메뉴 건너뛰기




Volumn 15, Issue 5, 2009, Pages 651-666

A game-theoretic analysis of denial of service attacks in wireless random access

Author keywords

Adaptive update algorithms; Competition; Cooperation; Denial of service attacks; Distributed control; Game theory; Malicious operation; Medium access control; Pricing; Random access; Wireless networks

Indexed keywords

AD HOC NETWORKS; ADAPTIVE ALGORITHMS; ADAPTIVE CONTROL SYSTEMS; COMPETITION; COMPUTER CRIME; COSTS; DISTRIBUTED PARAMETER CONTROL SYSTEMS; GAME THEORY; OPTIMIZATION; SECURITY OF DATA; SECURITY SYSTEMS; TELECOMMUNICATION NETWORKS; TELECOMMUNICATION TRAFFIC; TRANSMISSION CONTROL PROTOCOL; TRANSMISSIONS; TRANSMITTERS;

EID: 63749110244     PISSN: 10220038     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11276-007-0088-8     Document Type: Article
Times cited : (56)

References (24)
  • 1
    • 0024078857 scopus 로고
    • On the stability of interacting queues in a multiple-access system
    • R. Rao A. Ephremides 1988 On the stability of interacting queues in a multiple-access system IEEE Transactions on Information Theory 34 5 918 930
    • (1988) IEEE Transactions on Information Theory , vol.34 , Issue.5 , pp. 918-930
    • Rao, R.1    Ephremides, A.2
  • 3
    • 0026155038 scopus 로고
    • Stability region of the finite-user slotted ALOHA protocol
    • V. Anantharam 1991 Stability region of the finite-user slotted ALOHA protocol IEEE Transactions on Information Theory 37 3 535 540
    • (1991) IEEE Transactions on Information Theory , vol.37 , Issue.3 , pp. 535-540
    • Anantharam, V.1
  • 4
    • 0032673157 scopus 로고    scopus 로고
    • Stability of N interacting queues in random-access system
    • W. Luo A. Ephremides 1999 Stability of N interacting queues in random-access system IEEE Transactions on Information Theory 45 5 1579 1587
    • (1999) IEEE Transactions on Information Theory , vol.45 , Issue.5 , pp. 1579-1587
    • Luo, W.1    Ephremides, A.2
  • 5
    • 23744482074 scopus 로고    scopus 로고
    • Stability and delay of finite-user slotted ALOHA with multipacket reception
    • V. Naware G. Mergen L. Tong 2005 Stability and delay of finite-user slotted ALOHA with multipacket reception IEEE Transactions on Information Theory 51 7 2636 2656
    • (2005) IEEE Transactions on Information Theory , vol.51 , Issue.7 , pp. 2636-2656
    • Naware, V.1    Mergen, G.2    Tong, L.3
  • 6
    • 33745168247 scopus 로고    scopus 로고
    • On the throughput, capacity, and stability regions of random multiple access
    • J. Luo A. Ephremides 2006 On the throughput, capacity, and stability regions of random multiple access IEEE Transactions on Information Theory 52 6 2593 2607
    • (2006) IEEE Transactions on Information Theory , vol.52 , Issue.6 , pp. 2593-2607
    • Luo, J.1    Ephremides, A.2
  • 7
    • 0035508757 scopus 로고    scopus 로고
    • Game theory and the design of self-configuring, adaptive wireless networks
    • A. B. MacKenzie S. B. Wicker 2001 Game theory and the design of self-configuring, adaptive wireless networks IEEE Communications Magazine 39 126 131
    • (2001) IEEE Communications Magazine , vol.39 , pp. 126-131
    • McDonald, A.B.1    Wicker, S.B.2
  • 9
    • 3142603471 scopus 로고    scopus 로고
    • Slotted Aloha as a stochastic game with partial information
    • E. Altman R. El-Azouzi T. Jimenez 2004 Slotted Aloha as a stochastic game with partial information Computer Networks 45 701 713
