Applications of repeated games in wireless networks: A survey
A repeated game is an effective tool to model interactions and conflicts for players aiming to
achieve their objectives in a long-term basis. Contrary to static noncooperative games that …
achieve their objectives in a long-term basis. Contrary to static noncooperative games that …
Detecting noncooperation nodes mechanisms in wireless networks: a survey
S Nobahary, H Gharaee Garakani… - Security and …, 2022 - Wiley Online Library
Wireless networks face security problems compared with traditional wired networks. In
wireless networks such as wireless sensor networks (WSNs), mobile ad hoc networks …
wireless networks such as wireless sensor networks (WSNs), mobile ad hoc networks …
Selfish node detection and low cost data transmission in MANET using game theory
D Das, K Majumder, A Dasgupta - Procedia Computer Science, 2015 - Elsevier
Abstract Mobile Ad hoc Network (MANET) is infrastructure less, dynamic, decentralized
network of wireless mobile nodes. Although MANET is very much useful but it suffers from …
network of wireless mobile nodes. Although MANET is very much useful but it suffers from …
Existence of dumb nodes in stationary wireless sensor networks
Wireless sensor networks (WSNs), which are typically autonomous and unattended, require
energy-efficient and fault-tolerant protocols to maximize the network lifetime and operations …
energy-efficient and fault-tolerant protocols to maximize the network lifetime and operations …
Controlling cascading failures in interdependent networks under incomplete knowledge
DZ Tootaghaj, N Bartolini… - 2017 IEEE 36th …, 2017 - ieeexplore.ieee.org
Vulnerability due to inter-connectivity of multiple networks has been observed in many
complex networks. Previous works mainly focused on robust network design and on …
complex networks. Previous works mainly focused on robust network design and on …
Private identification, authentication and key agreement protocol with security mode setup
Identification, authentication and key agreement protocol of UMTS networks with security
mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS …
mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS …
Parsimonious tomography: Optimizing cost-identifiability trade-off for probing-based network monitoring
Network tomography using end-to-end probes provides a powerful tool for monitoring the
performance of internal network elements. However, active probing can generate …
performance of internal network elements. However, active probing can generate …
Network recovery from massive failures under uncertain knowledge of damages
This paper addresses progressive network recovery under uncertain knowledge of
damages. We formulate the problem as a mixed integer linear programming (MILP), and …
damages. We formulate the problem as a mixed integer linear programming (MILP), and …
A game-theory based secure routing mechanism in mobile ad hoc network
D Das, K Majumder, A Dasgupta - … International Conference on …, 2016 - ieeexplore.ieee.org
Mobile Ad hoc Network (MANET) is an infrastructure less, decentralized, dynamic network
consisting of wireless mobile nodes that communicate with each other without any …
consisting of wireless mobile nodes that communicate with each other without any …
A new fault tolerant routing algorithm for advance irregular augmented shuffle exchange network
VP Bhardwaj - 2012 UKSim 14th International Conference …, 2012 - ieeexplore.ieee.org
Interconnection Network is a significant component in parallel processing system (PPS).
Multistage interconnection network (MIN) plays a vital role in order to design efficient PPS. In …
Multistage interconnection network (MIN) plays a vital role in order to design efficient PPS. In …