Game theory for cyber security and privacy

CT Do, NH Tran, C Hong, CA Kamhoua… - ACM Computing …, 2017 - dl.acm.org
In this survey, we review the existing game-theoretic approaches for cyber security and
privacy issues, categorizing their application into two classes, security and privacy. To show …

A survey on trust management for mobile ad hoc networks

JH Cho, A Swami, R Chen - IEEE communications surveys & …, 2010 - ieeexplore.ieee.org
Managing trust in a distributed Mobile Ad Hoc Network (MANET) is challenging when
collaboration or cooperation is critical to achieving mission and system goals such as …

Secure routing in wireless sensor networks: Attacks and countermeasures

C Karlof, D Wagner - Ad hoc networks, 2003 - Elsevier
We consider routing security in wireless sensor networks. Many sensor network routing
protocols have been proposed, but none of them have been designed with security as a …

Performance analysis of the CONFIDANT protocol

S Buchegger, JY Le Boudec - Proceedings of the 3rd ACM international …, 2002 - dl.acm.org
Mobile ad-hoc networking works properly only if the participating nodes cooperate in routing
and forwarding. However, it may be advantageous for individual nodes not to cooperate. We …

Topology Control in Wireless Ad Hoc and Sensor Networks

P Santi - WILEY google schola, 2005 - Wiley Online Library
Topology Control (TC) is one of the most important techniques used in wireless ad hoc and
sensor networks to reduce energy consumption (which is essential to extend the network …

Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks

S Zhong, J Chen, YR Yang - IEEE INFOCOM 2003. Twenty …, 2003 - ieeexplore.ieee.org
Mobile ad hoc networking has been an active research area for several years. How to
stimulate cooperation among selfish mobile nodes, however, is not well addressed yet. In …

Sensor network security: a survey

X Chen, K Makki, K Yen… - … surveys & tutorials, 2009 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense,
collect, and disseminate information in many types of applications. As sensor networks …

A survey of attacks and countermeasures in mobile ad hoc networks

B Wu, J Chen, J Wu, M Cardei - Wireless network security, 2007 - Springer
Security is an essential service for wired and wireless network communications. The
success of mobile ad hoc network (MANET) will depend on people's confidence in its …

Vehicular networks and the future of the mobile internet

M Gerla, L Kleinrock - Computer Networks, 2011 - Elsevier
The first DARPA experiment with wireless mobile Internet–the Packet Radio Network or
PRNET–was completely independent of the infrastructure. This model was consistent with …

A survey of secure mobile ad hoc routing protocols

L Abusalah, A Khokhar… - … communications surveys & …, 2009 - ieeexplore.ieee.org
Several routing protocols have been proposed in recent years for possible deployment of
mobile ad hoc networks (MANETs) in military, government and commercial applications. In …