An Active Defense Model with Low Power Consumption and Deviation for Wireless Sensor Networks Utilizing Evolutionary Game Theory
Author
Abstract
Suggested Citation
Download full text from publisher
References listed on IDEAS
- Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
- P. Taylor & L. Jonker, 2010. "Evolutionarily Stable Strategies and Game Dynamics," Levine's Working Paper Archive 457, David K. Levine.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Wen Jiang & Zeyu Ma & Xinyang Deng, 2019. "An attack-defense game based reliability analysis approach for wireless sensor networks," International Journal of Distributed Sensor Networks, , vol. 15(4), pages 15501477198, April.
- Zi-Jia Wang & Zhi-Hui Zhan & Jun Zhang, 2018. "Solving the Energy Efficient Coverage Problem in Wireless Sensor Networks: A Distributed Genetic Algorithm Approach with Hierarchical Fitness Evaluation," Energies, MDPI, vol. 11(12), pages 1-14, December.
- Yang Li & Leyi Shi & Haijie Feng, 2019. "A Game-Theoretic Analysis for Distributed Honeypots," Future Internet, MDPI, vol. 11(3), pages 1-19, March.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
- Deck, Cary & Sheremeta, Roman M., 2019.
"The tug-of-war in the laboratory,"
European Journal of Political Economy, Elsevier, vol. 60(C).
- Deck, Cary & Sheremeta, Roman, 2015. "Tug-of-War in the Laboratory," MPRA Paper 67521, University Library of Munich, Germany.
- Cary Deck & Roman M. Sheremeta, 2018. "The Tug-of-War in the Laboratory," Working Papers 18-21, Chapman University, Economic Science Institute.
- Cary Deck & Roman M. Sheremeta, 2015. "Tug-of-War in the Laboratory," Working Papers 15-14, Chapman University, Economic Science Institute.
- Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
- Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
- Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
- Yanling Chang & Alan Erera & Chelsea White, 2015. "Value of information for a leader–follower partially observed Markov game," Annals of Operations Research, Springer, vol. 235(1), pages 129-153, December.
- Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
- Andrew Samuel & Seth D. Guikema, 2012. "Resource Allocation for Homeland Defense: Dealing with the Team Effect," Decision Analysis, INFORMS, vol. 9(3), pages 238-252, September.
- Borgers, Tilman & Sarin, Rajiv, 1997.
"Learning Through Reinforcement and Replicator Dynamics,"
Journal of Economic Theory, Elsevier, vol. 77(1), pages 1-14, November.
- Tilman Börgers & Rajiv Sarin, "undated". "Learning Through Reinforcement and Replicator Dynamics," ELSE working papers 051, ESRC Centre on Economics Learning and Social Evolution.
- T. Borgers & R. Sarin, 2010. "Learning Through Reinforcement and Replicator Dynamics," Levine's Working Paper Archive 380, David K. Levine.
- Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
- Garret Ridinger & Richard S. John & Michael McBride & Nicholas Scurich, 2016. "Attacker Deterrence and Perceived Risk in a Stackelberg Security Game," Risk Analysis, John Wiley & Sons, vol. 36(8), pages 1666-1681, August.
- Jie Xu & Jun Zhuang, 2016.
"Modeling costly learning and counter-learning in a defender-attacker game with private defender information,"
Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
- Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
- Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
- Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
- F He & J Zhuang, 2012. "Modelling ‘contracts’ between a terrorist group and a government in a sequential game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 790-809, June.
- Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.
- Jing Yang & Juan S. Borrero & Oleg A. Prokopyev & Denis Sauré, 2021. "Sequential Shortest Path Interdiction with Incomplete Information and Limited Feedback," Decision Analysis, INFORMS, vol. 18(3), pages 218-244, September.
- Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
- Jorge Andrés Gallego Durán & Rafal Raciborski, 2008. "Clientelism, income inequality, and social preferences: an evolutionary approach to poverty traps," Documentos de Economía 4717, Universidad Javeriana - Bogotá.
- Meilin He & Laura Devine & Jun Zhuang, 2018. "Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision‐Theoretic Approach," Risk Analysis, John Wiley & Sons, vol. 38(2), pages 215-225, February.
More about this item
Keywords
active defense; malicious node; attack; deviation; wireless sensor network security;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jeners:v:11:y:2018:i:5:p:1281-:d:146931. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.