메뉴 건너뛰기




Volumn 35, Issue 17, 2012, Pages 2125-2137

A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks

Author keywords

Collusion; Packet routing; Rational attacker; Repeated game; Selective forwarding

Indexed keywords

COLLUSION; PACKET ROUTING; RATIONAL ATTACKER; REPEATED GAMES; SELECTIVE FORWARDING;

EID: 84866738779     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2012.07.006     Document Type: Article
Times cited : (18)

References (31)
  • 2
    • 77952255404 scopus 로고    scopus 로고
    • Mitigating selective forwarding attacks with a channel-aware approach in WMNs
    • D.M. Shila, Y. Cheng, and T. Anjali Mitigating selective forwarding attacks with a channel-aware approach in WMNs IEEE Transactions on Wireless Communications 9 5 2010 1661 1675
    • (2010) IEEE Transactions on Wireless Communications , vol.9 , Issue.5 , pp. 1661-1675
    • Shila, D.M.1    Cheng, Y.2    Anjali, T.3
  • 4
    • 34548370980 scopus 로고    scopus 로고
    • Game theory in wireless networks: A tutorial
    • accepted to ACM Computing Surveys and withdrawn for copyright reasons, Jun. 2006
    • M. Felegyhazi, J.-P. Hubaux, Game theory in wireless networks: a tutorial, EPFL Technical Report: LCA-REPORT-2006-002, accepted to ACM Computing Surveys and withdrawn for copyright reasons, Jun. 2006.
    • EPFL Technical Report: LCA-REPORT-2006-002
    • Felegyhazi, M.1    Hubaux, J.-P.2
  • 7
    • 33947628137 scopus 로고    scopus 로고
    • Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks
    • W. Yu, and K.J.R. Liu Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks IEEE Transactions on Mobile Computing 6 5 2007 507 521
    • (2007) IEEE Transactions on Mobile Computing , vol.6 , Issue.5 , pp. 507-521
    • Yu, W.1    Liu, K.J.R.2
  • 8
    • 79960730671 scopus 로고    scopus 로고
    • From access control to trust management, and back - A petition
    • D. Gollmann, From access control to trust management, and back - a petition, in: Proceedings of IFIPTM'2011, 2011, pp.1-8.
    • (2011) Proceedings of IFIPTM'2011 , pp. 1-8
    • Gollmann, D.1
  • 9
    • 62349114584 scopus 로고    scopus 로고
    • A game theoretic approach to gray hole attacks in wireless mesh networks
    • Nov. 2008
    • D.M. Shila, T. Anjali. A game theoretic approach to gray hole attacks in wireless mesh networks, in: The proceedings of IEEE MILCOM08, Nov. 2008, pp. 1-7.
    • The Proceedings of IEEE MILCOM08 , pp. 1-7
    • Shila, D.M.1    Anjali, T.2
  • 10
    • 77951287085 scopus 로고    scopus 로고
    • A game theoretic approach for securing AODV in emergency Mobile Ad Hoc Networks
    • E.A. Panaousis, C. Politis, A game theoretic approach for securing AODV in emergency Mobile Ad Hoc Networks, in: Proceedings of IEEE WLN'09, 2009, pp. 985-992.
    • (2009) Proceedings of IEEE WLN'09 , pp. 985-992
    • Panaousis, E.A.1    Politis, C.2
  • 11
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • S. Marti, T.J. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proc. of MOBICOM'2000, 2000, pp. 255-265.
    • (2000) Proc. of MOBICOM'2000 , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 12
  • 13
    • 34548852836 scopus 로고    scopus 로고
    • CHEMAS: Identify suspect nodes in selective forwarding attacks
    • B. Xiao, B. Yu, and C. Gao CHEMAS: Identify suspect nodes in selective forwarding attacks Journal of Parallel and Distributed Computing 67 11 2007 1218 1230
