2014 IEEE International Conference on Communications (ICC) 2014
DOI: 10.1109/icc.2014.6883428
|View full text |Cite
|
Sign up to set email alerts
|

Bayesian mechanisms for wireless network security

Abstract: Strategic users in a wireless network cannot be assumed to follow the network algorithms blindly. Moreover, some of these users could be controlled by powerful Botnets, which aim to use their knowledge about network algorithms to maliciously gain more resources and also to create interference to other users. We consider a scenario; in which a mechanism designer and legitimate users together, in a wireless network, gather probabilistic information about the presence of malicious users and modify their actions a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…The model in [5] is similar to that in [85]. The users as bidders submit bids including their optimal power requests to the base station as the seller.…”
Section: B Distributed Dos (Ddos) Attackmentioning
confidence: 99%
See 3 more Smart Citations
“…The model in [5] is similar to that in [85]. The users as bidders submit bids including their optimal power requests to the base station as the seller.…”
Section: B Distributed Dos (Ddos) Attackmentioning
confidence: 99%
“…To learn private types of users, the authors in [85] assumed that the base station can observe the users in a sufficient time to get probabilistic information of their behaviors. The base station's problem is to find the resource allocation that maximizes the users' social welfare, i.e., the sum of utilities, while preventing the maliciousness of users.…”
Section: Major Approachesmentioning
confidence: 99%
See 2 more Smart Citations
“…A Bayesian network origin encoding technique is established on dynamic and overlapped arithmetic coding that solves the network issues [14]. The Bayesian mechanism contains pricing and auctions and receives the Nash Equilibrium points of the fundamental Bayesian games [15]. The prices and allocations are adapted by applying the Bayesian information.…”
Section: Introductionmentioning
confidence: 99%