IEEE International Conference on Communications, 2005. ICC 2005. 2005
DOI: 10.1109/icc.2005.1495019
|View full text |Cite
|
Sign up to set email alerts
|

Preventing DoS attack in sensor networks: a game theoretic approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
69
0

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 58 publications
(69 citation statements)
references
References 11 publications
0
69
0
Order By: Relevance
“…The defender group can choose cooperation strategy or non-cooperation strategy, so the strategy space of defender S D = {C, NC}. In this situation, all the network nodeswill choose non-cooperation strategy after a finite number of gaming [30]. The strategy profile {NC, NC} will be the ESS solution for the game.…”
Section: The Routing Defense Scheme Based On Evolutionary Game Theorymentioning
confidence: 99%
“…The defender group can choose cooperation strategy or non-cooperation strategy, so the strategy space of defender S D = {C, NC}. In this situation, all the network nodeswill choose non-cooperation strategy after a finite number of gaming [30]. The strategy profile {NC, NC} will be the ESS solution for the game.…”
Section: The Routing Defense Scheme Based On Evolutionary Game Theorymentioning
confidence: 99%
“…, No of nodes alive and number of nodes around. The proposed study of Agah et al [35] proposed a protocol IJECE ISSN: 2088-8708 …”
Section: Game Theory Based Techniquesmentioning
confidence: 99%
“…A game theory-based approach to intrusion detection was presented and discussed in [38] and [39] in 2004. In this framework, intrusion-detection is looked at in the form of a 2-player noncooperative nonzero-sum game.…”
Section: Ids For Wireless Sensor Networkmentioning
confidence: 99%