A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks
KMN '02 Proceedings of the IEEE Workshop on Knowledge Media Networking
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Proceedings of the 10th ACM conference on Computer and communications security
A specification-based intrusion detection system for AODV
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Intrusion Detection in Sensor Networks: A Non-Cooperative Game Approach
NCA '04 Proceedings of the Network Computing and Applications, Third IEEE International Symposium
Short Paper: A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
An analytical approach to the study of cooperation in wireless ad hoc networks
IEEE Transactions on Wireless Communications
Game theory models for IEEE 802.11 DCF in wireless ad hoc networks
IEEE Communications Magazine
A game-theoretic intrusion detection model for mobile ad hoc networks
Computer Communications
Cloaking games in location based services
Proceedings of the 2008 ACM workshop on Secure web services
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Coexistence with malicious nodes: a game theoretic approach
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
A game-theoretical approach to incentive design in collaborative intrusion detection network
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Stochastic games for security in networks with interdependent nodes
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
A Secure Mechanism Design-Based and Game Theoretical Model for MANETs
Mobile Networks and Applications
Bayesian-based game theoretic model to guarantee cooperativeness in hybrid RF/FSO mesh networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Security games with incomplete information
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Maintaining defender's reputation in anomaly detection against insider attacks
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on game theory
Attack and flee: game-theory-based analysis on interactions among nodes in MANETs
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on game theory
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
gPath: a game-theoretic path selection algorithm to protect Tor's anonymity
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Towards a game theoretic authorisation model
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Uncertainty in interdependent security games
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Wireless Personal Communications: An International Journal
A cross-layer game for energy-efficient jamming detection in ad hoc networks
Security and Communication Networks
Security Through Collaboration and Trust in MANETs
Mobile Networks and Applications
QoS2: a framework for integrating quality of security with quality of service
Security and Communication Networks
Mobile Agent Based Network Defense System in Enterprise Network
International Journal of Handheld Computing Research
Game theory meets network security and privacy
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
In wireless ad hoc networks, although defense strategies such as intrusion detection systems (IDSs) can be deployed at each mobile node, significant constraints are imposed in terms of the energy expenditure of such systems. In this paper, we propose a game theoretic framework to analyze the interactions between pairs of attacking/defending nodes using a Bayesian formulation. We study the achievable Nash equilibrium for the attacker/defender game in both static and dynamic scenarios. The dynamic Bayesian game is a more realistic model, since it allows the defender to consistently update his belief on his opponent's maliciousness as the game evolves. A new Bayesian hybrid detection approach is suggested for the defender, in which a lightweight monitoring system is used to estimate his opponent's actions, and a heavyweight monitoring system acts as a last resort of defense. We show that the dynamic game produces energy-efficient monitoring strategies for the defender, while improving the overall hybrid detection power.