메뉴 건너뛰기




Volumn 7, Issue 4, 2012, Pages 1368-1380

Indirect reciprocity security game for large-scale wireless networks

Author keywords

Collusion attacks; evolutionarily stable strategy (ESS); indirect reciprocity; large scale network; wireless security

Indexed keywords

COLLUSION ATTACK; EVOLUTIONARILY STABLE STRATEGY; INDIRECT RECIPROCITY; LARGE-SCALE NETWORK; WIRELESS SECURITY;

EID: 84863935030     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2012.2202228     Document Type: Article
Times cited : (72)

References (22)
  • 3
    • 34247324807 scopus 로고    scopus 로고
    • Detecting identity-based attacks in wireless networks using signalprints
    • DOI 10.1145/1161289.1161298, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
    • D. Faria and D. Cheriton, "Detecting identity-based attacks in wireless networks using signalprints," in Proc. ACM Workshop on Wireless Security, 2006, pp. 43-52. (Pubitemid 46634301)
    • (2006) WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security , vol.2006 , pp. 43-52
    • Faria, D.B.1    Cheriton, D.R.2
  • 6
    • 29144503110 scopus 로고    scopus 로고
    • Attack-resistant cooperation stimulation in autonomous Ad Hoc networks
    • DOI 10.1109/JSAC.2005.857201
    • W. Yu and K. J. R. Liu, "Attack-resistant cooperation stimulation in autonomous ad hoc networks," IEEE J. Sel. Areas Commun., vol. 23, no. 12, pp. 2260-2271, Dec. 2005. (Pubitemid 41811977)
    • (2005) IEEE Journal on Selected Areas in Communications , vol.23 , Issue.12 , pp. 2260-2271
    • Yu, W.1    Ray Liu, K.J.2
  • 7
    • 84892591410 scopus 로고    scopus 로고
    • A survey of security issues in mobile ad hoc and sensor networks
    • 4th Quarter
    • D. Djenouri, L. Khelladi, and A. N. Badache, "A survey of security issues in mobile ad hoc and sensor networks," IEEE Commun. Surveys Tutorials, vol. 7, no. 4, pp. 2-28, 4th Quarter, 2005.
    • (2005) IEEE Commun. Surveys Tutorials , vol.7 , Issue.4 , pp. 2-28
    • Djenouri, D.1    Khelladi, L.2    Badache, A.N.3
  • 8
    • 33144465932 scopus 로고    scopus 로고
    • Information theoretic framework of trust modelling and evaluation for ad hoc networks
    • Feb
    • Y. Sun, W. Yu, Z. Han, and K. J. R. Liu, "Information theoretic framework of trust modelling and evaluation for ad hoc networks," IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 305-317, Feb. 2006.
    • (2006) IEEE J. Sel. Areas Commun. , vol.24 , Issue.2 , pp. 305-317
    • Sun, Y.1    Yu, W.2    Han, Z.3    Liu, K.J.R.4
  • 9
    • 56749140937 scopus 로고    scopus 로고
    • Defense of trust management vulnerabilities in distributed networks
    • Feb
    • Y. L. Sun, Z. Han, and K. J. R. Liu, "Defense of trust management vulnerabilities in distributed networks," IEEE Commun. Mag., vol. 46, no. 2, pp. 112-119, Feb. 2008.
    • (2008) IEEE Commun. Mag. , vol.46 , Issue.2 , pp. 112-119
    • Sun, Y.L.1    Han, Z.2    Liu, K.J.R.3
  • 10
    • 39049116456 scopus 로고    scopus 로고
    • A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
    • Barcelona, Spain
    • Y. Sun, Z. Han, W. Yu, and K. J. R. Liu, "A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks," in Proc. IEEE INFOCOM, Barcelona, Spain, 2006.
    • (2006) Proc. IEEE INFOCOM
    • Sun, Y.1    Han, Z.2    Yu, W.3    Liu, K.J.R.4
  • 11
    • 33947628137 scopus 로고    scopus 로고
    • Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks
    • DOI 10.1109/TMC.2007.1026
