Volume 52 | Number 3 | Year 2017 | Article Id. IJMTT-V52P526 | DOI : https://doi.org/10.14445/22315373/IJMTT-V52P526
P. Hema, V. Vinoba, "Detection of False Node in WSN using Non Cooperative Non-Zero Sum Game Theory," International Journal of Mathematics Trends and Technology (IJMTT), vol. 52, no. 3, pp. 183-188, 2017. Crossref, https://doi.org/10.14445/22315373/IJMTT-V52P526
[1] Altman, A.; Bercovici-Boden, A.; and Tennenholtz, M. 2006. Learning in one-shot strategic form games. In ECML, 6–17.
[2] Camerer, C.; Ho, T.; and Chong, J. 2001. Behavioral game theory: Thinking, learning, and teaching. Nobel Symposium on Behavioral and Experimental Economics.
[3] Camerer, C.; Ho, T.; and Chong, J. 2004. A cognitive hierarchy model of games. QJE 119(3):861– 898. Camerer, C. F. 2003. Behavioral Game Theory: Experiments in Strategic Interaction. Princeton University Press.
[4] Chong, J.; Camerer, C.; and Ho, T. 2005. Cognitive hierarchy: A limited thinking theory in games. Experimental Business Research, Vol. III: Marketing, accounting and cognitive perspectives 203–228.
[4] Chris Karlof and David Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, First IEEE International Workshop on Sensor Network Protocols and Applications, 2003.
[5] Krontiris Ioannis, Tassos Dimitriou, and Felix C. Freiling, “Towards Intrusion Detection in Wireless Sensor Networks”, EuropeanWireless Conference, Paris, April 2007.
[6] kuldeep, K. Sharma, and M. K. Ghose, “Wireless Sensor Networks Security: A New Approach”, DCOM 2008, Dec14-17, 2008.
[7] Roman, R. Jianying Zhou Lopez, J., Applying intrusion detection systems to wireless sensor networks, 3rd IEEE Consumer Communications and Networking Conference, 2006. CCNC 2006.
[8] Vijay Bhuse, Ajay Gupta, “Anomaly intrusion detection in wireless sensor networks”, Journal of High Speed Networks, Volume 15, Issue 1, January 2006.
[9] Michael Krishnan, “Intrusion Detection in Wireless Sensor Networks”,walrandpc.eecs.berkeley.edu/228S06/Projects/KrishnanProject.pdf
[10] A. Agah, S. K. Das and K. Basu, “A game theory based approach for security in wireless sensor networks”, IEEE International Conference on Performance, Computing, and Communications, 2004.
[11] A. Agah, S. K. Das and K. Basu, “A Non-cooperative Game Approach for Intrusion Detection in Sensor Networks”, Vehicular Technology Conference (VTC2004), Fall 2004.
[12] A. Agah, K. Basu and S. K. Das, “Preventing DoS attack in Sensor Networks: A Game Theoretic Approach”, IEEE International Conference on Communications (ICC 2005), Volume 5, Issue , 16-20 May 2005
[13] Michael Brownfield, “Wireless Sensor Network Denial of Sleep Attack”, Proceedings of the 2005 IEEE Workshop on Information Assurance and Security”, United States Military Academy, West Point, NY.
[14] R. Negi and A. Perrig, “Jamming analysis of MAC protocols”, Carnegie Mellon Technical Memo, 2003.
[15] A. B. MacKenzie and L. A. DaSilva, “Game Theory for Wireless Engineers”, Synthesis Lectures on Communications, 2006. Morgan & Claypool Publishers.
[16] A. Agah, “A Novel Game Theoretic Framework for Security in Wireless Sensor Networks”, Ph. D Thesis, UT Austin, December 2005.
[17] T. Alpcan and T. Basar, “An intrusion detection game with limited observations,” in 12th Int. Symp. on Dynamic Games and Applications, Sophia Antipolis, France, July 2006.
[18] M. Kodialam, T.V. Lakshman, “Detecting network intrusions via sampling: a game theoretic approach”, Proceedings of Twenty Second IEEE INFOCOMM, 2003.
[19] S. Zhu, S. Setia, and S. Jajodia, “LEAP : efficient security mechanisms for large-scale distributed sensor networks”, Proceedings of the 10th ACM conference on Computer and Communication Security, Washington D.C., 2003.
[20] L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks”, Proceedings of the 9th ACM conference on Computer and Communications Security, Washington, DC, USA, 2002.
[21] J. R. Douceur, “The Sybil Attack”, First International Workshop on Peer-to-peer Systems, LNCS 2429, 2002.
[22] J.-H. Yun, I.-H. Kim, J.-H. Lim, and S.-W. Seo, “WODEM: Wormhole Attack Defense Mechanism in Wireless Sensor Networks”, Ubiquitous Convergence Technology, ICUCT, 2006.
[23] A. D. Wood and J. A. Stankovic, “Denial of service in sensor networks”, Computer, 35(10), 2002.
[24] M. Kim, I. Doh, and K. Chae, “Denial-of-Service(DoS) Detection through Practical Entropy Estimation on Hierarchical Sensor Networks”, The 8th International Conference Advanced Communication Technology, (ICACT 2006), 2006.
[25] A. Agah, S. K. Das, K. Basu, and M. Asadi, “Intrusion Detection in Sensor Networks: a Non-Cooperative Game Approach”, Proceedings of Third IEEE International Symposium on the Network Computing and Applications (NCA’04), IEEE Computer Society, 2004.