    • (2007) Journal of Parallel and Distributed Computing , vol.67 , Issue.11 , pp. 1218-1230
    • Xiao, B.1    Yu, B.2    Gao, C.3
  • 14
    • 58049135707 scopus 로고    scopus 로고
    • Cooperative black and gray hole attacks in mobile ad hoc networks
    • P. Agrawal, R.K. Ghosh, S.K. Das, Cooperative black and gray hole attacks in mobile ad hoc networks, in: Proceedings of ICUIMC'2008, 2008, pp. 310-314.
    • (2008) Proceedings of ICUIMC'2008 , pp. 310-314
    • Agrawal, P.1    Ghosh, R.K.2    Das, S.K.3
  • 16
    • 77951535483 scopus 로고    scopus 로고
    • Cooperative strategy by stackelberg games under energy constraint in multi-hop relay networks
    • H. Kwon, H.J. Lee, J.M. Cioffi, Cooperative strategy by stackelberg games under energy constraint in multi-hop relay networks, in: Proceedings of IEEE GLOBECOM'2009, 2009, pp. 1-6.
    • (2009) Proceedings of IEEE GLOBECOM'2009 , pp. 1-6
    • Kwon, H.1    Lee, H.J.2    Cioffi, J.M.3
  • 19
  • 20
    • 78650504762 scopus 로고    scopus 로고
    • Model checking ad hoc network routing protocols: ARAN vs. endairA
    • D. Benetti, M. Merro, L. Vigano, Model checking ad hoc network routing protocols: ARAN vs. endairA, in: Proceedings of SEFM 2010, 2010, pp. 191-202.
    • (2010) Proceedings of SEFM 2010 , pp. 191-202
    • Benetti, D.1    Merro, M.2    Vigano, L.3
  • 21
    • 84977898401 scopus 로고    scopus 로고
    • Using directional antennas to prevent wormhole attacks
    • February 2004
    • L.-X. Hu, D. Evans, Using directional antennas to prevent wormhole attacks. In proceedings of NDSS 2004, February 2004, pp. 131-141.
    • Proceedings of NDSS 2004 , pp. 131-141
    • Hu, L.-X.1    Evans, D.2
  • 22
    • 68349086979 scopus 로고    scopus 로고
    • Mitigation of colluding route falsification attacks by insider nodes in mobile networks
    • X. Su, and V.B. Rajendra Mitigation of colluding route falsification attacks by insider nodes in mobile networks Wireless Communications and Mobile Computing 2009 1141 1157
    • (2009) Wireless Communications and Mobile Computing , pp. 1141-1157
    • Su, X.1    Rajendra, V.B.2
  • 23
    • 72949088707 scopus 로고    scopus 로고
    • The Alohanet - Surfing for wireless data [History of Communications]
    • Dec. 2009
    • M. Schwartz, N. Abramson, The Alohanet - surfing for wireless data [History of Communications], in: EEE Communications Magazine, vol.47, no.12, Dec. 2009, pp. 21-25.
    • EEE Communications Magazine , vol.47 , Issue.12 , pp. 21-25
    • Schwartz, M.1    Abramson, N.2
  • 25
    • 27744460948 scopus 로고    scopus 로고
    • Belief-free equilibria in repeated games
    • C.E. Jeffrey, H. Johannes, and O. Wojciech Belief-free equilibria in repeated games Econometrica 73 2 2005 377 415
    • (2005) Econometrica , vol.73 , Issue.2 , pp. 377-415
    • Jeffrey, C.E.1    Johannes, H.2    Wojciech, O.3
  • 26
    • 84866743763 scopus 로고    scopus 로고
    • Automated equilibrium analysis of repeated games with private monitoring: A POMDP approach
    • June 2012
    • Y.-J. Joe, A. Iwasaki, M. Kandori, I. Obara, M. Yokoo. Automated equilibrium analysis of repeated games with private monitoring: a POMDP approach. in: Proceedings of AAMAS 2012, June 2012, pp. 4-8.
    • Proceedings of AAMAS 2012 , pp. 4-8
    • Joe, Y.-J.1    Iwasaki, A.2    Kandori, M.3    Obara, I.4    Yokoo, M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.