Game-theoretic analysis of node capture and cloning attack with multiple attackers in wireless sensor networks
暂无分享,去创建一个
[1] Tamer Başar,et al. H1-Optimal Control and Related Minimax Design Problems , 1995 .
[2] Guang Gong,et al. Randomly directed exploration: An efficient node clone detection protocol in wireless sensor networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[3] Kim C. Border,et al. Fixed point theorems with applications to economics and game theory: References , 1985 .
[4] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[5] Emanuele Garone,et al. False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).
[6] Aleksandar Milenkovic,et al. Wireless sensor networks for personal health monitoring: Issues and an implementation , 2006, Comput. Commun..
[7] Quanyan Zhu,et al. A Stochastic Game Model for Jamming in Multi-Channel Cognitive Radio Systems , 2010, 2010 IEEE International Conference on Communications.
[8] Radha Poovendran,et al. Node capture attacks in wireless sensor networks: A system theoretic approach , 2010, 49th IEEE Conference on Decision and Control (CDC).
[9] Walid Saad,et al. Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[10] Quanyan Zhu,et al. Robust and resilient control design for cyber-physical systems with an application to power systems , 2011, IEEE Conference on Decision and Control and European Control Conference.
[11] Eitan Altman,et al. Adversarial Control in a Delay Tolerant Network , 2010, GameSec.
[12] Karl Henrik Johansson,et al. Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[13] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[14] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[15] Roberto Di Pietro,et al. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.
[16] John Anderson,et al. Wireless sensor networks for habitat monitoring , 2002, WSNA '02.
[17] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[18] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).