메뉴 건너뛰기




Volumn 8840, Issue , 2014, Pages 195-215

Secure message delivery games for device-to-device communications

Author keywords

Device to device communications; Game theory; Security

Indexed keywords

ABSTRACTING; ENERGY UTILIZATION; GAME THEORY; POWER MANAGEMENT (TELECOMMUNICATION); QUALITY OF SERVICE; VIRUSES;

EID: 84910008119     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-12601-2_11     Document Type: Article
Times cited : (18)

References (31)
  • 4
    • 84900422594 scopus 로고    scopus 로고
    • Relay-by-Smartphone: Realizing Multihop Device-to-Device Communications
    • Nishiyama, H., Ito, M., Kato, N.: Relay-by-Smartphone: Realizing Multihop Device-to-Device Communications. IEEE Communications Magazine 52(4), 56–65 (2014)
    • (2014) IEEE Communications Magazine , vol.52 , Issue.4 , pp. 56-65
    • Nishiyama, H.1    Ito, M.2    Kato, N.3
  • 5
    • 84890430700 scopus 로고    scopus 로고
    • Secrecy-Based Access Control for Deviceto- Device Communication Underlaying Cellular Networks
    • Jianting, Y., Chuan, M., Hui, Y. Wei, Z.: Secrecy-Based Access Control for Deviceto- Device Communication Underlaying Cellular Networks. IEEE Communications Magazine 17(11), 2068–2071 (2013)
    • (2013) IEEE Communications Magazine , vol.17 , Issue.11 , pp. 2068-2071
    • Jianting, Y.1    Chuan, M.2    Hui Wei, Y.Z.3
  • 7
    • 84910004252 scopus 로고    scopus 로고
    • accessed June
    • F-Secure: Bluetooth-Worm:SymbOS/Cabir, http://www.f-secure.com/v-descs/cabir.shtml (accessed June 2004)
    • (2004)
  • 9
    • 50049087364 scopus 로고    scopus 로고
    • On mobile viruses exploiting messaging and bluetooth services
    • Bose, A., Shin, K.G.: On mobile viruses exploiting messaging and bluetooth services. In: Proc. of the Securecomm and Workshops, pp. 1–10 (2006)
    • (2006) Proc. of the Securecomm and Workshops , pp. 1-10
    • Bose, A.1    Shin, K.G.2
  • 13
    • 33645673382 scopus 로고    scopus 로고
    • Nash equilibria of packet forwarding strategies in wireless ad hoc networks
    • Felegyhazi, M., Buttyan, L., Hubaux, J.-P.: Nash equilibria of packet forwarding strategies in wireless ad hoc networks. IEEE Transactions on Mobile Comput. 5(5), 463–476 (2006)
    • (2006) IEEE Transactions on Mobile Comput , vol.5 , Issue.5 , pp. 463-476
    • Felegyhazi, M.1    Buttyan, L.2    Hubaux, J.-P.3
  • 15
    • 77949264858 scopus 로고    scopus 로고
    • Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks
    • Cho, J.H., Chen, I.R., Feng, P.G.: Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks. IEEE Transactions on Reliability 59(1), 231–241 (2010)
    • (2010) IEEE Transactions on Reliability , vol.59 , Issue.1 , pp. 231-241
    • Cho, J.H.1    Chen, I.R.2    Feng, P.G.3
  • 16
    • 0031211090 scopus 로고    scopus 로고
    • A decision-theoretic generalization of on-line learning and an application to boosting
    • Freund, Y., Schapire, R.E.: A decision-theoretic generalization of on-line learning and an application to boosting. Journal of Computer and System Sciences, 119–139 (1997)
    • (1997) Journal of Computer and System Sciences , pp. 119-139
    • Freund, Y.1    Schapire, R.E.2
  • 18
    • 67649498303 scopus 로고    scopus 로고
    • Modelling misbehaviour in ad hoc networks: A game theoretic approach for intrusion detection
    • Liu, Y., Comaniciou, C., Man, H.: Modelling misbehaviour in ad hoc networks: A game theoretic approach for intrusion detection. International Journal of Security and Networks 1(7), 243–254 (2006)
    • (2006) International Journal of Security and Networks , vol.1 , Issue.7 , pp. 243-254
    • Liu, Y.1    Comaniciou, C.2    Man, H.3
  • 24
    • 84874825833 scopus 로고    scopus 로고
    • A game theoretic formulation for intrusion detection in mobile ad hoc networks
    • Patcha, A., Park, J.M.: A game theoretic formulation for intrusion detection in mobile ad hoc networks. International Journal of Network Security 2(2), 131–137 (2006)
    • (2006) International Journal of Network Security , vol.2 , Issue.2 , pp. 131-137
    • Patcha, A.1    Park, J.M.2
  • 25
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • . Springer US
    • Johnson, D.B., Maltz, D.A.: Dynamic source routing in ad hoc wireless networks. In: Mobile Computing, pp. 153–181. Springer US (1996)
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 27
    • 33144465932 scopus 로고    scopus 로고
    • Information theoretic framework of trust modeling and evaluation for ad hoc networks
    • Sun, Y.L., Yu, W., Han, Z., Liu, K.J.R.: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas of Communication 24(2), 305–317 (2006)
    • (2006) IEEE Journal on Selected Areas of Communication , vol.24 , Issue.2 , pp. 305-317
    • Sun, Y.L.1    Yu, W.2    Han, Z.3    Liu, K.J.R.4
  • 29
    • 34249339428 scopus 로고    scopus 로고
    • Securing cooperative ad-hoc networks under noise and imperfect monitoring: Strategies and game theoretic analysis
    • Yu, W., Ji, Z., Liu, K.J.R.: Securing cooperative ad-hoc networks under noise and imperfect monitoring: Strategies and game theoretic analysis. IEEE Transactions on Information Forensics and Security 2(2), 240–253 (2007)
    • (2007) IEEE Transactions on Information Forensics and Security , vol.2 , Issue.2 , pp. 240-253
    • Yu, W.1    Ji, Z.2    Liu, K.J.R.3
  • 30
    • 33947628137 scopus 로고    scopus 로고
    • Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks
    • Yu, W., Liu, K.J.R.: Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks. IEEE Transactions on Mobile Computing 6(5), 507–521 (2007)
    • (2007) IEEE Transactions on Mobile Computing , vol.6 , Issue.5 , pp. 507-521
    • Yu, W.1    Liu, K.J.R.2
  • 31
    • 44049100110 scopus 로고    scopus 로고
    • Secure cooperation in autonomous mobile ad-hoc networks under noise and imperfect monitoring: A game-theoretic approach
    • Yu, W., Liu, K.J.R.: Secure cooperation in autonomous mobile ad-hoc networks under noise and imperfect monitoring: A game-theoretic approach. IEEE Transactions on Information Forensics and Security 3(2), 317–330 (2008)
    • (2008) IEEE Transactions on Information Forensics and Security , vol.3 , Issue.2 , pp. 317-330
    • Yu, W.1    Liu, K.J.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.