Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game
暂无分享,去创建一个
Xiang Li | Lei Gao | Weijia Jia | Haojin Zhu | Qi Hu | Na Ruan | Haojin Zhu | Lei Gao | Xiang Li | Na Ruan | Weijia Jia | Qi Hu
[1] Zhu Han,et al. Game theoretic modeling of jamming attack in wireless powered communication networks , 2015, 2015 IEEE International Conference on Communications (ICC).
[2] Donggang Liu,et al. Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.
[3] Zhu Han,et al. Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .
[4] Enrico Gregori,et al. Network sensing through smartphone-based crowdsourcing , 2013, SenSys '13.
[5] Kim-Kwang Raymond Choo,et al. Multi-sender Broadcast Authentication in Wireless Sensor Networks , 2014, 2014 Tenth International Conference on Computational Intelligence and Security.
[6] Adrian Perrig,et al. Flexible, extensible, and efficient VANET authentication , 2009, Journal of Communications and Networks.
[7] Xuemin Shen,et al. Security and privacy in mobile crowdsourcing networks: challenges and opportunities , 2015, IEEE Communications Magazine.
[8] Eitan Altman,et al. An evolutionary game approach for the design of congestion control protocols in wireless networks , 2008, 2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops.
[9] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[10] Kaoru Ota,et al. An incentive game based evolutionary model for crowd sensing networks , 2016, Peer-to-Peer Netw. Appl..
[11] Malcolm Hall,et al. ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing , 2013, MobiSys '13.
[12] Jie Li,et al. Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).
[13] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[14] Eitan Altman,et al. Evolutionary Games in Wireless Networks , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[15] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[16] Deepak Ganesan,et al. TruCentive: A game-theoretic incentive platform for trustworthy mobile crowdsourcing parking services , 2012, 2012 15th International IEEE Conference on Intelligent Transportation Systems.
[17] Alon Y. Halevy,et al. Crowdsourcing systems on the World-Wide Web , 2011, Commun. ACM.
[18] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[19] Kyung-Ah Shim,et al. EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks , 2013, Ad Hoc Networks.
[20] Shaojie Tang,et al. A Differentially Private Selective Aggregation Scheme for Online User Behavior Analysis , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).