메뉴 건너뛰기




Volumn , Issue , 2011, Pages 144-149

Classification on attacks in wireless ad hoc networks: A game theoretic view

Author keywords

[No Author keywords available]

Indexed keywords

GAME MODELS; MATHEMATICAL TOOLS; OPEN PROBLEMS; RESEARCH EFFORTS; VARIOUS ATTACKS;

EID: 80052117632     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (15)

References (28)
  • 2
    • 77951729734 scopus 로고    scopus 로고
    • A survey of game theory as applied to network security
    • Sankardas Roy, "A survey of game theory as applied to network security," Proc. of the 43rd HICSS, 2010.
    • (2010) Proc. of the 43rd HICSS
    • Roy, S.1
  • 3
    • 84994139277 scopus 로고    scopus 로고
    • A game theoretic approach to gray hole attacks in wireless mesh networks
    • Devu Manikantan Shila, Tricha Anjali, "A game theoretic approach to gray hole attacks in wireless mesh networks," Military Communications Conference, 2008.
    • (2008) Military Communications Conference
    • Shila, D.M.1    Anjali, T.2
  • 4
    • 0020497622 scopus 로고
    • The Gaussian test channel with an intelligent jammer
    • January
    • T. Basar, "The Gaussian test channel with an intelligent jammer." IEEE Transactions on Information Theory, vol. 29, pp.152-157, January 1983.
    • (1983) IEEE Transactions on Information Theory , vol.29 , pp. 152-157
    • Basar, T.1
  • 5
    • 4544354908 scopus 로고    scopus 로고
    • Correlated jamming on MIMO Gaussian fading channels
    • September
    • A. Kashyap, "Correlated jamming on MIMO Gaussian fading channels." IEEE Transactions on Information Theory, vol. 50, pp.2119-2123, September 2004.
    • (2004) IEEE Transactions on Information Theory , vol.50 , pp. 2119-2123
    • Kashyap, A.1
  • 6
    • 34249339428 scopus 로고    scopus 로고
    • Securing cooperative ad-hoc networks under noise and imperfect monitoring: Strategies and game theoretic analysis
    • June
    • Wei Yu, Zhu Ji, K. J. Ray Liu, "Securing cooperative ad-hoc networks under noise and imperfect monitoring: strategies and game theoretic analysis." IEEE Transactions on Information Forensics and Security, vol. 2, June 2007.
    • (2007) IEEE Transactions on Information Forensics and Security , vol.2
    • Yu, W.1    Ji, Z.2    Liu, K.J.R.3
  • 9
    • 44149118108 scopus 로고    scopus 로고
    • Attacks and countermeasures in sensor networks: A survey
    • K. Xing, "Attacks and countermeasures in sensor networks: a survey," Network Security, 2009.
    • (2009) Network Security
    • Xing, K.1
  • 10
    • 79959875003 scopus 로고    scopus 로고
    • Game theory meets network security and privacy
    • M. H. Manshaei, "Game theory meets network security and privacy," EPFL Technical Report, 2010.
    • (2010) EPFL Technical Report
    • Manshaei, M.H.1
  • 11
    • 70349996116 scopus 로고    scopus 로고
    • MAC games for distributed wireless network security with Incomplete Information of Selfish and Malicious User Types
    • Y. E. Sagduyu, "MAC games for distributed wireless network security with Incomplete Information of Selfish and Malicious User Types," 20th International Conference on Game Theory for Networks, 2009.
    • (2009) 20th International Conference on Game Theory for Networks
    • Sagduyu, Y.E.1
  • 14
    • 36849010124 scopus 로고    scopus 로고
    • A survey on attacks and countermeasures in mobile ad hoc networks
    • B. Wu, J. Chen, "A survey on attacks and countermeasures in mobile ad hoc networks," Wireless/ Mobile Network Security, 2006.
    • (2006) Wireless/ Mobile Network Security
    • Wu, B.1    Chen, J.2
  • 15
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
    • Y. C. Hu, A. Perrig, and D.Johnson, "Packet leashes: a defense against wormhole attacks in wireless ad hoc networks," Proceedings of INFOCOMM, pp.1976-1986, 2003.
    • (2003) Proceedings of INFOCOMM , pp. 1976-1986
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.3
  • 16
    • 48049122172 scopus 로고    scopus 로고
    • Intrusion detection system resiliency to byzantine attacks: The case study of wormholes in OLSR
    • J. S. Baras, S. Radosavac, G. Theodorakopoulos, "Intrusion detection system resiliency to byzantine attacks: the case study of wormholes in OLSR," IEEE Military Communications Conference, pp.243-256, 2007.
    • (2007) IEEE Military Communications Conference , pp. 243-256
    • Baras, J.S.1    Radosavac, S.2    Theodorakopoulos, G.3
  • 17
    • 56449123247 scopus 로고    scopus 로고
    • Game theoretic approach in routing protocol for wireless ad hoc networks
    • May
    • M. Naserian, K. Tepe, "Game theoretic approach in routing protocol for wireless ad hoc networks," Ad Hoc Networks, vol.7, May 2009.
    • (2009) Ad Hoc Networks , vol.7
    • Naserian, M.1    Tepe, K.2
  • 23
    • 80052124570 scopus 로고    scopus 로고
    • A puzzle-based defense strategy against flooding attacks using game theory
    • September
    • W. Saad, Z. Han, M. Debbah, "A puzzle-based defense strategy against flooding attacks using game theory." IEEE Signal Processing Magazine, September 2009.
    • (2009) IEEE Signal Processing Magazine
    • Saad, W.1    Han, Z.2    Debbah, M.3
  • 27
    • 0026240492 scopus 로고
    • Jamming in slotted ALOHA multihop packet radio networks
    • J. Zander, "Jamming in slotted ALOHA multihop packet radio networks." IEEE Transactions on Communication, vol. 39, 1991.
    • (1991) IEEE Transactions on Communication , vol.39
    • Zander, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.