Proceedings of the 11th EAI International Conference on Mobile Multimedia Communications 2018
DOI: 10.4108/eai.21-6-2018.2277054
|View full text |Cite
|
Sign up to set email alerts
|

An Intrusion Detection Based on Bayesian Game Theory for UAV Network

Abstract: Unmanned aerial vehicles (UAVs) have enormous potential in public, civil and military fields, so the security of UAV networks is attracting increasing people's attention. The existing schemes to network intrusion detection have two main limitations: a high false alarm rate and computational overhead. In this paper, aiming at the problem of UAV network security, an intrusion detection scheme based on Bayesian game theory is proposed. Bayesian game means that game participants do not have complete information on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…When looking more specifically at Sybil attack detection for FANETs, to the best of our knowledge, there are currently no survey papers that discuss this topic. Nevertheless, we did find a limited number of existing research works in this area, including de Melo et al [29], Sun et al [10] and Walia et al [30], details of which are summarized in the following paragraphs. Note that none of these schemes operate on pure use of physical layer characteristics of the radio signals.…”
Section: B Sybil Attack Detection In Ioftmentioning
confidence: 99%
See 2 more Smart Citations
“…When looking more specifically at Sybil attack detection for FANETs, to the best of our knowledge, there are currently no survey papers that discuss this topic. Nevertheless, we did find a limited number of existing research works in this area, including de Melo et al [29], Sun et al [10] and Walia et al [30], details of which are summarized in the following paragraphs. Note that none of these schemes operate on pure use of physical layer characteristics of the radio signals.…”
Section: B Sybil Attack Detection In Ioftmentioning
confidence: 99%
“…In Sun et al [10], a Bayesian Nash equilibrium game theorybased intrusion detection scheme is proposed, which can detect Sybil attacks among other attack types. The game is between the intrusion detection nodes and the attacking nodes, with each side strategizing to maximize their profits.…”
Section: B Sybil Attack Detection In Ioftmentioning
confidence: 99%
See 1 more Smart Citation
“…The game can either be static or dynamic. Various MAS security can be naturally modeled through game theory [102], [103], [104], [105], [106], [107], [108], [109], [110].…”
Section: Game Theorymentioning
confidence: 99%
“…For example, the authors of [5] developed a real-time resilient method based on the communication connectivity of multi-UAV systems. The authors of [6] proposed an intrusion detection scheme based on the data exchanges to improve the security resilience of the UAV network. Moreover, the authors of [7] developed the resilient algorithms for localization, gathering, and network configurations that highly depend on the communication connectivity of the USNET.…”
Section: Introductionmentioning
confidence: 99%