메뉴 건너뛰기




Volumn , Issue , 2012, Pages 928-933

Indirect reciprocity game modelling for secure wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

COGNITIVE RADIO NETWORK; COLLUSION ATTACK; EVOLUTIONARILY STABLE STRATEGY; NETWORK ACCESS; NETWORK SERVICES; OPTIMAL ACTIONS; RECIPROCITY PRINCIPLE; SECURE WIRELESS NETWORK; SECURITY MECHANISM; SOCIAL NORM; TERMINAL MOBILITY; WIRELESS SECURITY;

EID: 84871947315     PISSN: 15503607     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2012.6364034     Document Type: Conference Paper
Times cited : (8)

References (11)
  • 1
    • 29144503110 scopus 로고    scopus 로고
    • Attack-resistant cooperation stimulation in autonomous ad hoc networks
    • Dec.
    • W. Yu and K.J.R. Liu, "Attack-resistant cooperation stimulation in autonomous ad hoc networks," IEEE J. Sel. Areas Commun., vol. 23, pp. 2260-2271, Dec. 2005.
    • (2005) IEEE J. Sel. Areas Commun. , vol.23 , pp. 2260-2271
    • Yu, W.1    Liu, K.J.R.2
  • 2
    • 33947628137 scopus 로고    scopus 로고
    • Game theoretic analysis of cooperation stimulation and security in antonomous mobile ad hoc networks
    • May
    • W. Yu and K.J.R. Liu, "Game theoretic analysis of cooperation stimulation and security in antonomous mobile ad hoc networks," IEEE Trans. Mobile Comput., pp. 459-473, May 2007.
    • (2007) IEEE Trans. Mobile Comput. , pp. 459-473
    • Yu, W.1    Liu, K.J.R.2
  • 4
    • 33144465932 scopus 로고    scopus 로고
    • Information theoretic framework of trust modelling and evaluation for ad hoc networks
    • Feb.
    • Y. Sun,W. Yu, Z. Han, and K.J.R. Liu, "Information theoretic framework of trust modelling and evaluation for ad hoc networks," IEEE J. Sel. Areas Commun., vol. 24, pp. 305-317, Feb. 2006.
    • (2006) IEEE J. Sel. Areas Commun. , vol.24 , pp. 305-317
    • Sunw. Yu, Y.1    Han, Z.2    Liu, K.J.R.3
  • 5
    • 77952581914 scopus 로고    scopus 로고
    • Maintaining defender's reputation in anomaly detection against insider attacks
    • June
    • N. Zhang, W. Yu, X. Fu, and S.K. Das, "Maintaining defender's reputation in anomaly detection against insider attacks," IEEE Trans. Systems, Man, and Cybernetics, vol. 40, pp. 597 - 611, June 2010.
    • (2010) IEEE Trans. Systems, Man, and Cybernetics , vol.40 , pp. 597-611
    • Zhang, N.1    Yu, W.2    Fu, X.3    Das, S.K.4
  • 6
    • 79954567155 scopus 로고    scopus 로고
    • A cooperation stimulation strategy in wireless multicast networks
    • May
    • B. Niu, H.V. Zhao, and H. Jiang, "A cooperation stimulation strategy in wireless multicast networks," IEEE Trans. Signal Processing, vol. 59, pp. 2355 - 2369, May 2011.
    • (2011) IEEE Trans. Signal Processing , vol.59 , pp. 2355-2369
    • Niu, B.1    Zhao, H.V.2    Jiang, H.3
  • 7
    • 79951658780 scopus 로고    scopus 로고
    • Trust management and adversary detection for delay tolerant networks
    • E. Ayday, H. Lee, and F. Fekri, "Trust management and adversary detection for delay tolerant networks," in Proc. IEEE Military Comm. Conf., 2010.
    • (2010) Proc. IEEE Military Comm. Conf.
    • Ayday, E.1    Lee, H.2    Fekri, F.3
  • 8
    • 27644522801 scopus 로고    scopus 로고
    • Evolution of indirect reciprocity
    • Oct.
    • M. Nowak and K. Sigmund, "Evolution of indirect reciprocity," Nature, vol. 437, pp. 1291-1298, Oct. 2005.
    • (2005) Nature , vol.437 , pp. 1291-1298
    • Nowak, M.1    Sigmund, K.2
  • 9
    • 79551688226 scopus 로고    scopus 로고
    • Indirect reciprocity game modelling for cooperation stimulation in cognitive networks
    • Jan.
    • Y. Chen and K.J.R. Liu, "Indirect reciprocity game modelling for cooperation stimulation in cognitive networks," IEEE Trans. Comm., vol. 59, pp. 159-168, Jan. 2011.
    • (2011) IEEE Trans. Comm. , vol.59 , pp. 159-168
    • Chen, Y.1    Liu, K.J.R.2
  • 10
    • 70349673250 scopus 로고    scopus 로고
    • A sybilproof indirect reciprociy mechansim for peer-to-peer networks
    • R. Landa, D. Griffin, R. Clegg, E. Mykoniati, and M. Rio, "A sybilproof indirect reciprociy mechansim for peer-to-peer networks," in Proc. IEEE INFOCOM, 2009, pp. 343-351.
    • (2009) Proc. IEEE INFOCOM , pp. 343-351
    • Landa, R.1    Griffin, D.2    Clegg, R.3    Mykoniati, E.4    Rio, M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.