Filters








20,179 Hits in 10.4 sec

Game theory meets network security and privacy

Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Tamer Bacşar, Jean-Pierre Hubaux
2013 ACM Computing Surveys  
This survey provides a structured and comprehensive overview of the research contributions that analyze and solve security and privacy problems in computer networks by game-theoretic approaches.  ...  In this survey, we aim to provide a better understanding of the different research approaches for applying game theory to network security.  ...  Using a game-theoretic approach, the designer of a security protocol can take into account the selfishness of individual mobile nodes and operators.  ... 
doi:10.1145/2480741.2480742 fatcat:55ixmohvijaelflxqrrbtnvfuu

Optimal Game Theory for Network Security using IPDRS Engine
IJARCCE - Computer and Communication Engineering

Shyam Chandran P, Resmi .A.M
2015 IJARCCE  
In existing system they propose a game based intrusion request and response process by game play of header node to access the data by their correct play, from this if the real header play it in wrong method  ...  Many researchers were proposed a different approach for providing security they does not tackle the problem, it leads an untruthful in the network.  ...  They invent a game-theoretic equivalent, and proved the survival of Nash equilibrium.  ... 
doi:10.17148/ijarcce.2015.4108 fatcat:4k44pyn4v5bgzfagom62xwjxhy

A Survey on Security and Privacy in Emerging Sensor Networks: From Viewpoint of Close-Loop

Lifu Zhang, Heng Zhang
2016 Sensors  
Opportunities and challenges in the design, analysis, verification and validation of sensor networks co-exists, among which security and privacy are two important ingredients.  ...  This paper presents a survey on some recent results in the security and privacy aspects of emerging sensor networks from the viewpoint of the closed-loop.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s16040443 pmid:27023559 pmcid:PMC4850957 fatcat:ndpgvn3rdjhtvldrl2ih7lsvuu

Cyberphysical Security in Networked Control Systems: An Introduction to the Issue

2015 IEEE Control Systems  
The six articles that constitute this special issue approach cyberphysical security from a variety of perspectives, including control theory, optimization, and game theory.  ...  T his special issue provides an introduction to cyberphysical security of networked control systems (NCSs) and summarizes recent progress in applying fundamentals of systems theory and decision sciences  ...  A complementary approach to assessing security NCS risks and improving their survivability in the face of strategic adversaries is to use game-theoretic tools.  ... 
doi:10.1109/mcs.2014.2364708 fatcat:5ky7a72ckfdxndp2ppgmgcexnm

Secure Control: Towards Survivable Cyber-Physical Systems

Alvaro A. Cardenas, Saurabh Amin, Shankar Sastry
2008 2008 The 28th International Conference on Distributed Computing Systems Workshops  
to improve the survivability of cyber-physical systems.  ...  We (1) identify and define the problem of secure control, (2) investigate the defenses that information security and control theory can provide, and (3) propose a set of challenges that need to be addressed  ...  Some of them are, Challenge 1: In the design and analysis of secure control algorithms we need to introduce a trust analysis of the CPS architecture, and realistic and rational adversary models that can  ... 
doi:10.1109/icdcs.workshops.2008.40 dblp:conf/icdcsw/CardenasAS08 fatcat:m2ian6ev4ndcfmmtby24pbxnem

A survey on game theoretical methods in Human–Machine Networks

Xueqin Liang, Zheng Yan
2017 Future generations computer systems  
They formulated this as a game and used it to analyze the security of existing protocols in mining pools.  ...  Model requirements We propose a number of requirements with regard to game modeling and game theoretical analysis in this section.  ... 
doi:10.1016/j.future.2017.10.051 fatcat:55v7cpi64ndb3apj4ngbkin5ue

Efficient and secure message authentication in cooperative driving: A game-theoretic approach

Lei Gao, Na Ruan, Haojin Zhu
2016 2016 IEEE International Conference on Communications (ICC)  
We also proposed a method to optimize the system parameters in our designed protocol to achieve better efficiency and security.  ...  An infinitely repeated game for our designed protocol in is proposed to analyze the utility of all users to help analyse the threat of selfish behavior.  ...  In section IV, we presented the game theoretical approach. In section V and section VI, we show the analysis and evaluation of our work. We draw a conclusion in section VII. II.  ... 
doi:10.1109/icc.2016.7510673 dblp:conf/icc/GaoRZ16 fatcat:sbwzmtocbjblxisszm7bphxxgy

How Effective Are the Prevailing Attack-Defense Models for Cybersecurity Anyway?

