A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
A framework for constructing features and models for intrusion detection systems
ACM Transactions on Information and System Security (TISSEC)
Enhancing profiles for anomaly detection using time granularities
Journal of Computer Security
Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks
KMN '02 Proceedings of the IEEE Workshop on Knowledge Media Networking
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
A specification-based intrusion detection system for AODV
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
Intrusion Detection in Sensor Networks: A Non-Cooperative Game Approach
NCA '04 Proceedings of the Network Computing and Applications, Third IEEE International Symposium
Short Paper: A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Intrusion detection for wireless networks
Intrusion detection for wireless networks
A hybrid data mining anomaly detection technique in ad hoc networks
International Journal of Wireless and Mobile Computing
An analytical approach to the study of cooperation in wireless ad hoc networks
IEEE Transactions on Wireless Communications
Game theory models for IEEE 802.11 DCF in wireless ad hoc networks
IEEE Communications Magazine
Cloaking games in location based services
Proceedings of the 2008 ACM workshop on Secure web services
A game theoretical framework on intrusion detection in heterogeneous networks
IEEE Transactions on Information Forensics and Security
Anonymous networking amidst active adversaries
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
The effect of leaders on the consistency of group behaviour
International Journal of Sensor Networks
Security and Communication Networks
A game-theoretic analysis of cooperation in anonymity networks
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Temporal accountability and anonymity in medical sensor networks
Mobile Networks and Applications - Special issue on Wireless and Personal Communications
A game-theoretic approach to anonymous networking
IEEE/ACM Transactions on Networking (TON)
On effective sampling techniques in host-based intrusion detection in tactical MANET
International Journal of Security and Networks
Accountability and Q-Accountable Logging in Wireless Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
In wireless ad hoc networks, although defence strategies such as Intrusion Detection Systems (IDSs) can be deployed at individual nodes, significant constraints are imposed in terms of the energy expenditure of such systems. In this paper, we use a game theoretic framework to analyse the interactions between pairs of attacking/defending nodes, in both static and dynamic contexts, and considering both complete and incomplete information regarding the maliciousness of neighbouring nodes. The static case analysis provides the defender with an overview of the security situation in terms of risk and monitoring cost. A dynamic Bayesian game formulation allows the defender to adjust his belief about his opponent based on his observations and the game history, and consequently to influence the achievable Nash equilibrium for new stage game. A new Bayesian hybrid detection system is proposed for the defender, which balances energy costs and monitoring gains.