    • (2004) Computer Networks , vol.45 , pp. 701-713
    • Altman, E.1    El-Azouzi, R.2    Jimenez, T.3
  • 10
    • 33744490078 scopus 로고    scopus 로고
    • Transmission costs, selfish nodes, and protocol design
    • Ad Hoc and Wireless Networks, Riva del Granda
    • Marbach, P., & Pang, R. (2005). Transmission costs, selfish nodes, and protocol design. In Proc. WiOpt'05: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks. Riva del Granda.
    • (2005) Proc. WiOpt'05: Modeling and Optimization in Mobile
    • Marbach, P.1    Pang, R.2
  • 12
    • 0042474409 scopus 로고    scopus 로고
    • Stability of multipacket slotted Aloha with selfish users and perfect information
    • San Francisco
    • MacKenzie, A. B., & Wicker, S. B. (2003). Stability of multipacket slotted Aloha with selfish users and perfect information. In Proc. INFOCOM 2003 (pp. 1583-1590). San Francisco.
    • (2003) Proc. INFOCOM 2003 , pp. 1583-1590
    • MacKenzie, A.B.1    Wicker, S.B.2
  • 14
    • 0036649779 scopus 로고    scopus 로고
    • Equilibria of a non-cooperative game for heterogeneous users of an Aloha network
    • Y. Jin G. Kesidis 2002 Equilibria of a non-cooperative game for heterogeneous users of an Aloha network IEEE Communications Letters 6 7 282 284
    • (2002) IEEE Communications Letters , vol.6 , Issue.7 , pp. 282-284
    • Jin, Y.1    Kesidis, G.2
  • 15
    • 33646422015 scopus 로고    scopus 로고
    • Utility-optimal medium access control: Reverse and forward engineering
    • Barcelona
    • Lee, J.-W., Chiang, M., & Calderbank, A. R. (2006). Utility-optimal medium access control: Reverse and forward engineering. In Proc. IEEE INFOCOM 2006. Barcelona.
    • (2006) Proc. IEEE INFOCOM 2006
    • Lee, J.-W.1    Chiang, M.2    Calderbank, A.R.3
  • 18
    • 0026240492 scopus 로고
    • Jamming in slotted ALOHA multihop packet radio networks
    • J. Zander 1991 Jamming in slotted ALOHA multihop packet radio networks IEEE Transactions on Communications 39 10 1525 1531
    • (1991) IEEE Transactions on Communications , vol.39 , Issue.10 , pp. 1525-1531
    • Zander, J.1
  • 19
    • 60649107168 scopus 로고    scopus 로고
    • A bayesian game approach for intrusion detection in wireless ad hoc networks
    • Workshop on Game Theory for Networks. Pisa
    • Liu, Y., Comaniciu, C., & Man, H. (2006). A bayesian game approach for intrusion detection in wireless ad hoc networks. In Proc. GameNets (Workshop on Game Theory for Networks). Pisa.
    • (2006) Proc. GameNets
    • Liu, Y.1    Comaniciu, C.2    Man, H.3
  • 21
    • 33845762444 scopus 로고    scopus 로고
    • Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers
    • S. Radosavac A. A. Cardenas J. S. Baras G. V. Moustakides 2007 Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers Journal of Computer Security 15 1 103 128
    • (2007) Journal of Computer Security , vol.15 , Issue.1 , pp. 103-128
    • Radosavac, S.1    Cardenas, A.A.2    Baras, J.S.3    Moustakides, G.V.4
  • 22
    • 16244381482 scopus 로고    scopus 로고
    • Dynamic fictitious play, dynamic gradient play, and distributed convergence to Nash equilibria
    • J. S. Shamma G. Arslan 2005 Dynamic fictitious play, dynamic gradient play, and distributed convergence to Nash equilibria IEEE Transactions on Automatic Control 50 3 312 327
    • (2005) IEEE Transactions on Automatic Control , vol.50 , Issue.3 , pp. 312-327
    • Shamma, J.S.1    Arslan, G.2
  • 24


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.