Strategic Profiling and Analytic Modelling of Node Misbehaviour in Adhoc Networks via Game Theory
Ubiquitous Computing and Internet of Things (IOT) are extremely popular in recent age and therefore imparting high level security mechanism is highly indispensable for such advanced technical systems. However, the security problems in Mobile Adhoc Networks (MANETs) are a constant topic of interest a...
| Main Authors: | Olanrewaju, Rashidah Funke, Hassan Abdalla Hashim, Aisha, Yusoff, Siti Hajar |
|---|---|
| Format: | Monograph |
| Language: | English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/62615/ http://irep.iium.edu.my/62615/1/RIGS%20Dr.%20Rashidah%20ReportFinal.pdf |
Similar Items
A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic Mobile Adhoc Networks
by: Khan, Burhan ul Islam, et al.
Published: (2020)
by: Khan, Burhan ul Islam, et al.
Published: (2020)
Manifestation and mitigation of node misbehaviour in adhoc networks
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
Malicious behaviour of node and its significant security techniques in MANET- a review
by: Khan, Burhan ul Islam, et al.
Published: (2013)
by: Khan, Burhan ul Islam, et al.
Published: (2013)
Game theory for resource allocation in heterogeneous wireless networks - a review
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
Bandwidth allocation policy using the game theory model in heterogeneous wireless networks
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
Prediction of optimal adsorption of aqueous phenol removal with oil palm empty fruit bunch activated carbon using Artificial Neural Network (ANN)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Analytical study of HMMCT
by: Mahfodh, Abdulrhman Mohammed, et al.
Published: (2011)
by: Mahfodh, Abdulrhman Mohammed, et al.
Published: (2011)
Conquest XHTML: a programers guide to extensible HyperText Markup Language
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
Sensor node clutter distribution in LoRa LPWAN
by: Zainal, Nur Aishah, et al.
Published: (2017)
by: Zainal, Nur Aishah, et al.
Published: (2017)
A computationally efficient P-LRU based optimal cache heap object replacement policy
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
Positioning of a wireless relay node for useful cooperative communication
by: Amjad, Tariq Muhamad, et al.
Published: (2018)
by: Amjad, Tariq Muhamad, et al.
Published: (2018)
Positioning of a wireless relay node for useful cooperative communication
by: Amjad, Tariq Muhamad, et al.
Published: (2017)
by: Amjad, Tariq Muhamad, et al.
Published: (2017)
Analytical evaluation of a new route pptimization scheme for nested mobile network
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2013)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2013)
Analytical evaluation of a new route optimization scheme for nested mobile network
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2012)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2012)
Optimized cooperative diversity for a three-node decode-and-forward relay channel
by: Kai-Kit, Wong, et al.
Published: (2007)
by: Kai-Kit, Wong, et al.
Published: (2007)
The impact of time and power allocation on the performance of the three-node decode and-forward relay channel
by: Khairol Fauzi, Muhammad Zarol Fitri, et al.
Published: (2017)
by: Khairol Fauzi, Muhammad Zarol Fitri, et al.
Published: (2017)
A survey on MANETs: architecture, evolution, applications,
security issues and solutions
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
Analysis of packet reordering delay for bandwidth aggregation in heterogeneous wireless networks
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
Radio Access Technology (RAT) selection mechanism using
TOPSIS method in Heterogeneous Wireless Networks (HWN)
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
Optimizing time and power allocation for cooperation diversity in a decode-and-forward three-node relay channel
by: Elsheikh, Elsheikh Mohamed Ahmed
Published: (2008)
by: Elsheikh, Elsheikh Mohamed Ahmed
Published: (2008)
RFDA: Reliable framework for data administration based on split-merge policy
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
SGM : Strategic game model for resisting node misbehaviour in IoT-cloud ecosystem
by: Khan, Burhan Ul Islam, et al.
Published: (2022)
by: Khan, Burhan Ul Islam, et al.
Published: (2022)
A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node
by: Qadir , Sana, et al.
Published: (2012)
by: Qadir , Sana, et al.
Published: (2012)
TracLocatEngine: a system for tracking and locating technical personnel using Radio Frequency Identification (RFID)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
Selfish Nodes Detection Mechanism In Wireless Mesh Networks
by: Kai, Chong Zan
Published: (2010)
by: Kai, Chong Zan
Published: (2010)
Web-enabled smart home using wireless node infrastructure
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Development of a scalable video compression algorithm
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Energy efficiency mechanisms using mobile node in wireless sensor networks
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
Service recovery of multicast hierarchical mobile IPV6 with context transfer
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
The study of signaling cost of M-HMIPV6 with context transfer
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Packet loss in M-HMIPV6 with context transfer
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
Evaluation handover latency in M-HMIPV6 with context transfer
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
Architecture of M-HMIPV6/CXTP
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Intra domain movement of M-HMIPV6/CXTP
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
Inter domain movement of M-HMIPV6/CXTP
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
Message format of M-HMIPV6/CXTP
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Signaling flow of M-HMIPV6/CXTP
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
Development of the service recovery time and signaling cost function
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Evaluation methods in computer networking
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Novel multihoming-based flow mobility scheme for proxy NEMO environment: a numerical approach to analyse handoff performance
by: Islam, Shayla, et al.
Published: (2017)
by: Islam, Shayla, et al.
Published: (2017)
Similar Items
-
A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic Mobile Adhoc Networks
by: Khan, Burhan ul Islam, et al.
Published: (2020) -
Manifestation and mitigation of node misbehaviour in adhoc networks
by: Khan, Burhan ul Islam, et al.
Published: (2014) -
Malicious behaviour of node and its significant security techniques in MANET- a review
by: Khan, Burhan ul Islam, et al.
Published: (2013) -
Game theory for resource allocation in heterogeneous wireless networks - a review
by: Anwar, Farhat, et al.
Published: (2018) -
Bandwidth allocation policy using the game theory model in heterogeneous wireless networks
by: Anwar, Farhat, et al.
Published: (2018)