Securing IoT Transactions Against Double-Spending Attacks based on Signaling Game Approach.
Hafsa BenaddiMohammed JouhariKhalil IbrahimiAbderrahim BenslimanePublished in: GLOBECOM (2021)
Keyphrases
- management system
- countermeasures
- security problems
- game theory
- video games
- database
- educational games
- game theoretic
- game play
- information security
- transaction processing
- virtual world
- game playing
- watermarking scheme
- transaction management
- game design
- nash equilibrium
- computer games
- transaction data
- watermarking algorithm
- transactional data
- cloud computing
- game based learning
- online game
- smart objects
- malicious attacks
- concurrency control
- big data
- distributed databases
- association rules
- databases