Security Games for Node Localization through Verifiable Multilateration
暂无分享,去创建一个
Nicola Basilico | Mattia Monga | Sabrina Sicari | Nicola Gatti | N. Gatti | Nicola Basilico | S. Sicari | Mattia Monga
[1] M. M. Flood. THE HIDE AND SEEK GAME OF VON NEUMANN , 1972 .
[2] Deborah Estrin,et al. GPS-less low-cost outdoor localization for very small devices , 2000, IEEE Wirel. Commun..
[3] B. R. Badrinath,et al. Ad hoc positioning system (APS) , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).
[4] Branislav Bosanský,et al. Game-theoretic resource allocation for malicious packet detection in computer networks , 2012, AAMAS.
[5] Yoav Shoham,et al. Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .
[6] Kung Yao,et al. Source localization and beamforming , 2002, IEEE Signal Process. Mag..
[7] Tarek F. Abdelzaher,et al. Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.
[8] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[9] Mattia Monga,et al. Localization security in Wireless Sensor Networks as a non-cooperative game , 2010, International Congress on Ultra Modern Telecommunications and Control Systems.
[10] Amit Grover,et al. Survey on Wireless Sensor Network , 2016 .
[11] David Evans,et al. Localization for mobile sensor networks , 2004, MobiCom '04.
[12] Fei Yu,et al. A Survey of Game Theory in Wireless Sensor Networks Security , 2011, J. Networks.
[13] Afrand Agah,et al. Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..
[14] Nicola Basilico,et al. Asynchronous Multi-Robot Patrolling against Intrusions in Arbitrary Topologies , 2010, AAAI.
[15] E. Rowland. Theory of Games and Economic Behavior , 1946, Nature.
[16] Alan Washburn,et al. Two-Person Zero-Sum Games for Network Interdiction , 1995, Oper. Res..
[17] Vincent Conitzer,et al. Mixed-Integer Programming Methods for Finding Nash Equilibria , 2005, AAAI.
[18] M. Fewell. Area of Common Overlap of Three Circles , 2006 .
[19] S. Alpern. Infiltration games on arbitrary graphs , 1992 .
[20] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[21] Miroslav Voznak,et al. A Survey on Wireless Sensor Networks , 2015 .
[22] Sajal K. Das,et al. Security enforcement in wireless sensor networks: A framework based on non-cooperative games , 2006, Pervasive Mob. Comput..
[23] Micah Adler,et al. Randomized Pursuit-Evasion in Graphs , 2002, Combinatorics, Probability and Computing.
[24] Mattia Monga,et al. A Localization Game in Wireless Sensor Networks , 2010, GameSec.
[25] P. Hudson. Search Games , 1982 .
[26] Elaine Shi,et al. Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[27] Michael R. Lyu,et al. A Novel Coalitional Game Model for Security Issues in Wireless Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[28] Radha Poovendran,et al. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks , 2006, Advances in Information Security.
[29] N. J. A. Sloane,et al. The On-Line Encyclopedia of Integer Sequences , 2003, Electron. J. Comb..
[30] Mani B. Srivastava,et al. The bits and flops of the n-hop multilateration primitive for node localization problems , 2002, WSNA '02.
[31] Sajal K. Das,et al. Preventing DoS attack in sensor networks: a game theoretic approach , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[32] Murali S. Kodialam,et al. Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[33] Stefano Chessa,et al. Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..
[34] Srdjan Capkun,et al. Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[35] Srdjan Capkun,et al. GPS-free Positioning in Mobile Ad Hoc Networks , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.
[36] Mihail L. Sichitiu,et al. Localization in Wireless Sensor Networks: A Probabilistic Approach , 2003, International Conference on Wireless Networks.
[37] William H. Ruckle,et al. Ambushing Random Walks I: Finite Models , 1976, Oper. Res..
[38] Mainak Chatterjee,et al. Coexistence with malicious nodes: A game theoretic approach , 2009, 2009 International Conference on Game Theory for Networks.