Game theoretic strategies for an unmanned aerial vehicle network host under DDoS attack

A Mairaj, S Majumder, AY Javaid - … International Conference on …, 2019 - ieeexplore.ieee.org
Game theory involves the mathematical modeling of the strategic interaction between
rational entities. One such example is the interaction between a hacker and the defense …

Game theoretic solution for an Unmanned Aerial Vehicle network host under DDoS attack

A Mairaj, AY Javaid - Computer networks, 2022 - Elsevier
Game theory is being used in cybersecurity to observe different attacks as it can provide a
mathematical representation of the interactions between system admins, hackers, and users …

[PDF][PDF] Honeypot Game Theory against DoS Attack in UAV Cyber.

S Miao, Y Li, Q Pan - Computers, Materials & Continua, 2023 - cdn.techscience.cn
ABSTRACT A space called Unmanned Aerial Vehicle (UAV) cyber is a new environment
where UAV, Ground Control Station (GCS) and business processes are integrated. Denial of …

Prospect theory for enhanced cyber-physical security of drone delivery systems: A network interdiction game

A Sanjab, W Saad, T Başar - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
The use of unmanned aerial vehicles (UAVs) as delivery systems of online goods is rapidly
becoming a global norm, as corroborated by Amazon's “Prime Air” and Google's “Project …

[HTML][HTML] Pursuit-evasion games: a tractable framework for antijamming games in aerial attacks

J Parras, S Zazo, J Del Val, J Zazo… - EURASIP Journal on …, 2017 - Springer
We solve a communication problem between a UAV and a set of receivers, in the presence
of a jamming UAV, using differential game theory tools. We propose a new approach in …

Optimal DDoS Attack Strategy for Cyber–Physical Systems: A Multiattacker–Defender Game

H Zhang, J Yao, Z Wang, S Gao, H Yan - IEEE Systems Journal, 2024 - ieeexplore.ieee.org
This article studies the optimal distributed denial-of-service attack strategy for cyber–
physical systems with multiple attackers and multiple defenders. An advanced attack …

Game theoretic modeling of gray hole attacks in wireless ad hoc networks

CK Doshi, S Sankaranarayanan, VB Lakshman… - Proceedings of the …, 2017 - Springer
Wireless ad hoc networks rely on the cooperation of participating nodes to undertake
activities such as routing. Malicious nodes participating in the network may refuse to forward …

Game-theoretic analysis of an aerial jamming attack on a UAV communication network

S Bhattacharya, T Başar - proceedings of the 2010 American …, 2010 - ieeexplore.ieee.org
In this paper, we consider a differential game theoretic approach to compute optimal
strategies by a team of UAVs to evade the attack of an aerial jammer on the communication …

A survey of game theory in unmanned aerial vehicles communications

ME Mkiramweni, C Yang, J Li… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) can be deployed as wireless relays or aerial base
stations to improve network connectivity and coverage in cellular networks. UAVs can also …

Underwater jamming attacks as incomplete information games

F Chiariotti, A Signori, F Campagnaro… - IEEE INFOCOM 2020 …, 2020 - ieeexplore.ieee.org
Autonomous Underwater Vehicles (AUVs) have several fundamental civilian and military
applications, and Denial of Service (DoS) attacks against their communications are a …