A Survey on Game Theory Approaches for Improving Security in MANET
暂无分享,去创建一个
[1] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[2] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[3] Chuanqi Gong,et al. ARAN protocol analysis and improvement , 2012, 2012 3rd International Conference on System Science, Engineering Design and Manufacturing Informatization.
[4] Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing , 2002, MOCO.
[5] Preeti Nagrath,et al. Analyzing security of Authenticated Routing Protocol (ARAN) , 2010 .
[6] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[7] A. Vincent Antony Kumar,et al. Security aware minimized dominating set based routing in MANET , 2010, 2010 Second International conference on Computing, Communication and Networking Technologies.
[8] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[9] Jie Wu,et al. Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[10] Zygmunt J. Haas,et al. Securing the Internet routing infrastructure , 2002, IEEE Commun. Mag..
[11] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[12] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.