SAHCN.2008.59     Document Type: Conference Paper
Times cited : (22)

References (16)
  • 2
    • 0004260007 scopus 로고
    • The MIT Press, Cambridge, Massachusetts
    • D. Fudenberg and J. Tirole. Game Theory. The MIT Press, Cambridge, Massachusetts, 1991.
    • (1991) Game Theory
    • Fudenberg, D.1    Tirole, J.2
  • 3
    • 34548359282 scopus 로고    scopus 로고
    • Mobility reduces uncertainty in MANETs
    • F. Li and J. Wu. Mobility reduces uncertainty in MANETs. In Proc. of IEEE INFOCOM, 2007.
    • (2007) Proc. of IEEE INFOCOM
    • Li, F.1    Wu, J.2
  • 6
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating cooperation in self-organizing mobile ad hoc networks
    • L. Butty an and J. Hubaux. Stimulating cooperation in self-organizing mobile ad hoc networks. ACM Mobile Networks and Applications, 8(5), 2003.
    • (2003) ACM Mobile Networks and Applications , vol.8 , Issue.5
    • Butty an, L.1    Hubaux, J.2
  • 8
    • 16644384919 scopus 로고    scopus 로고
    • Incentive-based modeling and inference of attacker intent, objectives and strategies
    • P. Liu, W. Zang, and M. Yu. Incentive-based modeling and inference of attacker intent, objectives and strategies. ACM Transactions on Information and Systems Security, 56(3), 2005.
    • (2005) ACM Transactions on Information and Systems Security , vol.56 , Issue.3
    • Liu, P.1    Zang, W.2    Yu, M.3
  • 11
    • 70349236493 scopus 로고    scopus 로고
    • A bayesian game approach for intrusion detection in wireless ad hoc networks
    • Y. Liu, C. Comaniciu, and H. Man. A bayesian game approach for intrusion detection in wireless ad hoc networks. In Proc. of ACM GameNets, 2006.
    • (2006) Proc. of ACM GameNets
    • Liu, Y.1    Comaniciu, C.2    Man, H.3
  • 12
    • 34848845258 scopus 로고    scopus 로고
    • Selfishness, not always a nightmare: Modeling selfish mac behaviors in wireless mobile ad hoc networks
    • L. Chen and J. Leneutre. Selfishness, not always a nightmare: Modeling selfish mac behaviors in wireless mobile ad hoc networks. In Proc. of IEEE ICDCS, 2007.
    • (2007) Proc. of IEEE ICDCS
    • Chen, L.1    Leneutre, J.2
  • 13
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • A. Josang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2):618-644, 2007.
    • (2007) Decision Support Systems , vol.43 , Issue.2 , pp. 618-644
    • Josang, A.1    Ismail, R.2    Boyd, C.3
  • 14
    • 39349088907 scopus 로고    scopus 로고
    • Uncertainty mitigation for utility-oriented routing in MANETs
    • F. Li, A. Srinivasan, M. Lu, and J. Wu. Uncertainty mitigation for utility-oriented routing in MANETs. In Proc. of IEEE GLOBECOM, 2007.
    • (2007) Proc. of IEEE GLOBECOM
    • Li, F.1    Srinivasan, A.2    Lu, M.3    Wu, J.4
  • 16
    • 20344389979 scopus 로고    scopus 로고
    • INRIA, Tech. Rep. RR-5116
    • E. Altman, A. Kherani, P. Michiardi, and R. Molva. Non-cooperative forwarding in ad hoc networks. INRIA, Tech. Rep. RR-5116, 2004.
    • (2004)
    • Altman, E.1    Kherani, A.2    Michiardi, P.3    Molva, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.