2009 International Conference on Game Theory for Networks 2009
DOI: 10.1109/gamenets.2009.5137448
|View full text |Cite
|
Sign up to set email alerts
|

Jamming in wireless networks: The case of several jammers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
4
2

Relationship

1
9

Authors

Journals

citations
Cited by 52 publications
(25 citation statements)
references
References 6 publications
0
25
0
Order By: Relevance
“…The application of game theory to wireless networks is a relatively new area. In [Altman et al 2009], the authors consider the case of several jammers in wireless networks. The quality of communication is measured by the total signal to interference-plus-noise ratio (SINR) given by…”
Section: Jammingmentioning
confidence: 99%
“…The application of game theory to wireless networks is a relatively new area. In [Altman et al 2009], the authors consider the case of several jammers in wireless networks. The quality of communication is measured by the total signal to interference-plus-noise ratio (SINR) given by…”
Section: Jammingmentioning
confidence: 99%
“…A goal for our future investigation, of course, is to investigate the non-linearized detection probability. Also, since our investigation showed that the optimal scanning essentially depends on the Invader's characteristics, we intend to extend our model to the case of incomplete information on the characteristics as well as to multi-scanner [5], [7] or multi-invader systems [8].…”
Section: Discussionmentioning
confidence: 99%
“…There are some channel access games which take security issues into consideration. However, most of these game-theoretic models analyze the interactions between pairs of jammers and communicating nodes or between pairs of jammers and detecting nodes when an intrusion detection system (IDS) is deployed [69]- [70]. A few researches such as those in [71]- [73] formulate games between jammers and communicating nodes in order to analyze equilibrium points as defense strategies against jamming attacks.…”
Section: B Open Research Issuesmentioning
confidence: 99%