2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN) 2018
DOI: 10.1109/icufn.2018.8436952
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Selfish Backoff Attack in IEEE 802.15.4 CSMA/CA Using Logistic Classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…We assume that the server is able to perfectly detect misbehavior of the stations, although that detection has a cost to the server, in terms of delay in the forwarding of the package and computational resources. Regarding the detection mechanism, there are many possible choices that could be used, such as the ones presented in References [12] or [14].…”
Section: As Nmentioning
confidence: 99%
See 4 more Smart Citations
“…We assume that the server is able to perfectly detect misbehavior of the stations, although that detection has a cost to the server, in terms of delay in the forwarding of the package and computational resources. Regarding the detection mechanism, there are many possible choices that could be used, such as the ones presented in References [12] or [14].…”
Section: As Nmentioning
confidence: 99%
“…In case of using mixed strategies, we take mathematical expectations in Equation (14). V i (w) is called continuation promise.…”
Section: Subgame Perfect Equilibrium Conceptmentioning
confidence: 99%
See 3 more Smart Citations