TY - JOUR
T1 - Using game theory to classify wireless Ad Hoc network attacks with analysis on countermeasures
AU - Liao, Xiaojuan
AU - Hao, Dong
AU - Sakurai, Kouichi
N1 - Copyright:
Copyright 2011 Elsevier B.V., All rights reserved.
PY - 2011/9
Y1 - 2011/9
N2 - Game theory has been receiving immense concern to deal with attacks in wireless ad hoc networks, which are widely employed in a large range of applications but vulnerable to various attacks. Previous works provided readers with comprehensive understanding of game theoretic solutions on cyber security problems. However, they neglect the relationship between attack characteristics and the corresponding game features. In this paper, we study the application of game theory on attacks in wireless ad hoc networks. Specifically, we present a classification which associates attack characteristics with types of game players and then examine the relationship between attack scenarios and types of corresponding game models. By illustrating the different players and game types in a variety of game theoretic approaches, we provide a comprehensive view on game based solutions to attacks in wireless ad hoc networks.
AB - Game theory has been receiving immense concern to deal with attacks in wireless ad hoc networks, which are widely employed in a large range of applications but vulnerable to various attacks. Previous works provided readers with comprehensive understanding of game theoretic solutions on cyber security problems. However, they neglect the relationship between attack characteristics and the corresponding game features. In this paper, we study the application of game theory on attacks in wireless ad hoc networks. Specifically, we present a classification which associates attack characteristics with types of game players and then examine the relationship between attack scenarios and types of corresponding game models. By illustrating the different players and game types in a variety of game theoretic approaches, we provide a comprehensive view on game based solutions to attacks in wireless ad hoc networks.
UR - http://www.scopus.com/inward/record.url?scp=80054051081&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=80054051081&partnerID=8YFLogxK
U2 - 10.4156/ijact.vol3.issue8.35
DO - 10.4156/ijact.vol3.issue8.35
M3 - Article
AN - SCOPUS:80054051081
SN - 2005-8039
VL - 3
SP - 296
EP - 303
JO - International Journal of Advancements in Computing Technology
JF - International Journal of Advancements in Computing Technology
IS - 8
ER -