Security modeling of an ad hoc network under the constraint of energy by an approach in two steps: Clustering-Evolutionary game
暂无分享,去创建一个
Mohammed Said Radjef | Karima Adel-Aissanou | Sara Berri | Myria Bouhaddi | Karima Adel-Aissanou | Sara Berri | M. Radjef | Myria Bouhaddi
[1] Christophe Duhamel,et al. Strategies for designing energy-efficient clusters-based WSN topologies , 2012, J. Heuristics.
[2] J. M. Smith,et al. The Logic of Animal Conflict , 1973, Nature.
[3] Lin Chen,et al. A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks , 2009, IEEE Transactions on Information Forensics and Security.
[4] P. Taylor,et al. Evolutionarily Stable Strategies and Game Dynamics , 1978 .
[5] Mahesh Motwani,et al. Survey of clustering algorithms for MANET , 2009, ArXiv.
[6] Niki Pissinou,et al. Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks: Application to Network Security and Privacy , 2011, 2011 IEEE International Conference on Communications (ICC).
[7] Roger B. Myerson,et al. Game theory - Analysis of Conflict , 1991 .
[8] Sajal K. Das,et al. WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks , 2002, Cluster Computing.
[9] Ossama Younis,et al. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.
[10] Prabir Bhattacharya,et al. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING 1 Mechanism Design-Based Secure Leader Elec , 2022 .
[11] Laya Aliahmadipour,et al. Game theory approaches for improving intrusion detection in MANETs , 2011 .
[12] Noufissa Mikou,et al. A stochastic model to study the impact of the transmission frequency of hello messages on the connectivity of ad hoc networks , 2014, Telecommun. Syst..
[13] A. Ephremides,et al. A design concept for reliable mobile radio networks with frequency hopping signaling , 1987, Proceedings of the IEEE.
[14] Hao Sun,et al. Using Bayesian Game Model for Intrusion Detection in Wireless Ad Hoc Networks , 2010, Int. J. Commun. Netw. Syst. Sci..
[15] Jeannette M. Wing,et al. Game strategies in network security , 2005, International Journal of Information Security.
[16] Christian Bettstetter,et al. On the Connectivity of Ad Hoc Networks , 2004, Comput. J..
[17] Mario Gerla,et al. Multicluster, mobile, multimedia radio network , 1995, Wirel. Networks.