2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering 2013
DOI: 10.1109/icprime.2013.6496490
|View full text |Cite
|
Sign up to set email alerts
|

Modeling intrusion detection in mobile ad hoc networks as a non cooperative game

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…The system model incorporated a novel intrusion detection mechanism where actions between a pair of the attacker and regular nodes are considered as a noncooperative and non-zero game. Authors in [14] also proposed a similar approach to defend against maximum possible lethal security threats in MANET. The study of authors in [15] also directed their research towards cross-layer optimization.…”
Section: A Evolutionary Game Theoretical Conceptmentioning
confidence: 99%
“…The system model incorporated a novel intrusion detection mechanism where actions between a pair of the attacker and regular nodes are considered as a noncooperative and non-zero game. Authors in [14] also proposed a similar approach to defend against maximum possible lethal security threats in MANET. The study of authors in [15] also directed their research towards cross-layer optimization.…”
Section: A Evolutionary Game Theoretical Conceptmentioning
confidence: 99%
“…Such a selfish user may cooperate in their own interest to improve their performance and try to launch the SSNC attack. Several game theoretic solutions have been previously proposed for adhoc network (Buttyan and Hubaux, 2000;Paramasiva and Pitchai, 2013;Poongothai and Jayarajan, 2008;Wei and Liu, 2007;Zhong et al, 2003) and few game theory based solutions for non-cooperative SUs have been proposed in CRNs (Hongjoun et al, 2013;Kondareddy et al, 2011;Shui et al, 2012;Song and Zhang, 2009;Wang et al, 2010;Wei et al, 2012). Game theory serves as a proper tool that can analyse situations involving conflicting interests among different opposing users.…”
Section: Related Workmentioning
confidence: 99%
“…A cooperative game is played between nodes who have mutual relationship with each other while the noncooperative game is played between nodes that do not seem to coexist mutually. There have been several efforts on using noncooperative games to model security in wireless networks [9][10][11][12]. To the best of our knowledge, little work has been done in using cooperative or coalitional games to ensure security in MANETs.…”
Section: Introductionmentioning
confidence: 99%
“…9) end if (10) if refuses to share its transmission rate then (11) compute reputation value according to (12) , update its reputation accordingly. We define a good behavior as the timely broadcast of transmission rate and misbehavior as refusal to broadcast transmission rate at any time slot.…”
mentioning
confidence: 99%
See 1 more Smart Citation