MAC games for distributed wireless network security with incomplete information of selfish and malicious user types.
Yalin Evren SagduyuRandall BerryAnthony EphremidesPublished in: GAMENETS (2009)
Keyphrases
- incomplete information
- network security
- computer networks
- nash equilibria
- network administrators
- intrusion detection
- repeated games
- partial information
- intrusion detection system
- wired networks
- traffic analysis
- autonomous agents
- missing information
- nash equilibrium
- network traffic
- information security
- query answering
- cooperative
- anomaly detection
- security policies
- dos attacks
- distributed systems
- wireless networks
- resource allocation
- data transmission
- end hosts
- computer security
- ip networks
- peer to peer
- mobile networks
- stochastic games
- mobile robot
- mobile devices
- multi agent systems
- multi agent
- lightweight