Applications of repeated games in wireless networks: A survey

DT Hoang, X Lu, D Niyato, P Wang… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
A repeated game is an effective tool to model interactions and conflicts for players aiming to
achieve their objectives in a long-term basis. Contrary to static noncooperative games that …

Detecting noncooperation nodes mechanisms in wireless networks: a survey

S Nobahary, H Gharaee Garakani… - Security and …, 2022 - Wiley Online Library
Wireless networks face security problems compared with traditional wired networks. In
wireless networks such as wireless sensor networks (WSNs), mobile ad hoc networks …

Selfish node detection and low cost data transmission in MANET using game theory

D Das, K Majumder, A Dasgupta - Procedia Computer Science, 2015 - Elsevier
Abstract Mobile Ad hoc Network (MANET) is infrastructure less, dynamic, decentralized
network of wireless mobile nodes. Although MANET is very much useful but it suffers from …

Existence of dumb nodes in stationary wireless sensor networks

S Misra, P Kar, A Roy, MS Obaidat - Journal of Systems and Software, 2014 - Elsevier
Wireless sensor networks (WSNs), which are typically autonomous and unattended, require
energy-efficient and fault-tolerant protocols to maximize the network lifetime and operations …

Controlling cascading failures in interdependent networks under incomplete knowledge

DZ Tootaghaj, N Bartolini… - 2017 IEEE 36th …, 2017 - ieeexplore.ieee.org
Vulnerability due to inter-connectivity of multiple networks has been observed in many
complex networks. Previous works mainly focused on robust network design and on …

Private identification, authentication and key agreement protocol with security mode setup

F Farhat, S Salimi, A Salahi - Cryptology ePrint Archive, 2011 - eprint.iacr.org
Identification, authentication and key agreement protocol of UMTS networks with security
mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS …

Parsimonious tomography: Optimizing cost-identifiability trade-off for probing-based network monitoring

DZ Tootaghaj, T He, T La Porta - ACM SIGMETRICS Performance …, 2018 - dl.acm.org
Network tomography using end-to-end probes provides a powerful tool for monitoring the
performance of internal network elements. However, active probing can generate …

Network recovery from massive failures under uncertain knowledge of damages

DZ Tootaghaj, H Khamfroush, N Bartolini… - … IFIP Networking) and …, 2017 - ieeexplore.ieee.org
This paper addresses progressive network recovery under uncertain knowledge of
damages. We formulate the problem as a mixed integer linear programming (MILP), and …

A game-theory based secure routing mechanism in mobile ad hoc network

D Das, K Majumder, A Dasgupta - … International Conference on …, 2016 - ieeexplore.ieee.org
Mobile Ad hoc Network (MANET) is an infrastructure less, decentralized, dynamic network
consisting of wireless mobile nodes that communicate with each other without any …

A new fault tolerant routing algorithm for advance irregular augmented shuffle exchange network

VP Bhardwaj - 2012 UKSim 14th International Conference …, 2012 - ieeexplore.ieee.org
Interconnection Network is a significant component in parallel processing system (PPS).
Multistage interconnection network (MIN) plays a vital role in order to design efficient PPS. In …