참고문헌
- F. Li and J.Wu, "Attack and Flee : Game theory based analysis on interactions among nodes in MANETs," IEEE Trans. Syst., Man Cybern., vol. 40, pp. 612-622, 2010. https://doi.org/10.1109/TSMCB.2009.2035929
- Z. Li and H. Shen, "Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks," IEEE Trans. Mobile Comput., vol. 11, no. 8, pp. 1287-1303, Aug. 2012. https://doi.org/10.1109/TMC.2011.151
- Z. ji, W. Yu and K. J. R. Liu, "A belief evaluation framework in autonomous MANETs under noisy and imperfect observation: Vulnerability analysis and cooperation enforcement," IEEE Trans. Mobile Computing, vol. 9, pp. 1242-1254, 2010. https://doi.org/10.1109/TMC.2010.87
- M. Stadigl, "Co-evolutionary dynamics and Bayesian interaction games," Int. J. Game Theory, vol. 42, pp. 179-210, 2012.
- M. Kinateder, "Delayed perfect monitoring in repeated games," Int. J. Game Theory, vol. 42, pp. 283-294, 2012.
- N. Mohammed, H. Otrok, and L.Wang, "Mechanism design-based secure leader election model for intrusion detection in MANET," IEEE Trans. Dependable Secure Computing, vol. 8, pp. 89-103, 2011. https://doi.org/10.1109/TDSC.2009.22
- M. H. Manshaei et al., "Game theory meets network security and privacy," J. ACM Comput. Surv., vol. 45, no. 3, June 2013.
- M. Jiang, J. Li, and Y. C. Tay, "Cluster based routing protocol (CBRP)," IETF MANET Working Group, Internet-Draft, 1999.
- M. Kumar et al., "Comparative analysis of CBRP, DSR, AODV routing protocol in MANET," Int. J. Comput. Sci. Eng., vol. 2, no. 9, pp.2853-2858, 2010.
- G. Theodorakopoulos and J. Baras, "Malicious users in unstructured networks," in Proc. IEEE INFOCOM, May. 2007, pp. 884-891.
- Q. Zhu et al., "GUIDEX: A game-theoretic incentive-based mechanism for intrusion detection networks," IEEE J. Select. Areas Commun., vol. 30, no. 11, pp.2220-2230, Dec. 2012. https://doi.org/10.1109/JSAC.2012.121214
- M. T. Refaei et al., "Adaptation of reputation management systems to dynamic network conditions in ad hoc networks," IEEE Trans. Comput., vol. 59, no. 5, pp.707-719, May. 2010. https://doi.org/10.1109/TC.2010.34
- F. Li and J.Wu, "Mobility reduces uncertainty in MANETs,"in Proc. 26th IEEE INFOCOM, May. 2007, pp. 1946-1954.
- S. Ng and W. Seah, "Game-theoretic model for collaborative protocols in selfish, tariff-free, multihop wireless networks," in Proc. 27th IEEE INFOCOM, Singapore, Apr. 2008.
- M. Malawski, "Procedural values for cooperative games," Int. J. Game Theory, vol. 42, pp. 305-324, 2012.
- P. Liu, W. Zang, and M. Yu, "Incentive-based modeling and inference of attacker intent, objectives and strategies,"ACM Trans. Inform. Syst. Security, vol. 8, pp. 78-118, 2005. https://doi.org/10.1145/1053283.1053288
- A. Blanc, Y. Liu, and A. Vahdat, "Designing incentives for peer-to-peer routing," in Proc. IEEE INFOCOM, USA,Mar. 2005, vol. 1, pp. 374-385.
- S. Buchegger and J. Y. L. Boudec, "Performance analysis of the CONFIDANT Protocol, cooperation of nodes-Fairness in dynamic ad hoc networks," in Proc. IEEE/ACM MOBIHOC, June 2002.
- M. K. Rafsanjani et al., "A hybrid intrusion detection by game theory approaches in MANET," Indian J. Sci. Tech., vol. 5, no. 2, pp. 2123-2131, 2012.
- S. Buchegger and J. Y. L. Boudec, "The effect of ru-mor spreading in reputation systems for mobile ad hoc networks," in Proc. WIOPT, 2003.
- S. Buchegger and J. Y. L. Boudec, "Coping with false accusations in misbehavior reputation systems for mobile ad hoc networks," EPFL Tech. Rep. Number IC/2003/31, 2003.
- S. Buchegger and J. Boudec, "A robust reputation system for P2P and mobile ad-hoc networks," in Proc. 2nd Workshop on Econ. Peer-to-Peer Syst, 2004.
- P.Michiardi and R.Molva, "CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," in Proc. IFIP TC6/TC11 6th Joint Working Conf. Commun. and Multimedia Security: Advanced Commun. and Multimedia Security, 2002, pp. 107-121.