Game theory for cyber security and privacy

CT Do, NH Tran, C Hong, CA Kamhoua… - ACM Computing …, 2017 - dl.acm.org
In this survey, we review the existing game-theoretic approaches for cyber security and
privacy issues, categorizing their application into two classes, security and privacy. To show …

Trust computations and trust dynamics in mobile adhoc networks: A survey

K Govindan, P Mohapatra - IEEE Communications Surveys & …, 2011 - ieeexplore.ieee.org
Trust is an important aspect of mobile adhoc networks (MANETs). It enables entities to cope
with uncertainty and uncontrollability caused by the free will of others. Trust computations …

[책][B] Dynamic spectrum access and management in cognitive radio networks

E Hossain, D Niyato, Z Han - 2009 - books.google.com
Are you involved in designing the next generation of wireless networks? With spectrum
becoming an ever scarcer resource, it is critical that new systems utilize all available …

An acknowledgment-based approach for the detection of routing misbehavior in MANETs

K Liu, J Deng, PK Varshney… - IEEE transactions on …, 2007 - ieeexplore.ieee.org
We study routing misbehavior in MANETs (mobile ad hoc networks) in this paper. In general,
routing protocols for MANETs are designed based on the assumption that all participating …

Disruption-tolerant networking: A comprehensive survey on recent developments and persisting challenges

MJ Khabbaz, CM Assi, WF Fawaz - … Communications Surveys & …, 2011 - ieeexplore.ieee.org
Nowadays, wireless networks are witnessing several deployments in various extreme
environments where they suffer from different levels of link disruptions depending on the …

A survey of social-based routing in delay tolerant networks: Positive and negative social effects

Y Zhu, B Xu, X Shi, Y Wang - IEEE Communications Surveys & …, 2012 - ieeexplore.ieee.org
Delay tolerant networks (DTNs) may lack continuous network connectivity. Routing in DTNs
is thus challenging since it must handle network partitioning, long delays, and dynamic …

[PDF][PDF] Using game theory to analyze wireless ad hoc networks.

V Srivastava, JO Neel, AB MacKenzie… - IEEE Commun. Surv …, 2005 - researchgate.net
The application of mathematical analysis to the study of wireless ad hoc networks has met
with limited success due to the complexity of mobility and traffic models, the dynamic …

BAR fault tolerance for cooperative services

AS Aiyer, L Alvisi, A Clement, M Dahlin… - Proceedings of the …, 2005 - dl.acm.org
This paper describes a general approach to constructing cooperative services that span
multiple administrative domains. In such environments, protocols must tolerate both …

A survey of trust and reputation management systems in wireless communications

H Yu, Z Shen, C Miao, C Leung… - Proceedings of the …, 2010 - ieeexplore.ieee.org
Trust is an important concept in human interactions which facilitates the formation and
continued existence of functional human societies. In the first decade of the 21st century …

[책][B] Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing

L Buttyan, JP Hubaux - 2007 - books.google.com
This is the first self-contained text to consider security and non-cooperative behavior in
wireless networks. Major networking trends are analyzed and their implications explained in …