메뉴 건너뛰기




Volumn , Issue , 2007, Pages 460-464

A game theoretical approach for efficient deployment of intrusion detection system in mobile ad hoc networks

Author keywords

Game theory; Intrusion detection system (IDS); Mobile ad hoc network (MANET); Security; Wireless network

Indexed keywords

COMPUTATION THEORY; COMPUTER CRIME; GAME THEORY; INTRUSION DETECTION; NETWORK SECURITY; WIRELESS NETWORKS;

EID: 52249090735     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/adcom.2007.58     Document Type: Conference Paper
Times cited : (21)

References (13)
  • 1
    • 2442604387 scopus 로고    scopus 로고
    • A. Afgah, S. K. Das, and K. Basu. A game theory based approach for security in wireless sensor networks. In Proc. International Performance Computing and Communications Conference (IPCCC), April 2004.
    • A. Afgah, S. K. Das, and K. Basu. A game theory based approach for security in wireless sensor networks. In Proc. International Performance Computing and Communications Conference (IPCCC), April 2004.
  • 2
    • 52249103237 scopus 로고    scopus 로고
    • A. Afgah, S. K. Das, and K. Basu. A non-cooperative game approach for intrusion detection in sensor networks. In Proc. VTC 2004, Fall 2004.
    • A. Afgah, S. K. Das, and K. Basu. A non-cooperative game approach for intrusion detection in sensor networks. In Proc. VTC 2004, Fall 2004.
  • 3
    • 52249089571 scopus 로고    scopus 로고
    • T. Alpcan and T. Basar. A game theoretic approach to decision and analysis in network intrusion detection. In Proc. 43rd IEEE Conference on Decision and Control, December 2004.
    • T. Alpcan and T. Basar. A game theoretic approach to decision and analysis in network intrusion detection. In Proc. 43rd IEEE Conference on Decision and Control, December 2004.
  • 4
    • 0004260007 scopus 로고
    • The MIT Press, Cambridge, Massachusetts
    • D. Fudenberg and J. Tirole. Game Theory. The MIT Press, Cambridge, Massachusetts, 1991.
    • (1991) Game Theory
    • Fudenberg, D.1    Tirole, J.2
  • 5
    • 85141907621 scopus 로고    scopus 로고
    • Y. Liu, H. Man, and C. Comaniciu. A game theoretic approach to efficient mixed strategies for intrusion detection. In proc. IEEE International Conference on Communications (ICC 2006), 2006.
    • Y. Liu, H. Man, and C. Comaniciu. A game theoretic approach to efficient mixed strategies for intrusion detection. In proc. IEEE International Conference on Communications (ICC 2006), 2006.
  • 6
    • 0242552717 scopus 로고    scopus 로고
    • Architecture of the mobile ad-hoc network security (mans) system
    • Man and Cybernetics, October
    • C. Manikopoulos and L. Ling. Architecture of the mobile ad-hoc network security (mans) system. In Proc. of the IEEE International Conference on Systems, Man and Cybernetics, 4:3122-3127, October 2004.
    • (2004) Proc. of the IEEE International Conference on Systems , vol.4 , pp. 3122-3127
    • Manikopoulos, C.1    Ling, L.2
  • 7
    • 85177498914 scopus 로고    scopus 로고
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in a mobile ad-hoc environment. In Proc. of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pages 255-265, August 2000.
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in a mobile ad-hoc environment. In Proc. of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pages 255-265, August 2000.
  • 8
    • 52249123429 scopus 로고    scopus 로고
    • P. Michiardi and R. Molva. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proc. IFIP - Communication and Multimedia Security Conference 2002, September 2002.
    • P. Michiardi and R. Molva. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proc. IFIP - Communication and Multimedia Security Conference 2002, September 2002.
  • 9
    • 52249090187 scopus 로고    scopus 로고
    • P. Michiardi and R. Molva. A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks. In Proc. WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, March 2003.
    • P. Michiardi and R. Molva. A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks. In Proc. WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, March 2003.
  • 10
    • 1442353534 scopus 로고    scopus 로고
    • K. Nadkarni and A. Mishra. Intrusion detection in manets - the second wall of defense. In Proc. of the IEEE Industrial Electronics Society Conference, pages 1235-1239, November 2003.
    • K. Nadkarni and A. Mishra. Intrusion detection in manets - the second wall of defense. In Proc. of the IEEE Industrial Electronics Society Conference, pages 1235-1239, November 2003.
  • 11
    • 33646552392 scopus 로고    scopus 로고
    • A. Partwardan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis. Secure routing and intrusion detection in ad-hoc networks. In Proc. 3rd IEEE International Conference on Pervasive Computing and Communications, March 2005.
    • A. Partwardan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis. Secure routing and intrusion detection in ad-hoc networks. In Proc. 3rd IEEE International Conference on Pervasive Computing and Communications, March 2005.
  • 12
    • 84874825833 scopus 로고    scopus 로고
    • A game theoretic formulation for intrusion detection in mobile ad hoc networks
    • March
    • A. Patcha and J.-M. Park. A game theoretic formulation for intrusion detection in mobile ad hoc networks. International Journal of Network Security, 2(2): 146-152, March 2006.
    • (2006) International Journal of Network Security , vol.2 , Issue.2 , pp. 146-152
    • Patcha, A.1    Park, J.-M.2
  • 13
    • 85177503934 scopus 로고    scopus 로고
    • Y. Zhang and W. Lee. Intrusion detection in wireless ad-hoc networks. In Proc. Mobicom 2000, August 2000.
    • Y. Zhang and W. Lee. Intrusion detection in wireless ad-hoc networks. In Proc. Mobicom 2000, August 2000.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.