Authors
Animesh Patcha, J-M Park
Publication date
2004/6/10
Conference
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.
Pages
280-284
Publisher
IEEE
Description
Nodes in a mobile ad hoc network need to come up with counter measures against malicious activity. This is more true for the ad hoc environment where there is a total lack of centralized or third party authentication and security architectures. This paper presents a game-theoretic method to analyze intrusion detection in mobile ad hoc networks. We use game theory to model the interactions between the nodes of an ad hoc network. We view the interaction between an attacker and an individual node as a two player noncooperative game, and construct models for such a game.
Total citations
2005200620072008200920102011201220132014201520162017201820192020202120221525116676107101165436
Scholar articles