Optimal defense resource allocation for attacks in wireless sensor networks based on risk assessment model
Author
Abstract
Suggested Citation
DOI: 10.1016/j.chaos.2020.109780
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Patterson, S.A. & Apostolakis, G.E., 2007. "Identification of critical locations across multiple infrastructures for terrorist actions," Reliability Engineering and System Safety, Elsevier, vol. 92(9), pages 1183-1203.
- Gulshan Kumar & Rahul Saha & Mandeep Singh & Mritunjay Kumar Rai, 2018. "Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN," International Journal of Information Security and Privacy (IJISP), IGI Global, vol. 12(1), pages 53-62, January.
- Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
- Réka Albert & Hawoong Jeong & Albert-László Barabási, 2000. "Error and attack tolerance of complex networks," Nature, Nature, vol. 406(6794), pages 378-382, July.
- Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
- Misuri, Alessio & Khakzad, Nima & Reniers, Genserik & Cozzani, Valerio, 2019. "A Bayesian network methodology for optimal security management of critical infrastructures," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
- Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
- Zhang, Xuejun & Xu, Guoqiang & Xia, Yongxiang, 2018. "Optimal defense resource allocation in scale-free networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 492(C), pages 2198-2204.
- Argenti, Francesca & Landucci, Gabriele & Reniers, Genserik & Cozzani, Valerio, 2018. "Vulnerability assessment of chemical facilities to intentional attacks based on Bayesian Network," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 515-530.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Ma, Yajing & Li, Zhanjie & Xie, Xiangpeng & Yue, Dong, 2023. "Adaptive consensus of uncertain switched nonlinear multi-agent systems under sensor deception attacks," Chaos, Solitons & Fractals, Elsevier, vol. 175(P1).
- Tu, Haicheng & Xia, Yongxiang & Chen, Xi, 2022. "Vulnerability analysis of cyber physical systems under the false alarm cyber attacks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 599(C).
- Huang, Wencheng & Li, Linqing & Liu, Hongyi & Zhang, Rui & Xu, Minhao, 2021. "Defense resource allocation in road dangerous goods transportation network: A Self-Contained Girvan-Newman Algorithm and Mean Variance Model combined approach," Reliability Engineering and System Safety, Elsevier, vol. 215(C).
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Huang, Wencheng & Li, Linqing & Liu, Hongyi & Zhang, Rui & Xu, Minhao, 2021. "Defense resource allocation in road dangerous goods transportation network: A Self-Contained Girvan-Newman Algorithm and Mean Variance Model combined approach," Reliability Engineering and System Safety, Elsevier, vol. 215(C).
- David Rios Insua & David Banks & Jesus Rios, 2016. "Modeling Opponents in Adversarial Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 742-755, April.
- Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
- Sumitra Sri Bhashyam & Gilberto Montibeller, 2016. "In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 666-680, April.
- Dong, Mingxin & Zhang, Zhen & Liu, Yi & Zhao, Dong Feng & Meng, Yifei & Shi, Jihao, 2023. "Playing Bayesian Stackelberg game model for optimizing the vulnerability level of security incident system in petrochemical plants," Reliability Engineering and System Safety, Elsevier, vol. 235(C).
- Ouyang, Min, 2014. "Review on modeling and simulation of interdependent critical infrastructure systems," Reliability Engineering and System Safety, Elsevier, vol. 121(C), pages 43-60.
- Wu, Jiansong & Zhang, Linlin & Bai, Yiping & Reniers, Genserik, 2022. "A safety investment optimization model for power grid enterprises based on System Dynamics and Bayesian network theory," Reliability Engineering and System Safety, Elsevier, vol. 221(C).
- Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
- Marroni, Giulia & Casini, Leonardo & Bartolucci, Andrea & Kuipers, Sanneke & Casson Moreno, Valeria & Landucci, Gabriele, 2024. "Development of fragility models for process equipment affected by physical security attacks," Reliability Engineering and System Safety, Elsevier, vol. 243(C).
- Christoph Werner & Tim Bedford & John Quigley, 2018. "Sequential Refined Partitioning for Probabilistic Dependence Assessment," Risk Analysis, John Wiley & Sons, vol. 38(12), pages 2683-2702, December.
- Xu, Sheng & Xia, Yongxiang & Ouyang, Min, 2020. "Effect of resource allocation to the recovery of scale-free networks during cascading failures," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 540(C).
- González-Ortega, Jorge & Ríos Insua, David & Cano, Javier, 2019. "Adversarial risk analysis for bi-agent influence diagrams: An algorithmic approach," European Journal of Operational Research, Elsevier, vol. 273(3), pages 1085-1096.
- Caroline A Johnson & Allison C Reilly & Roger Flage & Seth D Guikema, 2021. "Characterizing the robustness of power-law networks that experience spatially-correlated failures," Journal of Risk and Reliability, , vol. 235(3), pages 403-415, June.
- César Gil & David Rios Insua & Jesus Rios, 2016. "Adversarial Risk Analysis for Urban Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 727-741, April.
- Zhang, Lu & Cui, Li & Chen, Lujie & Dai, Jing & Jin, Ziyi & Wu, Hao, 2023. "A hybrid approach to explore the critical criteria of online supply chain finance to improve supply chain performance," International Journal of Production Economics, Elsevier, vol. 255(C).
- Wang, Zhuoyang & Chen, Guo & Hill, David J. & Dong, Zhao Yang, 2016. "A power flow based model for the analysis of vulnerability in power networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 460(C), pages 105-115.
- Ryan M. Hynes & Bernardo S. Buarque & Ronald B. Davies & Dieter F. Kogler, 2020.
"Hops, Skip & a Jump - The Regional Uniqueness of Beer Styles,"
Working Papers
202013, Geary Institute, University College Dublin.
- Bernardo S. Buarque & Ronald B. Davies & Ryan M. Hynes & Dieter Franz Kogler, 2020. "Hops, Skip & a Jump: The Regional Uniqueness of Beer Styles," Working Papers 202031, School of Economics, University College Dublin.
- Ryan M. Hynes & Bernardo S. Buarque & Ronald B. Davies & Dieter F. Kogler, 2020. "Hops, Skip & a Jump: The Regional Uniqueness of Beer Styles," Papers in Evolutionary Economic Geography (PEEG) 2058, Utrecht University, Department of Human Geography and Spatial Planning, Group Economic Geography, revised Dec 2020.
- Lenore Newman & Ann Dale, 2007. "Homophily and Agency: Creating Effective Sustainable Development Networks," Environment, Development and Sustainability: A Multidisciplinary Approach to the Theory and Practice of Sustainable Development, Springer, vol. 9(1), pages 79-90, February.
- Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
- Aybike Ulusan & Ozlem Ergun, 2018. "Restoration of services in disrupted infrastructure systems: A network science approach," PLOS ONE, Public Library of Science, vol. 13(2), pages 1-28, February.
More about this item
Keywords
Risk assessment; Network defense; Resource allocation; Network security;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:chsofr:v:137:y:2020:i:c:s096007792030182x. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Thayer, Thomas R. (email available below). General contact details of provider: https://www.journals.elsevier.com/chaos-solitons-and-fractals .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.