作者
Mohammed-Alamine El Houssaini, Abdessadek Aaroud, Ali El Hore, Jalel Ben-Othman
发表日期
2017
研讨会论文
Ubiquitous Networking: Third International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017, Revised Selected Papers 3
页码范围
38-47
出版商
Springer International Publishing
简介
In recent years, mobile ad hoc networks are invading more and more our daily lives. Indeed, several persons are linked daily to ad hoc networks, which aim to exchange data via smartphones, computers, or tablets. A mobile ad hoc network is a group of mobile stations equipped with wireless transmitters/receivers without fixed infrastructure use or centralized administration. In this sense, the network can be seen as a random graph due to the motion of nodes. The change of the network topology based on the time when nodes move or adjust their transmission and reception parameters. The design of these networks is characterized by its vulnerability to denial of service (DOS) attacks such as the greedy behavior (MAC layer misbehavior). In this paper, we formalized the reaction against this malicious behavior of the MAC layer by game theory. We have developed a model in the extensive form of our …
引用总数
2019202020212022202312
学术搜索中的文章
MA El Houssaini, A Aaroud, AE Hore, J Ben-Othman - … Networking: Third International Symposium, UNet 2017 …, 2017