2017
DOI: 10.1109/comst.2017.2732462
|View full text |Cite
|
Sign up to set email alerts
|

Applications of Economic and Pricing Models for Wireless Network Security: A Survey

Abstract: Abstract-This paper provides a comprehensive literature review on applications of economic and pricing theory to security issues in wireless networks. Unlike wireline networks, the broadcast nature and the highly dynamic change of network environments pose a number of nontrivial challenges to security design in wireless networks. While the security issues have not been completely solved by traditional or system-based solutions, economic and pricing models recently were employed as one efficient solution to dis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0
5

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 41 publications
(25 citation statements)
references
References 143 publications
(259 reference statements)
0
20
0
5
Order By: Relevance
“…Auction is an efficient way of allocating resources to buyers which value the resources the most. A number of auctions and their descriptions can be found in [26] and [19]. The following briefly presents the major auctions used in this survey.…”
Section: Auctionmentioning
confidence: 99%
See 1 more Smart Citation
“…Auction is an efficient way of allocating resources to buyers which value the resources the most. A number of auctions and their descriptions can be found in [26] and [19]. The following briefly presents the major auctions used in this survey.…”
Section: Auctionmentioning
confidence: 99%
“…They thus have computation burden to both the legitimate users and the intended networks which are undesirable for 5G low-power network infrastructures. Alternatively, economic and pricing models can provide distributed solutions which maximize the secrecy capacity for the legitimate communication links without requiring additional secure channels for key exchanges [19].…”
Section: B Security and Privacymentioning
confidence: 99%
“…The study has constructed a lightweight protocol along with digital signature in order to identify the malicious nodes. Luong et al [25] have presented a review work to emphasize about the cost modeling practices adopted towards securing wireless network in presence of majority of the fatal attacks. Umar et al [26] have discussed about the security problems connected with using cross layer approach in sensor network.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, a mechanism is required to incentivize users to report truthfully. For the UCP, a common pricing mechanism, i.e., dual pricing [24], [38]- [42], will be studied in details.…”
Section: B the User-centric Problem (Ucp)mentioning
confidence: 99%
“…A common pricing mechanism for distributed solution finding in the literature is dual pricing [24], [38] - [42], which interprets and applies the dual variable λ in the aforementioned distributed optimization procedure as a per-unit price. Equivalently, t i = f t (x i ) = −λx i in (4).…”
Section: Mechanism and Incentive Compatibilitymentioning
confidence: 99%