Achieving Secure Communication in CRN with Malicious Energy Harvester Using Game Theory.
Saptarshi GhoshManav R. BhatnagarAjay SinghBijaya K. PanigrahiPublished in: GLOBECOM (2016)
Keyphrases
- game theory
- secure communication
- game theoretic
- smart card
- secret sharing
- secret key
- nash equilibrium
- cooperative
- key management
- statistical physics
- public key
- energy consumption
- resource allocation
- ad hoc networks
- fictitious play
- digital signature
- network security
- security protocols
- chaotic systems
- solution concepts
- wireless sensor networks
- multi agent systems
- nash equilibria
- spatial domain
- sensor nodes