A fuzzy logic and game theory based adaptive approach for securing opportunistic networks against black hole attacks
暂无分享,去创建一个
[1] Isaac Woungang,et al. Trust Management in Opportunistic Networks: A Semantic Web Approach , 2009, 2009 World Congress on Privacy, Security, Trust and the Management of e-Business.
[2] Vinny Cahill,et al. When TCP Breaks: Delay- and Disruption- Tolerant Networking , 2006, IEEE Internet Computing.
[3] Jie Yang,et al. Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[4] Shahaboddin Shamshirband,et al. Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks , 2014, Eng. Appl. Artif. Intell..
[5] Stephen Farrell,et al. Delay- and Disruption-Tolerant Networking , 2006, IEEE Internet Computing.
[6] D. Vijay Rao,et al. A Game Theoretic Approach to Modelling Jamming Attacks in Delay Tolerant Networks , 2017 .
[7] Marco Conti,et al. Opportunistic networking: data forwarding in disconnected mobile ad hoc networks , 2006, IEEE Communications Magazine.
[8] Sajal K. Das,et al. A trust-based framework for data forwarding in opportunistic networks , 2013, Ad Hoc Networks.
[9] Qian Zhang,et al. Shortest path routing in partially connected ad hoc networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[10] Brian Gallagher,et al. MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[11] Boris Bellalta,et al. Game theory for energy efficiency in Wireless Sensor Networks: Latest trends , 2015, J. Netw. Comput. Appl..
[12] Jörg Ott,et al. The ONE simulator for DTN protocol evaluation , 2009, SIMUTools 2009.
[13] Rachid El Azouzi,et al. Evolutionary forwarding games in delay tolerant networks: Equilibria, mechanism design and stochastic approximation , 2013, Comput. Networks.
[14] Stephen Farrell,et al. DTN: an architectural retrospective , 2008, IEEE Journal on Selected Areas in Communications.
[15] Zhenfu Cao,et al. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks , 2014 .
[16] Anders Lindgren,et al. Probabilistic routing in intermittently connected networks , 2003, MOCO.
[17] Isaac Woungang,et al. Performance evaluation of various routing protocols in Opportunistic Networks , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).
[18] P. Taylor,et al. Evolutionarily Stable Strategies and Game Dynamics , 1978 .
[19] Cauligi S. Raghavendra,et al. Spray and wait: an efficient routing scheme for intermittently connected mobile networks , 2005, WDTN '05.
[20] Hui Cheng,et al. A routing defense mechanism using evolutionary game theory for Delay Tolerant Networks , 2016, Appl. Soft Comput..
[21] Cauligi S. Raghavendra,et al. Spray and Focus: Efficient Mobility-Assisted Routing for Heterogeneous and Correlated Mobility , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[22] Athanasios V. Vasilakos,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.
[23] X. Vives. Nash equilibrium with strategic complementarities , 1990 .
[24] Wei Peng,et al. Routing Techniques on Delay/Disruption Tolerant Networks: Routing Techniques on Delay/Disruption Tolerant Networks , 2010 .
[25] Jie Wu,et al. Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.
[26] Qinghua Li,et al. Mitigating Routing Misbehavior in Disruption Tolerant Networks , 2012, IEEE Transactions on Information Forensics and Security.
[27] Joel J. P. C. Rodrigues,et al. Enhanced fuzzy logic‐based spray and wait routing protocol for delay tolerant networks , 2016, Int. J. Commun. Syst..