System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Time synchronization attacks in sensor networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Anomaly intrusion detection in wireless sensor networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Software design patterns for TinyOS
ACM Transactions on Embedded Computing Systems (TECS) - Special Section LCTES'05
Playing for Real: A Text on Game Theory
Playing for Real: A Text on Game Theory
A survey of game-theoretic approaches in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer
SAID: a self-adaptive intrusion detection system in wireless sensor networks
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Detecting selective forwarding attacks in wireless sensor networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Hi-index | 0.00 |
Compromised nodes in a Wireless Sensor Network disrupt its specified normal operation. To identify and isolate such nodes is essential in pervasive computing environments where WSNs have numerous applications. We model a three player non-cooperative game, to study the interactions between an insider and the Intrusion Detection Systems used in a WSN. By solving the game, we locate the Nash equilibria to determine how players should play it. Examining these equilibria, useful suggestions for recommended strategies can be made. Properly selected strategies assist a compromised node's identification and its subsequent isolation.