STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Fuzzy linear programming models to solve fuzzy matrix games
Fuzzy Sets and Systems
Algorithmic mechanism design (extended abstract)
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
Towards a taxonomy of intrusion-detection systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
A Cryptographic Solution to a Game Theoretic Problem
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
A delay-tolerant network architecture for challenged internets
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Privacy, economics, and price discrimination on the Internet
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Privacy in electronic commerce and the economics of immediate gratification
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
A game theoretic approach to provide incentive and service differentiation in P2P networks
Proceedings of the joint international conference on Measurement and modeling of computer systems
Rational secret sharing and multiparty computation: extended abstract
STOC '04 Proceedings of the thirty-sixth annual ACM symposium on Theory of computing
Incentive-based modeling and inference of attacker intent, objectives, and strategies
ACM Transactions on Information and System Security (TISSEC)
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks
IEEE Transactions on Dependable and Secure Computing
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing
A Trust-Aware, P2P-Based Overlay for Intrusion Detection
DEXA '06 Proceedings of the 17th International Conference on Database and Expert Systems Applications
A Bayesian game approach for intrusion detection in wireless ad hoc networks
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
Network Software Security and User Incentives
Management Science
Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Policy-based Management: A Historical Perspective
Journal of Network and Systems Management
Secure or insure?: a game-theoretic analysis of information security games
Proceedings of the 17th international conference on World Wide Web
HIDS: Honesty-Rate Based Collaborative Intrusion Detection System for Mobile Ad-Hoc Networks
CISIM '08 Proceedings of the 2008 7th Computer Information Systems and Industrial Management Applications
Security Decision-Making among Interdependent Organizations
CSF '08 Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium
A local mean field analysis of security investments in networks
Proceedings of the 3rd international workshop on Economics of networked systems
Trust Management for Host-Based Collaborative Intrusion Detection
DSOM '08 Proceedings of the 19th IFIP/IEEE international workshop on Distributed Systems: Operations and Management: Managing Large-Scale Service Deployment
Analysis of a mixed-use urban wifi network: when metropolitan becomes neapolitan
Proceedings of the 8th ACM SIGCOMM conference on Internet measurement
Revocation games in ephemeral networks
Proceedings of the 15th ACM conference on Computer and communications security
Security Patch Management: Share the Burden or Share the Damage?
Management Science
Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing
A game theoretical framework on intrusion detection in heterogeneous networks
IEEE Transactions on Information Forensics and Security
The fable of the bees: incentivizing robust revocation decision making in ad hoc networks
Proceedings of the 16th ACM conference on Computer and communications security
On non-cooperative location privacy: a game-theoretic analysis
Proceedings of the 16th ACM conference on Computer and communications security
Robust and scalable trust management for collaborative intrusion detection
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Physical layer security game: how to date a girl with her boyfriend on the same table
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
A game-theoretical approach to incentive design in collaborative intrusion detection network
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Jamming in wireless networks: the case of several jammers
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Uncertainty in the weakest-link security game
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Stochastic games for security in networks with interdependent nodes
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Dynamic Spectrum Access and Management in Cognitive Radio Networks
Dynamic Spectrum Access and Management in Cognitive Radio Networks
Physical layer security: coalitional games for distributed cooperation
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
On the tradeoff between trust and privacy in wireless ad hoc networks
Proceedings of the third ACM conference on Wireless network security
New strategies for revocation in ad-hoc networks
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Bridging game theory and cryptography: recent results and future directions
TCC'08 Proceedings of the 5th conference on Theory of cryptography
Lower bounds on implementing robust and resilient mediators
TCC'08 Proceedings of the 5th conference on Theory of cryptography
Cryptography and game theory: designing protocols for exchanging information
TCC'08 Proceedings of the 5th conference on Theory of cryptography
Maintaining defender's reputation in anomaly detection against insider attacks
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on game theory
Tracking games in mobile networks
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
gPath: a game-theoretic path selection algorithm to protect Tor's anonymity
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
When do firms invest in privacy-preserving technologies?
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
ISPs and ad networks against botnet ad fraud
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Network Security: A Decision and Game-Theoretic Approach
Network Security: A Decision and Game-Theoretic Approach
Adversarial behavior in multi-agent systems
CEEMAS'05 Proceedings of the 4th international Central and Eastern European conference on Multi-Agent Systems and Applications
Real-time risk assessment with network sensors and intrusion detection systems
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Rational secret sharing, revisited
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Rationality and adversarial behavior in multi-party computation
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Indices of power in optimal IDS default configuration: theory and examples
GameSec'11 Proceedings of the Second international conference on Decision and Game Theory for Security
Broadcast channels with confidential messages
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
The Gaussian test channel with an intelligent jammer
IEEE Transactions on Information Theory
Correlated jamming on MIMO Gaussian fading channels
IEEE Transactions on Information Theory
Cognitive radio: brain-empowered wireless communications
IEEE Journal on Selected Areas in Communications
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
IEEE Journal on Selected Areas in Communications
Journal of Computer Security
Hi-index | 0.00 |
This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in addressing different forms of security and privacy problems in computer networks and mobile applications. We organize the presented works in six main categories: security of the physical and MAC layers, security of self-organizing networks, intrusion detection systems, anonymity and privacy, economics of network security, and cryptography. In each category, we identify security problems, players, and game models. We summarize the main results of selected works, such as equilibrium analysis and security mechanism designs. In addition, we provide a discussion on the advantages, drawbacks, and future direction of using game theory in this field. In this survey, our goal is to instill in the reader an enhanced understanding of different research approaches in applying game-theoretic methods to network security. This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking.