• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

攻击与逃避:基于博弈论的移动自组网节点间交互分析

Attack and flee: game-theory-based analysis on interactions among nodes in MANETs.

作者信息

Li Feng, Yang Yinying, Wu Jie

机构信息

School of Engineering and Technology, Indiana University-Purdue University Indianapolis, Indianapolis, IN 46022, USA.

出版信息

IEEE Trans Syst Man Cybern B Cybern. 2010 Jun;40(3):612-22. doi: 10.1109/TSMCB.2009.2035929. Epub 2009 Dec 22.

DOI:10.1109/TSMCB.2009.2035929
PMID:20031501
Abstract

In mobile ad hoc networks, nodes have the inherent ability to move. Aside from conducting attacks to maximize their utility and cooperating with regular nodes to deceive them, malicious nodes get better payoffs with the ability to move. In this paper, we propose a game theoretic framework to analyze the strategy profiles for regular and malicious nodes. We model the situation as a dynamic Bayesian signaling game and analyze and present the underlining connection between nodes' best combination of actions and the cost and gain of the individual strategy. Regular nodes consistently update their beliefs based on the opponents' behavior, while malicious nodes evaluate their risk of being caught to decide when to flee. Some possible countermeasures for regular nodes that can impact malicious nodes' decisions are presented as well. An extensive analysis and simulation study shows that the proposed equilibrium strategy profile outperforms other pure or mixed strategies and proves the importance of restricting malicious nodes' advantages brought by the flee option.

摘要

在移动自组织网络中,节点具有固有的移动能力。除了发动攻击以最大化自身效用以及与正常节点协作以欺骗它们之外,恶意节点凭借移动能力能获得更好的收益。在本文中,我们提出一个博弈论框架来分析正常节点和恶意节点的策略概况。我们将这种情况建模为一个动态贝叶斯信号博弈,并分析并呈现节点最佳行动组合与个体策略的成本和收益之间的潜在联系。正常节点根据对手的行为持续更新其信念,而恶意节点评估被捕获的风险以决定何时逃离。还提出了一些可能影响恶意节点决策的正常节点应对措施。广泛的分析和仿真研究表明,所提出的均衡策略概况优于其他纯策略或混合策略,并证明了限制恶意节点因逃离选项带来的优势的重要性。

相似文献

1
Attack and flee: game-theory-based analysis on interactions among nodes in MANETs.攻击与逃避:基于博弈论的移动自组网节点间交互分析
IEEE Trans Syst Man Cybern B Cybern. 2010 Jun;40(3):612-22. doi: 10.1109/TSMCB.2009.2035929. Epub 2009 Dec 22.
2
Game-theoretic approach for improving cooperation in wireless multihop networks.用于改善无线多跳网络中协作的博弈论方法。
IEEE Trans Syst Man Cybern B Cybern. 2010 Jun;40(3):559-74. doi: 10.1109/TSMCB.2010.2042593. Epub 2010 Mar 4.
3
Evolutionary games in wireless networks.无线网络中的演化博弈
IEEE Trans Syst Man Cybern B Cybern. 2010 Jun;40(3):634-46. doi: 10.1109/TSMCB.2009.2034631. Epub 2009 Dec 4.
4
Cooperation stimulation strategies for peer-to-peer wireless live video-sharing social networks.对等无线实时视频共享社交网络的合作激励策略。
IEEE Trans Image Process. 2010 Jul;19(7):1768-84. doi: 10.1109/TIP.2010.2045035. Epub 2010 Mar 11.
5
Game-theoretic approach to joint transmitter adaptation and power control in wireless systems.无线系统中联合发射机自适应与功率控制的博弈论方法。
IEEE Trans Syst Man Cybern B Cybern. 2010 Jun;40(3):675-82. doi: 10.1109/TSMCB.2009.2033704. Epub 2009 Nov 10.
6
TCP throughput adaptation in WiMax networks using replicator dynamics.基于复制者动态的WiMax网络中TCP吞吐量自适应
IEEE Trans Syst Man Cybern B Cybern. 2010 Jun;40(3):647-55. doi: 10.1109/TSMCB.2009.2036148. Epub 2010 Jan 15.
7
Characterizing contract-based multiagent resource allocation in networks.刻画网络中基于契约的多智能体资源分配
IEEE Trans Syst Man Cybern B Cybern. 2010 Jun;40(3):575-86. doi: 10.1109/TSMCB.2009.2035100. Epub 2009 Dec 1.
8
Enhancing network robustness against malicious attacks.增强网络抵御恶意攻击的鲁棒性。
Phys Rev E Stat Nonlin Soft Matter Phys. 2012 Jun;85(6 Pt 2):066130. doi: 10.1103/PhysRevE.85.066130. Epub 2012 Jun 27.
9
A game-theoretic response strategy for coordinator attack in wireless sensor networks.无线传感器网络中协调器攻击的一种博弈论响应策略。
ScientificWorldJournal. 2014;2014:950618. doi: 10.1155/2014/950618. Epub 2014 Jul 1.
10
Using Trust to Establish a Secure Routing Model in Cognitive Radio Network.利用信任在认知无线电网络中建立安全路由模型。
PLoS One. 2015 Sep 30;10(9):e0139326. doi: 10.1371/journal.pone.0139326. eCollection 2015.

引用本文的文献

1
Narrowband-Internet of Things Device-to-Device Simulation: An Open-Sourced Framework.窄带物联网设备到设备仿真:一个开源框架。
Sensors (Basel). 2021 Mar 5;21(5):1824. doi: 10.3390/s21051824.
2
Game Theory-Based Cooperation for Underwater Acoustic Sensor Networks: Taxonomy, Review, Research Challenges and Directions.基于博弈论的水下声学传感器网络协作:分类、综述、研究挑战与方向
Sensors (Basel). 2018 Feb 1;18(2):425. doi: 10.3390/s18020425.