2016
DOI: 10.1109/tmc.2015.2505724
|View full text |Cite
|
Sign up to set email alerts
|

Bayesian Mechanisms and Detection Methods for Wireless Network with Malicious Users

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(13 citation statements)
references
References 29 publications
0
13
0
Order By: Relevance
“…The users are demotivated to harm or attack other users because of the high cost. As shown in the simulation results in [5], the additional cost for a malicious user significantly decreases when the degree of maliciousness of the user decreases. The example discussed above shows that the DDoS attack can be simply addressed by pricing without requiring additional hardware and software.…”
Section: A What and Why Economic And Pricing Approachesmentioning
confidence: 74%
See 2 more Smart Citations
“…The users are demotivated to harm or attack other users because of the high cost. As shown in the simulation results in [5], the additional cost for a malicious user significantly decreases when the degree of maliciousness of the user decreases. The example discussed above shows that the DDoS attack can be simply addressed by pricing without requiring additional hardware and software.…”
Section: A What and Why Economic And Pricing Approachesmentioning
confidence: 74%
“…Therefore, setting high resource prices to the compromised users discourages them to spend more powers to perform the attack actions. The Bayesianoptimal pricing model [5] can be adopted to easily achieve the purpose. Specifically, using the pricing model, the resource price for each user is proportional to the probability that the user performs a malicious action.…”
Section: A What and Why Economic And Pricing Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…If the bots are rational, setting high resource prices discourages them to spend more power to perform the attack actions. Behavior-based pricing models such as Bayesian optimal pricing [160] can be adopted to easily achieve this goal.…”
Section: B Security and Privacymentioning
confidence: 99%
“…Considering the fluctuation of wireless network environment, which results in poor communication performance, is vital in the design of WNCSs. 1,2 Additionally, utilizing the inherent nature of "openness" of WNCSs, malicious attackers can destroy communication communities and control systems. 3 Thus, a number of literature focusing on the security of WNCSs has been found in other works [4][5][6][7] and the references therein.…”
Section: Introductionmentioning
confidence: 99%