2011
DOI: 10.1016/j.camwa.2011.07.027
|View full text |Cite
|
Sign up to set email alerts
|

Signaling game based strategy of intrusion detection in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
40
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 57 publications
(40 citation statements)
references
References 13 publications
0
40
0
Order By: Relevance
“…is a population that is composed of a very large number of individuals (sensor nodes in WSNs); (2) is the set of individuals who are in the same population ; (3) is the set of strategies, and = { 1 , 2 } = { , }; (4) is a payoff matrix that is formed from the utilities of the game between the two individuals, and its value is shown in Table 5.…”
Section: Both Interactive Nodes Choose the Strategy Distrustmentioning
confidence: 99%
See 1 more Smart Citation
“…is a population that is composed of a very large number of individuals (sensor nodes in WSNs); (2) is the set of individuals who are in the same population ; (3) is the set of strategies, and = { 1 , 2 } = { , }; (4) is a payoff matrix that is formed from the utilities of the game between the two individuals, and its value is shown in Table 5.…”
Section: Both Interactive Nodes Choose the Strategy Distrustmentioning
confidence: 99%
“…Similar to any computer-related environment, security in WSNs is considered to be nonfunctional but an essential requirement that keeps the complex system available and reliable [2]. In recent years, in addition to the traditional cryptography-based network security technology, trust-based security mechanisms have gradually attracted more attention from academia and industry.…”
Section: Introductionmentioning
confidence: 99%
“…Cluster was studied in [4] and [5] to describe a group of nodes, where a leader node was elected to be engaged in the intrusion detection service on behalf of the whole cluster. A Bayesian game model was established in [5], [6] and [7]. Furthermore, the authors of [6] estimated the behavior between attacker and IDS (intrusion detection system) by synthesizing static and dynamic Bayesian game, which was summarized into a Bayesian hybrid detection approach.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, the authors of [6] estimated the behavior between attacker and IDS (intrusion detection system) by synthesizing static and dynamic Bayesian game, which was summarized into a Bayesian hybrid detection approach. [7] adopted the idea of signaling game for constructing a stage game and a multi-stage dynamic intrusion detection game between the malicious and Cluster Header IDS. However, our model based on uncertain information has a substantial distinction in comparison with models in [5], [6] and [7], which derive from the idea of incomplete information.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation