Game theory meets network security and privacy

MH Manshaei, Q Zhu, T Alpcan, T Bacşar… - ACM Computing …, 2013 - dl.acm.org
This survey provides a structured and comprehensive overview of research on security and
privacy in computer and communication networks that use game-theoretic approaches. We …

[图书][B] Game theory for wireless engineers

AB MacKenzie, LA DaSilva - 2022 - books.google.com
The application of mathematical analysis to wireless networks has met with limited success,
due to the complexity of mobility and traffic models, coupled with the dynamic topology and …

A survey on networking games in telecommunications

E Altman, T Boulogne, R El-Azouzi, T Jiménez… - Computers & Operations …, 2006 - Elsevier
In this survey, we summarize different modeling and solution concepts of networking games,
as well as a number of different applications in telecommunications that make use of or can …

Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents

L Anderegg, S Eidenbenz - Proceedings of the 9th annual international …, 2003 - dl.acm.org
We introduce a game-theoretic setting for routing in a mobile ad hoc network that consists of
greedy, selfish agents who accept payments for forwarding data for other agents if the …

TWOACK: preventing selfishness in mobile ad hoc networks

K Balakrishnan, J Deng… - IEEE Wireless …, 2005 - ieeexplore.ieee.org
Mobile ad hoc networks (MANETs) operate on the basic underlying assumption that all
participating nodes fully collaborate in self-organizing functions. However, performing …

Selfish MAC layer misbehavior in wireless networks

P Kyasanur, NH Vaidya - IEEE transactions on mobile …, 2005 - ieeexplore.ieee.org
Wireless medium access control (MAC) protocols such as IEEE 802.11 use distributed
contention resolution mechanisms for sharing the wireless channel. In this environment …

[PDF][PDF] Detection and Handling of MAC Layer Misbehavior in Wireless Networks.

P Kyasanur, NH Vaidya - DSN, 2003 - Citeseer
Selfish hosts in wireless networks that fail to adhere to the MAC protocol may obtain an
unfair share of the channel bandwidth. We present modifications to the IEEE 802.11 backoff …

Modelling cooperation in mobile ad hoc networks: a formal description of selfishness

A Urpi, M Bonuccelli, S Giordano - … in Mobile, Ad Hoc and Wireless …, 2003 - inria.hal.science
The advance in wireless technologies makes now viable to start to develop ad hoc networks.
However, without a mechanism that prevents misbehaviors, these networks could result …

[PDF][PDF] Preventing DoS attacks in wireless sensor networks: A repeated game theory approach.

A Agah, SK Das - Int. J. Netw. Secur., 2007 - Citeseer
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless
sensor networks as a repeated game between an intrusion detector and nodes of a sensor …

[PDF][PDF] A survey on routing metrics

R Baumann, S Heimlicher, M Strasser, A Weibel - TIK report, 2007 - Citeseer
Routing is the key functionality for directing communication over large networks. Optimal
paths are determined based on routing metrics. In this report, we first develop a taxonomy for …