메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Game-theoretical model for intrusion detection in wireless sensor networks

Author keywords

Attack resistant mechanism; Intrusion detection system (IDS); Nash equilibrium; Repeated game; Subgame perfect equilibrium; WSN

Indexed keywords

ATTACK-RESISTANT MECHANISM; INTRUSION DETECTION SYSTEM (IDS); NASH EQUILIBRIUM; REPEATED GAMES; SUBGAME PERFECT EQUILIBRIUM; WSN;

EID: 78049351926     PISSN: 08407789     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CCECE.2010.5575157     Document Type: Conference Paper
Times cited : (17)

References (23)
  • 1
    • 2342540625 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Oct.
    • A. Wood and J. Stankovic, "Denial of service in sensor networks", IEEE Computer, pages 462, Oct. 2002.
    • (2002) IEEE Computer , pp. 462
    • Wood, A.1    Stankovic, J.2
  • 7
    • 10644289075 scopus 로고    scopus 로고
    • Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • P. Michiardi, R. Molva, Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in: Communications and Multimedia Security Conference, 2002.
    • (2002) Communications and Multimedia Security Conference
    • Michiardi, P.1    Molva, R.2
  • 8
    • 10644269064 scopus 로고    scopus 로고
    • Prevention of denial of service attack and selfishness in mobile ad hoc networks
    • France
    • P. Michiardi, R. Molva, Prevention of denial of service attack and selfishness in mobile ad hoc networks, Research Report RR-02-063, Institute Euŕecom, France, 2002.
    • (2002) Research Report RR-02-063, Institute Euŕecom
    • Michiardi, P.1    Molva, R.2
  • 10
    • 0004118144 scopus 로고    scopus 로고
    • Nuglets: A virtual currency to stimulate cooperation in self-organized mobile ad hoc networks
    • Swiss Federal Institute of Technology
    • L. Buttyaan, J.P. Hubaux, Nuglets: A virtual currency to stimulate cooperation in self-organized mobile ad hoc networks, Technical Report DSC/2001/001, Department of Communication Systems, Swiss Federal Institute of Technology, 2001.
    • (2001) Technical Report DSC/2001/001, Department of Communication Systems
    • Buttyaan, L.1    Hubaux, J.P.2
  • 11
    • 33645673382 scopus 로고    scopus 로고
    • Nash equilibria of packet forwarding strategies in wireless ad hoc networks
    • May, May 2006
    • M. Felegyhazi, J.-P. Hubaux, and L. Buttyan, "Nash equilibria of packet forwarding strategies in wireless ad hoc networks, " in IEEE Trans. Mobile Computing, Vol. 5, May. 2006, pp. 1044-1049, May 2006.
    • (2006) IEEE Trans. Mobile Computing , vol.5 , pp. 1044-1049
    • Felegyhazi, M.1    Hubaux, J.-P.2    Buttyan, L.3
  • 14
    • 39149117050 scopus 로고    scopus 로고
    • A game-theoretic intrusion detection model for mobile ad hoc networks
    • doi:10.1016/j.comcom.2007.10.024
    • H. Otrok et al., A game-theoretic intrusion detection model for mobile ad hoc networks, Comput. Commun. (2007), doi:10.1016/j.comcom.2007.10.024.
    • (2007) Comput. Commun.
    • Otrok, H.1
  • 15
    • 60649107168 scopus 로고    scopus 로고
    • A bayesian game approach for intrusion detection in wireless ad hoc networks
    • ACM
    • Y. Liu, C. Comaniciu, H. Man, A bayesian game approach for intrusion detection in wireless ad hoc networks, in: Proceedings of the GameNets06, ACM, 2006.
    • (2006) Proceedings of the GameNets06
    • Liu, Y.1    Comaniciu, C.2    Man, H.3
  • 17
    • 51749093355 scopus 로고    scopus 로고
    • Hit and run: A Bayesian game between malicious and regular nodes in MANETs
    • F. Li and J. Wu, "Hit and Run: A Bayesian Game Between Malicious and Regular Nodes in MANETs", IEEE SECON 2008, pp. 432-440.
    • IEEE SECON 2008 , pp. 432-440
    • Li, F.1    Wu, J.2
  • 19
    • 84874825833 scopus 로고    scopus 로고
    • A game theoretic detection in mobile ad hoc networks
    • Mar.
    • A. Patcha and J. Park, " A Game Theoretic Detection in Mobile Ad Hoc Networks", in International Journal of Network Security, Vol.2, No.2, PP.131-137, Mar. 2006.
    • (2006) International Journal of Network Security , vol.2 , Issue.2 , pp. 131-137
    • Patcha, A.1    Park, J.2
  • 20
    • 34548187304 scopus 로고    scopus 로고
    • Study of co-operation among selfish neighbors in MANET under evolutionary model
    • MIT Campus, Anna University, Chennai, India. Feb. 22-24
    • K. Komathy, P. Narayanasamy."Study of Co-Operation among Selfish Neighbors in MANET under Evolutionary Model". IEEE - ICSCN 2007, MIT Campus, Anna University, Chennai, India. Feb. 22-24, 2007. pp.133-138.
    • (2007) IEEE - ICSCN 2007 , pp. 133-138
    • Komathy, K.1    Narayanasamy, P.2
  • 23
    • 34548255006 scopus 로고    scopus 로고
    • Computer Science Department Florida State University, January 11
    • Jiangyi Hu. "Cooperation in Mobile Ad Hoc Networks". Computer Science Department Florida State University. January 11, 2005.
    • (2005) Cooperation in Mobile Ad Hoc Networks
    • Hu, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.