2017
DOI: 10.14429/dsj.67.10051
|View full text |Cite
|
Sign up to set email alerts
|

A Game Theoretic Approach to Modelling Jamming Attacks in Delay Tolerant Networks

Abstract: The delay-tolerant-network (DTN) model is becoming a viable communication alternative to the traditional infrastructure model for military, terrestrial and atypical networks, which are characterised by transmission delay and intermittent network connections. The possibility of limited connectivity and resource scarcity in DTNs make them vulnerable to various cyber-attacks, including interference attacks such as jamming. We study the defence against jamming attacks in a delay tolerant network with two adversari… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 13 publications
0
3
0
1
Order By: Relevance
“…The wargaming process comprises of the identification, defence, response, and recovery phases to a cyberattack in depth. Cyberwargames that use game Theory to model the attackers and defenders are designed by setting up a cyber test-bed to exercise cyberattack scenarios on a network environment [78][79][80] . In the game theoretic framework, two approaches have been used: a probabilistic framework and a bayesian belief framework where the attack and defender try to anticipate the opponent's strategy with complete and incomplete information with learning.…”
Section: Discussionmentioning
confidence: 99%
“…The wargaming process comprises of the identification, defence, response, and recovery phases to a cyberattack in depth. Cyberwargames that use game Theory to model the attackers and defenders are designed by setting up a cyber test-bed to exercise cyberattack scenarios on a network environment [78][79][80] . In the game theoretic framework, two approaches have been used: a probabilistic framework and a bayesian belief framework where the attack and defender try to anticipate the opponent's strategy with complete and incomplete information with learning.…”
Section: Discussionmentioning
confidence: 99%
“…При оптимізації (змішаному цілочисельному програмуванні, дворівневому програмуванні, багатокритеріальній оптимізації, евристичній оптимізації тощо) використовується моделювання для генерування сценаріїв [70−72], верифікації параметрів задачі чи валідації результатів [42, 44, 54, 67, 73−78]. Моделювання частіше використовується у теорії ігор [42,44,70,74,75,79,80].…”
Section: оптимізація критичних інфраструктурunclassified
“…Both of these nodes have limited resources and are given appropriate incentives to choose one of several strategies. Previously, game theory has been used to solve a number of problems occurring in Delay tolerant networks and Opportunistic Networks …”
Section: Related Workmentioning
confidence: 99%