메뉴 건너뛰기




Volumn , Issue , 2009, Pages 462-468

A game theory approach to detect malicious nodes in wireless sensor networks

Author keywords

Deployment; Game theory; Nash equilibrium; Processing capability; Security; Wireless sensor networks

Indexed keywords

ATTACK MODEL; DAILY LIVES; DATA PACKET; DATA PATHS; DEPLOYMENT; GAME MODELS; MALICIOUS NODES; MONITORING ENVIRONMENT; NASH EQUILIBRIUM; PROCESSING CAPABILITY; RESEARCH AREAS; SECURITY; SECURITY MECHANISM; WIRED NETWORKS; WIRELESS SENSOR; ZERO-SUM GAME;

EID: 70449506562     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SENSORCOMM.2009.76     Document Type: Conference Paper
Times cited : (71)

References (33)
  • 5
    • 51349133681 scopus 로고    scopus 로고
    • Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Support Vector Machines
    • Sensor Networks and Information (ISSNIP),Dec
    • Sophia Kaplantzis, Alistair Shilton, Nallasamy Mani, and Ahmet Sekercioglu, "Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Support Vector Machines", 3rd International Conference on Intelligent Sensors, Sensor Networks and Information (ISSNIP),Dec 2007.
    • (2007) 3rd International Conference on Intelligent Sensors
    • Kaplantzis, S.1    Shilton, A.2    Mani, N.3    Sekercioglu, A.4
  • 6
    • 84856936491 scopus 로고    scopus 로고
    • Wireless Sensor Networks Security: A New Approach
    • kuldeep, K. Sharma, and M. K. Ghose, "Wireless Sensor Networks Security: A New Approach", DCOM 2008, Dec14-17, 2008.
    • (2008) DCOM 2008
    • kuldeep1    Sharma, K.2    Ghose, M.K.3
  • 8
    • 32344436245 scopus 로고    scopus 로고
    • Anomaly intrusion detection in wireless sensor networks
    • January
    • Vijay Bhuse, Ajay Gupta, "Anomaly intrusion detection in wireless sensor networks", Journal of High Speed Networks, Volume 15, Issue 1, January 2006.
    • (2006) Journal of High Speed Networks , vol.15 , Issue.1
    • Bhuse, V.1    Gupta, A.2
  • 11
  • 12
    • 24144441735 scopus 로고    scopus 로고
    • Preventing DoS attack in Sensor Networks: A Game Theoretic Approach
    • May
    • A. Agah, K. Basu and S. K. Das, "Preventing DoS attack in Sensor Networks: A Game Theoretic Approach", IEEE International Conference on Communications (ICC 2005), Volume 5, Issue , 16-20 May 2005
    • (2005) IEEE International Conference on Communications (ICC , vol.5 , Issue.and 16-20
    • Agah, A.1    Basu, K.2    Das, S.K.3
  • 16
    • 70449488998 scopus 로고    scopus 로고
    • A Novel Game Theoretic Framework for Security in Wireless Sensor Networks
    • Ph. D Thesis, UT Austin, December
    • A. Agah, "A Novel Game Theoretic Framework for Security in Wireless Sensor Networks", Ph. D Thesis, UT Austin, December 2005.
    • (2005)
    • Agah, A.1
  • 17
    • 64549123173 scopus 로고    scopus 로고
    • An intrusion detection game with limited observations
    • Sophia Antipolis, France, July
    • T. Alpcan and T. Basar, "An intrusion detection game with limited observations," in 12th Int. Symp. on Dynamic Games and Applications, Sophia Antipolis, France, July 2006.
    • (2006) 12th Int. Symp. on Dynamic Games and Applications
    • Alpcan, T.1    Basar, T.2
  • 21
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil Attack
    • First International Workshop on Peer-to-peer Systems
    • J. R. Douceur, "The Sybil Attack", First International Workshop on Peer-to-peer Systems, LNCS 2429, 2002.
    • (2002) LNCS , vol.2429
    • Douceur, J.R.1
  • 23
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks", Computer, 35(10), 2002.
    • (2002) Computer , vol.35 , Issue.10
    • Wood, A.D.1    Stankovic, J.A.2
  • 26
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • H. Chan and A. Perrig, "Security and privacy in sensor networks", Computer, 36(10), 2003.
    • (2003) Computer , vol.36 , Issue.10
    • Chan, H.1    Perrig, A.2
  • 27
    • 34548031104 scopus 로고    scopus 로고
    • An Efficient Intruder Detection Algorithm Against Sinkhole Attacks in Wireless Sensor Networks
    • September
    • E. C.-H. Ngai, J. Liu, and M.R. Lyu, "An Efficient Intruder Detection Algorithm Against Sinkhole Attacks in Wireless Sensor Networks", Computer Communications, vol. 30, September 2007.
    • (2007) Computer Communications , vol.30
    • Ngai, E.C.-H.1    Liu, J.2    Lyu, M.R.3
  • 30
    • 0034547115 scopus 로고    scopus 로고
    • GPSR: Greedy perimeter stateless routing for wireless networks
    • B. Karp and H.T. Kung, "GPSR: greedy perimeter stateless routing for wireless networks", Proc. Of ACM MobiCom, 2000.
    • (2000) Proc. Of ACM MobiCom
    • Karp, B.1    Kung, H.T.2
  • 33
    • 70449501175 scopus 로고    scopus 로고
    • nd ed, Chapman & Hall/CRC, 2002, ISN:1-58488-206-9.
    • nd ed, Chapman & Hall/CRC, 2002, ISN:1-58488-206-9.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.