Optimal defense resource allocation for attacks in wireless sensor networks based on risk assessment model
Author
Abstract
Suggested Citation
DOI: 10.1016/j.chaos.2020.109780
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Patterson, S.A. & Apostolakis, G.E., 2007. "Identification of critical locations across multiple infrastructures for terrorist actions," Reliability Engineering and System Safety, Elsevier, vol. 92(9), pages 1183-1203.
- Gulshan Kumar & Rahul Saha & Mandeep Singh & Mritunjay Kumar Rai, 2018. "Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN," International Journal of Information Security and Privacy (IJISP), IGI Global, vol. 12(1), pages 53-62, January.
- Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
- Réka Albert & Hawoong Jeong & Albert-László Barabási, 2000. "Error and attack tolerance of complex networks," Nature, Nature, vol. 406(6794), pages 378-382, July.
- Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
- Misuri, Alessio & Khakzad, Nima & Reniers, Genserik & Cozzani, Valerio, 2019. "A Bayesian network methodology for optimal security management of critical infrastructures," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
- Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
- Zhang, Xuejun & Xu, Guoqiang & Xia, Yongxiang, 2018. "Optimal defense resource allocation in scale-free networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 492(C), pages 2198-2204.
- Argenti, Francesca & Landucci, Gabriele & Reniers, Genserik & Cozzani, Valerio, 2018. "Vulnerability assessment of chemical facilities to intentional attacks based on Bayesian Network," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 515-530.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Ma, Yajing & Li, Zhanjie & Xie, Xiangpeng & Yue, Dong, 2023. "Adaptive consensus of uncertain switched nonlinear multi-agent systems under sensor deception attacks," Chaos, Solitons & Fractals, Elsevier, vol. 175(P1).
- Tu, Haicheng & Xia, Yongxiang & Chen, Xi, 2022. "Vulnerability analysis of cyber physical systems under the false alarm cyber attacks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 599(C).
- Huang, Wencheng & Li, Linqing & Liu, Hongyi & Zhang, Rui & Xu, Minhao, 2021. "Defense resource allocation in road dangerous goods transportation network: A Self-Contained Girvan-Newman Algorithm and Mean Variance Model combined approach," Reliability Engineering and System Safety, Elsevier, vol. 215(C).
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Huang, Wencheng & Li, Linqing & Liu, Hongyi & Zhang, Rui & Xu, Minhao, 2021. "Defense resource allocation in road dangerous goods transportation network: A Self-Contained Girvan-Newman Algorithm and Mean Variance Model combined approach," Reliability Engineering and System Safety, Elsevier, vol. 215(C).
- Wu, Jiansong & Zhang, Linlin & Bai, Yiping & Reniers, Genserik, 2022. "A safety investment optimization model for power grid enterprises based on System Dynamics and Bayesian network theory," Reliability Engineering and System Safety, Elsevier, vol. 221(C).
- Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
- Marroni, Giulia & Casini, Leonardo & Bartolucci, Andrea & Kuipers, Sanneke & Casson Moreno, Valeria & Landucci, Gabriele, 2024. "Development of fragility models for process equipment affected by physical security attacks," Reliability Engineering and System Safety, Elsevier, vol. 243(C).
- David Rios Insua & David Banks & Jesus Rios, 2016. "Modeling Opponents in Adversarial Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 742-755, April.
- Christoph Werner & Tim Bedford & John Quigley, 2018. "Sequential Refined Partitioning for Probabilistic Dependence Assessment," Risk Analysis, John Wiley & Sons, vol. 38(12), pages 2683-2702, December.
- Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
- Xu, Sheng & Xia, Yongxiang & Ouyang, Min, 2020. "Effect of resource allocation to the recovery of scale-free networks during cascading failures," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 540(C).
- Sumitra Sri Bhashyam & Gilberto Montibeller, 2016. "In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 666-680, April.
- González-Ortega, Jorge & Ríos Insua, David & Cano, Javier, 2019. "Adversarial risk analysis for bi-agent influence diagrams: An algorithmic approach," European Journal of Operational Research, Elsevier, vol. 273(3), pages 1085-1096.
- Dong, Mingxin & Zhang, Zhen & Liu, Yi & Zhao, Dong Feng & Meng, Yifei & Shi, Jihao, 2023. "Playing Bayesian Stackelberg game model for optimizing the vulnerability level of security incident system in petrochemical plants," Reliability Engineering and System Safety, Elsevier, vol. 235(C).
- Caroline A Johnson & Allison C Reilly & Roger Flage & Seth D Guikema, 2021. "Characterizing the robustness of power-law networks that experience spatially-correlated failures," Journal of Risk and Reliability, , vol. 235(3), pages 403-415, June.
- Ouyang, Min, 2014. "Review on modeling and simulation of interdependent critical infrastructure systems," Reliability Engineering and System Safety, Elsevier, vol. 121(C), pages 43-60.
- César Gil & David Rios Insua & Jesus Rios, 2016. "Adversarial Risk Analysis for Urban Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 727-741, April.
- Zhang, Lu & Cui, Li & Chen, Lujie & Dai, Jing & Jin, Ziyi & Wu, Hao, 2023. "A hybrid approach to explore the critical criteria of online supply chain finance to improve supply chain performance," International Journal of Production Economics, Elsevier, vol. 255(C).
- Pourakbar, M. & Zuidwijk, R.A., 2018. "The role of customs in securing containerized global supply chains," European Journal of Operational Research, Elsevier, vol. 271(1), pages 331-340.
- Sanjeev Goyal & Fernando Vega-Redondo, 2000.
"Learning, Network Formation and Coordination,"
Econometric Society World Congress 2000 Contributed Papers
0113, Econometric Society.
- Sanjeev Goyal & Fernando Vega-Redondo, 2000. "Learning, Network Formation and Coordination," Tinbergen Institute Discussion Papers 00-093/1, Tinbergen Institute.
- Goyal, S. & Vega-Redondo, F., 2000. "Learning, Network Formation and Coordination," Econometric Institute Research Papers EI 9954-/A, Erasmus University Rotterdam, Erasmus School of Economics (ESE), Econometric Institute.
- Fernando Vega Redondo & Sanjeev Goyal, 2001. "Learning, Network Formation And Coordination," Working Papers. Serie AD 2001-19, Instituto Valenciano de Investigaciones Económicas, S.A. (Ivie).
- Quayle, A.P. & Siddiqui, A.S. & Jones, S.J.M., 2006. "Preferential network perturbation," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 371(2), pages 823-840.
- Chen, Lei & Yue, Dong & Dou, Chunxia, 2019. "Optimization on vulnerability analysis and redundancy protection in interdependent networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 523(C), pages 1216-1226.
- Bálint Mészáros & István Simon & Zsuzsanna Dosztányi, 2009. "Prediction of Protein Binding Regions in Disordered Proteins," PLOS Computational Biology, Public Library of Science, vol. 5(5), pages 1-18, May.
More about this item
Keywords
Risk assessment; Network defense; Resource allocation; Network security;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:chsofr:v:137:y:2020:i:c:s096007792030182x. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Thayer, Thomas R. (email available below). General contact details of provider: https://www.journals.elsevier.com/chaos-solitons-and-fractals .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.