    • W. Yu and K. J. R. Liu, "Game theoretic analysis of cooperation stimulation and security in antonomous mobile ad hoc networks," IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 459-473, May 2007. (Pubitemid 46495729)
    • (2007) IEEE Transactions on Mobile Computing , vol.6 , Issue.5 , pp. 459-473
    • Yu, W.1    Liu, K.J.R.2
  • 12
    • 77952581914 scopus 로고    scopus 로고
    • Maintaining defender's reputation in anomaly detection against insider attacks
    • Jun
    • N. Zhang,W.Yu, X. Fu, and S.K.Das, "Maintaining defender's reputation in anomaly detection against insider attacks," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 40, no. 3, pp. 597-611, Jun. 2010.
    • (2010) IEEE Trans. Syst., Man, Cybern. B, Cybern. , vol.40 , Issue.3 , pp. 597-611
    • Zhang, N.1    Yu, W.2    Fu, X.3    Das, S.K.4
  • 13
    • 79954567155 scopus 로고    scopus 로고
    • A cooperation stimulation strategy in wireless multicast networks
    • May
    • B. Niu, H. V. Zhao, and H. Jiang, "A cooperation stimulation strategy in wireless multicast networks," IEEE Trans. Signal Process., vol. 59, no. 5, pp. 2355-2369, May 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.5 , pp. 2355-2369
    • Niu, B.1    Zhao, H.V.2    Jiang, H.3
  • 14
    • 79951658780 scopus 로고    scopus 로고
    • Trust management and adversary detection for delay tolerant networks
    • San Jose, CA
    • E. Ayday, H. Lee, and F. Fekri, "Trust management and adversary detection for delay tolerant networks," in Proc. IEEE Military Commun. Conf., San Jose, CA, 2010.
    • (2010) Proc. IEEE Military Commun. Conf.
    • Ayday, E.1    Lee, H.2    Fekri, F.3
  • 15
    • 27644522801 scopus 로고    scopus 로고
    • Evolution of indirect reciprocity
    • DOI 10.1038/nature04131, PII N04131
    • M. Nowak and K. Sigmund, "Evolution of indirect reciprocity," Nature, vol. 437, pp. 1291-1298, Oct. 2005. (Pubitemid 41568670)
    • (2005) Nature , vol.437 , Issue.7063 , pp. 1291-1298
    • Nowak, M.A.1    Sigmund, K.2
  • 17
    • 79551688226 scopus 로고    scopus 로고
    • Indirect reciprocity game modelling for cooperation stimulation in cognitive networks
    • Jan
    • Y. Chen and K. J. R. Liu, "Indirect reciprocity game modelling for cooperation stimulation in cognitive networks," IEEE Trans. Commun., vol. 59, no. 1, pp. 159-168, Jan. 2011.
    • (2011) IEEE Trans. Commun. , vol.59 , Issue.1 , pp. 159-168
    • Chen, Y.1    Liu, K.J.R.2
  • 18
    • 70349673250 scopus 로고    scopus 로고
    • A sybilproof indirect reciprociy mechansim for peer-to-peer networks
    • R. Landa, D. Griffin, R. Clegg, E. Mykoniati, and M. Rio, "A sybilproof indirect reciprociy mechansim for peer-to-peer networks," in Proc. IEEE INFOCOM, 2009, pp. 343-351.
    • (2009) Proc. IEEE INFOCOM , pp. 343-351
    • Landa, R.1    Griffin, D.2    Clegg, R.3    Mykoniati, E.4    Rio, M.5
  • 19
    • 80054075293 scopus 로고    scopus 로고
    • Exploiting jamming-caused neighbor changes for jammer localization
    • Mar
    • W. X. Z. Liu, H. Liu, and Y. Chen, "Exploiting jamming-caused neighbor changes for jammer localization," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 3, pp. 547-555, Mar. 2011.
    • (2011) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.3 , pp. 547-555
    • Liu, W.X.Z.1    Liu, H.2    Chen, Y.3
  • 21
    • 0001432658 scopus 로고
    • Discounted dynamic programming
    • D. Blackwell, "Discounted dynamic programming," Ann. Math. Statist., vol. 36, pp. 226-235, 1965.
    • (1965) Ann. Math. Statist. , vol.36 , pp. 226-235
    • Blackwell, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.