In wireless ad hoc networks, although defense strategies such as intrusion detection systems (IDSs) can be deployed at each mobile node, significant constraints are imposed in terms of the energy expenditure of such systems. In this paper, we propose a game theoretic framework to analyze the interactions between pairs of attacking/defending nodes using a Bayesian formulation. We study the achievable Nash equilibrium for the attacker/defender game in both static and dynamic scenarios. The dynamic Bayesian game is a more realistic model, since it allows the defender to consistently update his belief on his opponent’s maliciousness as the game evolves. A new Bayesian hybrid detection approach is suggested for the defender, in which a lightweig...
Mobile ad hoc networks (MANETs) are self-configuring infrastructureless dynamic wireless networks in...
AbstractPresent Intrusion Detection Systems (IDSs) for MANETs require continuous monitoring which le...
Jamming may become a serious threat in Internet of Things networks of battery-powered nodes, as atta...
Identification and isolation of attackers in a distributed system is a challenging problem. This pro...
Identification and isolation of attackers in a distributed system is a challenging problem. This pro...
Identification and isolation of malicious nodes in a distributed system is a challenging problem. Th...
Identification and isolation of malicious nodes in a distributed system is a challenging problem. Th...
Identification and isolation of malicious nodes in a distributed system is a challenging problem. Th...
Abstract—In mobile ad hoc networks (MANETs), nodes can move freely. Besides conducting attacks to ma...
AbstractPresent Intrusion Detection Systems (IDSs) for MANETs require continuous monitoring which le...
International audienceIn this paper, we propose a game theoretic framework for distributed intrusion...
In this paper, we use game theory to study the interactions between a malicious node and a regular n...
In this paper, we use game theory to study the interactions between a malicious node and a regular n...
Ubiquitous Computing and Internet of Things (IoT) are extremely popular in recent age and therefore ...
AbstractAs Wireless Sensor Networks (WSNs) become increasingly popular, it is necessary to require I...
Mobile ad hoc networks (MANETs) are self-configuring infrastructureless dynamic wireless networks in...
AbstractPresent Intrusion Detection Systems (IDSs) for MANETs require continuous monitoring which le...
Jamming may become a serious threat in Internet of Things networks of battery-powered nodes, as atta...
Identification and isolation of attackers in a distributed system is a challenging problem. This pro...
Identification and isolation of attackers in a distributed system is a challenging problem. This pro...
Identification and isolation of malicious nodes in a distributed system is a challenging problem. Th...
Identification and isolation of malicious nodes in a distributed system is a challenging problem. Th...
Identification and isolation of malicious nodes in a distributed system is a challenging problem. Th...
Abstract—In mobile ad hoc networks (MANETs), nodes can move freely. Besides conducting attacks to ma...
AbstractPresent Intrusion Detection Systems (IDSs) for MANETs require continuous monitoring which le...
International audienceIn this paper, we propose a game theoretic framework for distributed intrusion...
In this paper, we use game theory to study the interactions between a malicious node and a regular n...
In this paper, we use game theory to study the interactions between a malicious node and a regular n...
Ubiquitous Computing and Internet of Things (IoT) are extremely popular in recent age and therefore ...
AbstractAs Wireless Sensor Networks (WSNs) become increasingly popular, it is necessary to require I...
Mobile ad hoc networks (MANETs) are self-configuring infrastructureless dynamic wireless networks in...
AbstractPresent Intrusion Detection Systems (IDSs) for MANETs require continuous monitoring which le...
Jamming may become a serious threat in Internet of Things networks of battery-powered nodes, as atta...