2018
DOI: 10.1007/s11276-018-1713-4
|View full text |Cite
|
Sign up to set email alerts
|

Game theoretic approach of eavesdropping attack in millimeter-wave-based WPANs with directional antennas

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 35 publications
0
4
0
Order By: Relevance
“…The use of game theory together with advanced ML in the database is incomplete. A similar game-theoretic-based approach in the wireless personal network area proposed by Kim 135 to analyze and detect passive eavesdropping attack was studied. In particular, for game eavesdroppers and transmissions, this is an emerging research area.…”
Section: Other Machine Learning Methodsmentioning
confidence: 99%
“…The use of game theory together with advanced ML in the database is incomplete. A similar game-theoretic-based approach in the wireless personal network area proposed by Kim 135 to analyze and detect passive eavesdropping attack was studied. In particular, for game eavesdroppers and transmissions, this is an emerging research area.…”
Section: Other Machine Learning Methodsmentioning
confidence: 99%
“…Tere have been many studies using game theory to analyze the behaviors of hackers and defenders [24][25][26]. Researchers build diferent models for diferent application environments and use game theory for macro analysis [27][28][29][30]. Li et al propose a zero-sum complete information static game model under the network topology graph and proposes a sensitive cost parameter for attacking and defensing [31].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, most of them focus on the scenario with single eavesdropper, such as [12]- [16], [18], [19]. The resource allocation for improving the security of mmWave communications was investigated in two recent works [20] and [21]. However, [20] and [21] focus only on the scenario with a legitimate transmission link, and also ignored the beam training overheads and the inter-beam inference of mmWave communications, while we concentrate on the scenario with multiple legitimate transmission links and multiple eavesdropping attack links as well as considering the beam training overheads and the interbeam inference of mmWave communications, which is more practical and more intractable.…”
Section: Introductionmentioning
confidence: 99%