Development of a secure routing protocol using game theory model in mobile ad hoc networks
暂无分享,去创建一个
Madasamy Kaliappan | Balasubramanian Paramasivan | Maria Johan Viju Prakash | M. Kaliappan | B. Paramasivan | M. V. Prakash
[1] Jie Wu,et al. Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[2] John S. Baras,et al. Malicious Users in Unstructured Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[3] Marjan Kuchaki Rafsanjani,et al. A Hybrid Intrusion Detection by Game Theory Approaches in MANET , 2012 .
[4] Luiz A. DaSilva,et al. Adaptation of Reputation Management Systems to Dynamic Network Conditions in Ad Hoc Networks , 2010, IEEE Transactions on Computers.
[5] Haiying Shen,et al. Game-Theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc Networks , 2012, IEEE Transactions on Mobile Computing.
[6] Quanyan Zhu,et al. GUIDEX: A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks , 2012, IEEE Journal on Selected Areas in Communications.
[7] Peng Liu,et al. Incentive-based modeling and inference of attacker intent, objectives, and strategies , 2003, CCS '03.
[8] Prabir Bhattacharya,et al. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING 1 Mechanism Design-Based Secure Leader Elec , 2022 .
[9] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[10] Alberto Blanc,et al. Designing incentives for peer-to-peer routing , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[11] Winston Khoon Guan Seah,et al. Game-Theoretic Model for Collaborative Protocols in Selfish, Tariff-Free, Multihop Wireless Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[12] Rahul Rishi,et al. Comparative Analysis of CBRP, DSR, AODV Routing Protocol in MANET , 2010 .
[13] Marcin Malawski. “Procedural” values for cooperative games , 2013, Int. J. Game Theory.
[14] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[15] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[16] Jean-Yves Le Boudec,et al. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .
[17] Markus Kinateder,et al. Delayed perfect monitoring in repeated games , 2013, Int. J. Game Theory.
[18] K. J. Ray Liu,et al. A Belief Evaluation Framework in Autonomous MANETs under Noisy and Imperfect Observation: Vulnerability Analysis and Cooperation Enforcement , 2010, IEEE Transactions on Mobile Computing.
[19] Jinyang Li,et al. Cluster Based Routing Protocol(CBRP) Functional Specification , 1999 .
[20] Jie Wu,et al. Mobility Reduces Uncertainty in MANETs , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[21] S. Buchegger,et al. Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks , 2003 .
[22] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[23] M. Jiang,et al. Cluster based routing protocol (CBRP) , 1999 .
[24] Mathias Staudigl,et al. Co-evolutionary dynamics and Bayesian interaction games , 2013, Int. J. Game Theory.