메뉴 건너뛰기




Volumn 49, Issue 8, 2011, Pages 112-118

Jamming games in wireless networks with incomplete information

Author keywords

[No Author keywords available]

Indexed keywords

BAYESIAN GAME; CHANNEL CHARACTERISTICS; COMPLETE INFORMATION; DENIAL OF SERVICE; DISTRIBUTED WIRELESS; DOS ATTACKS; EQUILIBRIUM STRATEGY; INCOMPLETE INFORMATION; JAMMERS; KEY CHARACTERISTICS; MAC LAYER; NETWORK SCENARIO; PERFORMANCE LOSS; REPEATED GAMES; SECURE WIRELESS COMMUNICATION; SINGLE STAGE; TRAFFIC DYNAMICS;

EID: 80051717392     PISSN: 01636804     EISSN: None     Source Type: Journal    
DOI: 10.1109/MCOM.2011.5978424     Document Type: Article
Times cited : (154)

References (10)
  • 1
    • 33947219764 scopus 로고    scopus 로고
    • A game-theoretic study of CSMA/CA under a backoff attack
    • DOI 10.1109/TNET.2006.886298
    • J. Konorski, "A Game-Theoretic Study of CSMA/CA under a Backoff Attack," IEEE Trans. Net., vol. 14, no. 9, Dec. 2006, pp. 1167-78. (Pubitemid 46432424)
    • (2006) IEEE/ACM Transactions on Networking , vol.14 , Issue.6 , pp. 1167-1178
    • Konorski, J.1
  • 2
    • 27544432072 scopus 로고    scopus 로고
    • Detection of denial-of-message attacks on sensor network broadcasts
    • Oakland, CA, May
    • J. McCune et al., "Detection of Denial-of-Message Attacks on Sensor Network Broadcasts," Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 2005.
    • (2005) Proc. IEEE Symp. Security and Privacy
    • McCune, J.1
  • 3
    • 50649125455 scopus 로고    scopus 로고
    • Game theoretic modeling of malicious users in collaborative networks
    • Sept.
    • G. Theodorakopoulos and J. S. Baras, "Game Theoretic Modeling of Malicious Users in Collaborative Networks," IEEE JSAC, vol. 26, no. 7, Sept. 2008, pp. 1317-27.
    • (2008) IEEE JSAC , vol.26 , Issue.7 , pp. 1317-1327
    • Theodorakopoulos, G.1    Baras, J.S.2
  • 4
    • 70349996116 scopus 로고    scopus 로고
    • MAC games for distributed wireless network security with incomplete information of selfish and malicious user types
    • Istanbul, Turkey May
    • Y. E. Sagduyu, R. Berry, and A. Ephremides, "MAC Games for Distributed Wireless Network Security with Incomplete Information of Selfish and Malicious User Types," Proc. Int'l. Conf. Game Theory for Networks, Istanbul, Turkey, May 2009.
    • (2009) Proc. int'L. Conf. Game Theory for Networks
    • Sagduyu, Y.E.1    Berry, R.2    Ephremides, A.3
  • 7
    • 47949124003 scopus 로고    scopus 로고
    • Random access games: Selfish nodes with incomplete information
    • Orlando, FL Oct.
    • H. Inaltekin and S. B. Wicker, "Random Access Games: Selfish Nodes with Incomplete Information," Proc. IEEE MILCOM, Orlando, FL, Oct. 2007.
    • (2007) Proc. IEEE MILCOM
    • Inaltekin, H.1    Wicker, S.B.2
  • 10
    • 16244381482 scopus 로고    scopus 로고
    • Dynamic fictitious play, dynamic gradient play, and distributed convergence to nash equilibria
    • DOI 10.1109/TAC.2005.843878
    • J. S. Shamma and G. Arslan, "Dynamic Fictitious Play, Dynamic Gradient Play, and Distributed Convergence to Nash Equilibria," IEEE Trans. Automatic Control, vol. 50, no. 3, Mar. 2005, pp. 312-27. (Pubitemid 40448583)
    • (2005) IEEE Transactions on Automatic Control , vol.50 , Issue.3 , pp. 312-327
    • Shamma, J.S.1    Arslan, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.