Game theory for cyber security and privacy
In this survey, we review the existing game-theoretic approaches for cyber security and
privacy issues, categorizing their application into two classes, security and privacy. To show …
privacy issues, categorizing their application into two classes, security and privacy. To show …
A survey on trust management for mobile ad hoc networks
Managing trust in a distributed Mobile Ad Hoc Network (MANET) is challenging when
collaboration or cooperation is critical to achieving mission and system goals such as …
collaboration or cooperation is critical to achieving mission and system goals such as …
Secure routing in wireless sensor networks: Attacks and countermeasures
C Karlof, D Wagner - Ad hoc networks, 2003 - Elsevier
We consider routing security in wireless sensor networks. Many sensor network routing
protocols have been proposed, but none of them have been designed with security as a …
protocols have been proposed, but none of them have been designed with security as a …
Performance analysis of the CONFIDANT protocol
Mobile ad-hoc networking works properly only if the participating nodes cooperate in routing
and forwarding. However, it may be advantageous for individual nodes not to cooperate. We …
and forwarding. However, it may be advantageous for individual nodes not to cooperate. We …
Topology Control in Wireless Ad Hoc and Sensor Networks
P Santi - WILEY google schola, 2005 - Wiley Online Library
Topology Control (TC) is one of the most important techniques used in wireless ad hoc and
sensor networks to reduce energy consumption (which is essential to extend the network …
sensor networks to reduce energy consumption (which is essential to extend the network …
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
Mobile ad hoc networking has been an active research area for several years. How to
stimulate cooperation among selfish mobile nodes, however, is not well addressed yet. In …
stimulate cooperation among selfish mobile nodes, however, is not well addressed yet. In …
Sensor network security: a survey
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense,
collect, and disseminate information in many types of applications. As sensor networks …
collect, and disseminate information in many types of applications. As sensor networks …
A survey of attacks and countermeasures in mobile ad hoc networks
Security is an essential service for wired and wireless network communications. The
success of mobile ad hoc network (MANET) will depend on people's confidence in its …
success of mobile ad hoc network (MANET) will depend on people's confidence in its …
Vehicular networks and the future of the mobile internet
M Gerla, L Kleinrock - Computer Networks, 2011 - Elsevier
The first DARPA experiment with wireless mobile Internet–the Packet Radio Network or
PRNET–was completely independent of the infrastructure. This model was consistent with …
PRNET–was completely independent of the infrastructure. This model was consistent with …
A survey of secure mobile ad hoc routing protocols
L Abusalah, A Khokhar… - … communications surveys & …, 2009 - ieeexplore.ieee.org
Several routing protocols have been proposed in recent years for possible deployment of
mobile ad hoc networks (MANETs) in military, government and commercial applications. In …
mobile ad hoc networks (MANETs) in military, government and commercial applications. In …