A Game-theoretic Approach to Security and Power Conservation in Wireless Sensor Networks
暂无分享,去创建一个
[1] Afrand Agah,et al. Applying Game Theory in Securing Wireless Sensor Networks by Minimizing Battery Usage , 2014 .
[2] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[3] Yang Yang,et al. Battery recovery aware sensor networks , 2009, 2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.
[4] Shamik Sengupta,et al. A Game Theoretic Framework for Power Control in Wireless Sensor Networks , 2010, IEEE Transactions on Computers.
[5] Sajal K. Das,et al. Preventing DoS attack in sensor networks: a game theoretic approach , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[6] Dave Levin. Punishment in Selfish Wireless Networks : A Game Theoretic Analysis , 2006 .
[7] Petteri Nurmi,et al. Modeling energy constrained routing in selfish ad hoc networks , 2006, GameNets '06.
[8] Stephan Eidenbenz,et al. Equilibria in Topology Control Games for Ad Hoc Networks , 2006, Mob. Networks Appl..
[9] Sajal K. Das,et al. Prevention of DoS Attack in Sensor Networks using Repeated Game Theory , 2006, ICWN.
[10] Paolo Santi,et al. The COMMIT Protocol for Truthful and Cost-Efficient Routing in Ad Hoc Networks with Selfish Nodes , 2008, IEEE Transactions on Mobile Computing.
[11] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[12] Anand Raghunathan,et al. Battery discharge characteristics of wireless sensor nodes: an experimental analysis , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..
[13] Chee-Yee Chong,et al. Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.
[14] Pietro Michiardi,et al. Game theoretic analysis of security in mobile ad hoc networks , 2002 .
[15] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[16] Subramaniam Shamala,et al. Validating Reliability of OMNeT++ in Wireless Networks DoS Attacks: Simulation vs. Testbed , 2011, Int. J. Netw. Secur..
[17] Edward J. Coyle,et al. An energy efficient hierarchical clustering algorithm for wireless sensor networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[18] Stephan Eidenbenz,et al. Incentive-Compatible, Energy-Optimal, and Efficient Ad Hoc Networking in a Selfish Milieu , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[19] Deborah Estrin,et al. An energy-efficient MAC protocol for wireless sensor networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[20] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[21] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[22] Alfredo García,et al. A Game-Theoretic Approach to Efficient Power Management in Sensor Networks , 2008, Oper. Res..
[23] Sirin Tekinay,et al. A survey of game-theoretic approaches in wireless sensor networks , 2008, Comput. Networks.
[24] Pietro Michiardi,et al. Prevention of denial of service attacks and selfishness in mobile ad hoc networks , 2002 .
[25] Chi Ma,et al. Battery-Aware Routing for Streaming Data Transmissions in Wireless Sensor Networks , 2005, 2nd International Conference on Broadband Networks, 2005..
[26] Levente Buttyán,et al. Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - The Static Case , 2003, PWC.
[27] Jean-Pierre Hubaux,et al. Game Theory in Wireless Networks: A Tutorial , 2006 .
[28] Niki Pissinou,et al. Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks , 2011, Int. J. Netw. Secur..
[29] Pietro Michiardi,et al. Simulation-based analysis of security exposures in mobile ad hoc networks , 2002 .
[30] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[31] Sajal K. Das,et al. Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[32] Yanbin Liu,et al. Reputation propagation and agreement in mobile ad-hoc networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[33] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[34] Stan Matwin,et al. Privacy Preserving K-nearest Neighbor Classification , 2005, Int. J. Netw. Secur..