LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks
ICDCSW '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
HEAP: A packet authentication scheme for mobile ad hoc networks
Ad Hoc Networks
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
A game theoretical framework on intrusion detection in heterogeneous networks
IEEE Transactions on Information Forensics and Security
Combined Authentication and Quality of Service in Cooperative Communication Networks
EUC '10 Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
Security in mobile ad hoc networks: challenges and solutions
IEEE Wireless Communications
Cooperative communication in wireless networks
IEEE Communications Magazine
Security and privacy of electric vehicles in the smart grid context: problem and solution
Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Hi-index | 0.00 |
Cooperative communication can improve communication quality in wireless communication networks through strategic relay selection. However, wireless cooperative communication networks are vulnerable to the attacks initiated on relays. Although applying authentication protocols can secure cooperative communication when the selected relay is malicious, better system throughput could be obtained without executing authentication protocol when the selected relay is free from attacker's attack. In this paper, a game theoretic approach is proposed to quantitatively analyze the attacking strategies of the attacker who chooses one relay to attack so as to make rational decision on relay selection and extent of applying authentication protocols, which reaches the trade-off between system security requirement and quality of service (QoS) in wireless cooperative communication networks.