Classification on attacks in wireless ad hoc networks: A game theoretic view

Xiaojuan Liao, Dong Hao, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Abstract

Wireless ad hoc network is suitable for a large range of applications but vulnerable to various attacks due to its special characteristics. Despite of the vital importance and ongoing research efforts, the security of wireless ad hoc network remains an open problem. Recently, game theory has been receiving immense concern. It provides rich set of mathematical tools for analyzing attacks and designing corresponding countermeasures. However, game theoretic approaches cannot directly be applicable to all kinds of attacks. In this paper, we present a classification which associates the characteristics of attacks with the applicability of game theory. By illustrating the different players in a variety of game models, we provide a comprehensive view on game based solutions to attacks in wireless ad hoc networks.

Original languageEnglish
Title of host publicationProceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011
Pages144-149
Number of pages6
Publication statusPublished - Sep 1 2011
Event7th International Conference on Networked Computing and Advanced Information Management, NCM 2011 - Gyeongju, Korea, Republic of
Duration: Jun 21 2011Jun 23 2011

Publication series

NameProceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011

Other

Other7th International Conference on Networked Computing and Advanced Information Management, NCM 2011
CountryKorea, Republic of
CityGyeongju
Period6/21/116/23/11

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems

Fingerprint Dive into the research topics of 'Classification on attacks in wireless ad hoc networks: A game theoretic view'. Together they form a unique fingerprint.

Cite this