Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow the network protocol or not. While providing scalability benefits, this degrades the performance, which is compounded by the potential presence of Malicious Users. In general, these users are trying to disrupt the operation of the network, and prevent the legitimate users from achieving their objectives. More specifically, they could try to break the connectivity of the network, or waste the resources of the legitimate users. In this work we use game theory to examine the effect of Malicious Users. All users are modeled as payoff-maximizing strategic agents. A simple...
Over the last years, game theory has provided great insights into the behavior of distributed system...
Security breaches and attacks are critical problems in today’s networking. A key-point is that the s...
Ad hoc and peer-to-peer networks sometimes operate as voluntary resource sharing networks, relying o...
Decentralized and unstructured networks are becoming more prevalent today (e.g. ad hoc networks). Li...
Ad hoc network users are resource constrained: Before transmitting data, they have to take into acco...
If a network is to operate successfully, its users need to collaborate. Collaboration takes the form...
This paper studies the effects of and countermeasures against adversarial behavior in network resour...
CSMA/CA protocols rely on the random deferment of packet transmissions. Like most other protocols, C...
This research involves the design, development, and theoretical demonstration of models resulting in...
Identification and isolation of malicious nodes in a distributed system is a challenging problem. Th...
Identification and isolation of malicious nodes in a distributed system is a challenging problem. Th...
In this paper, we use game theory to study the interactions between a malicious node and a regular n...
We study the interactions among self-interested users of network resources in the context of congest...
In a distributed wireless system, such as an ad hoc network, multiple nodes behave cooperatively tow...
UnrestrictedIn emerging self-organizing wireless networks, each device is controlled by a potentiall...
Over the last years, game theory has provided great insights into the behavior of distributed system...
Security breaches and attacks are critical problems in today’s networking. A key-point is that the s...
Ad hoc and peer-to-peer networks sometimes operate as voluntary resource sharing networks, relying o...
Decentralized and unstructured networks are becoming more prevalent today (e.g. ad hoc networks). Li...
Ad hoc network users are resource constrained: Before transmitting data, they have to take into acco...
If a network is to operate successfully, its users need to collaborate. Collaboration takes the form...
This paper studies the effects of and countermeasures against adversarial behavior in network resour...
CSMA/CA protocols rely on the random deferment of packet transmissions. Like most other protocols, C...
This research involves the design, development, and theoretical demonstration of models resulting in...
Identification and isolation of malicious nodes in a distributed system is a challenging problem. Th...
Identification and isolation of malicious nodes in a distributed system is a challenging problem. Th...
In this paper, we use game theory to study the interactions between a malicious node and a regular n...
We study the interactions among self-interested users of network resources in the context of congest...
In a distributed wireless system, such as an ad hoc network, multiple nodes behave cooperatively tow...
UnrestrictedIn emerging self-organizing wireless networks, each device is controlled by a potentiall...
Over the last years, game theory has provided great insights into the behavior of distributed system...
Security breaches and attacks are critical problems in today’s networking. A key-point is that the s...
Ad hoc and peer-to-peer networks sometimes operate as voluntary resource sharing networks, relying o...