Daojing He, Sammy Chan, Yan Zhang, Chunming Wu, Bing Wang
2014 IEEE Intelligent Systems  
Attack-defense models play an important role in cybersecurity systems' design.  ...  After reviewing traditional and prevailing attackdefense models, the authors discuss recently proposed paradigm shifts and how to adopt new models.  ...  The advantage of such a theoretical gaming approach over traditional ones is that it recognizes the strategic interaction between an adversary and a defender.  ... 
doi:10.1109/mis.2013.105 fatcat:l6yti3npxzeipiavodxahp3mtq

Security Protocols in a Nutshell [article]

Mohsen Toorani
2016 arXiv   pre-print
It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of protocols.  ...  Furthermore, a survey on computational security models for authenticated key exchange (AKE) and password-authenticated key exchange (PAKE) protocols, as the most important and well-studied type of security  ...  Acknowledgment The author would like to thank Øyvind Ytrehus for helpful comments and discussions.  ... 
arXiv:1605.09771v2 fatcat:mkbc3in6tvdo7madnvqaxogbfq

A Survey on Human-Centric Communications in Non-Cooperative Wireless Relay Networks

Behrouz Jedari, Feng Xia, Zhaolong Ning
2018 IEEE Communications Surveys and Tutorials  
to various types of node selfish and malicious behaviors, (2) the impact analysis of node selfish and malicious behaviors on the performance of data forwarding and distribution, (3) selfish and malicious  ...  Numerous mechanisms have been recently proposed to establish secure and efficient communications in WRNs in the presence of selfish and malicious nodes (referred as non-cooperative WRNs).  ...  The authors are grateful to the anonymous reviewers for their constructive comments and suggestions to improve the quality of the article.  ... 
doi:10.1109/comst.2018.2791428 fatcat:2v6odowj4rhx5ico7g2i4pk6ne

Development of Serious Games for Teaching Information Security Courses

Mahmoud Mostafa, Osama S. Faragallah
2019 IEEE Access  
Games that closely emulate real-world systems can improve learning about computer security above and beyond just reading technical documents and textbooks.  ...  Learning practical knowledge about information security from a game is more engaging and less time consuming than learning through textbooks.  ...  detection. • Make risk assessment choices. • Design a suitable security system to protect a given network.  ... 
doi:10.1109/access.2019.2955639 fatcat:ahtdoro64nfg3imdpvdgvm4sr4

A novel SMP-based survivability evaluation metric and approach in wireless sensor network

Hongsong Chen, Haiyan Zhuang, Zhiguang Shan, Chao-Hsien Lee, Zhongchuan Fu
2019 Computer Science and Information Systems  
Numerical analysis and simulation experiments are combined to precisely calculate the survivability entropy metric.To validate the evaluation approach, NS2 (Network simulator) is used to simulate the DoS  ...  To precisely evaluate the systematic survivability ability under external attack and internal security mechanism,a novel survivability entropy-based quantitative evaluation metric is proposed to calculate  ...  Stochastic model based threat modeling approaches transform system state models to Markov chains and analyze them using finite state transition matrix or game theory.  ... 
doi:10.2298/csis180918024c fatcat:4dkgqw3opnfwhdzeis2g3m7x44

Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey

Mohamed Abdalzaher, Karim Seddik, Maha Elsabrouty, Osamu Muta, Hiroshi Furukawa, Adel Abdel-Rahman
2016 Sensors  
Then, we propose a taxonomy of game theoretic defense strategies taking into consideration the attacked layer, attack features, attack consequences, convenient defense game approach, and game type.  ...  Afterward, a general trust model based on the discussed game theory approaches and scenarios is introduced to take into account the variability and features of the attack types.  ...  We have carried out an extensive overview of the state-of-the-art of many game theoretic approaches that are utilized to design defense strategies to protect sensor nodes from attacks and to guarantee  ... 
doi:10.3390/s16071003 pmid:27367700 pmcid:PMC4970053 fatcat:3utgdvzzdvhpjnvvsaweywmyvm

Quality of service in heterogeneous wired/wireless networks

Xuemin Shen, Baochun Li
2007 Wireless networks  
These include the provisioning of Quality of Service (QoS), survivability, resilience and scalability in a wide range of emerging applications-such as large-scale multimedia systems-across both wired and  ...  Recent technological developments in broadband peer-topeer and overlay networks, wireless and mobile networks, and grid computing have led to a wide variety of new challenging problems.  ...  A novel analysis framework is proposed to evaluate the performance of the thresholding approach and provide optimization guidelines for systems with non-Markovian access, service and mobility patterns.  ... 
doi:10.1007/s11276-007-0028-7 fatcat:z7apredkofactjf2bgaposrque

Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense [article]

Jin-Hee Cho, Dilli P. Sharma, Hooman Alavizadeh, Seunghyun Yoon, Noam Ben-Asher, Terrence J. Moore, Dong Seong Kim, Hyuk Lim, Frederica F. Nelson
2019 arXiv   pre-print
Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades.  ...  In this work, we conducted a comprehensive, in-depth survey to discuss the following aspects of MTD: key roles, design principles, classifications, common attacks, key methodologies, important algorithms  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of RDECOM ITC-PAC, US-ARL  ... 
arXiv:1909.08092v1 fatcat:wsycpvaqgzdcvboagxlbg5x6uu
« Previous Showing results 1 — 15 out of 20,179 results