Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020
Ubiquitous Computing and Internet of Things (IoT) are extremely popular in recent age and therefore imparting high level security mechanism is highly indispensable for such advanced technical systems. Game Theory is a useful tool for exploring the issues concerning Mobile Ad-Hoc Network (or MANET) s...
| Main Authors: | Olanrewaju, Rashidah Funke Olanrewaju, Anwar, Farhat, Khan, Burhan Ul Islam |
|---|---|
| Format: | Monograph |
| Language: | English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/73313/ http://irep.iium.edu.my/73313/1/PRIGS2019%20%20Final%20%20Report.pdf |
Similar Items
STRATEGIC PROFILING & ANALYTIC MODELLING OF NODE MISBEHAVIOR IN MANET BASED IOT PARADIGM THEORY
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
Manifestation and mitigation of node misbehaviour in adhoc networks
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
Strategic Profiling and Analytic Modelling of Node Misbehaviour in Adhoc Networks via Game Theory
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
ElePSO: energy aware elephant swarm optimization for Mobile Adhoc Network
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
EloPSO: energy aware elephant swarm optimization for mobile adhoc networks
by: Khan , Burhan ul Islam, et al.
Published: (2014)
by: Khan , Burhan ul Islam, et al.
Published: (2014)
A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic Mobile Adhoc Networks
by: Khan, Burhan ul Islam, et al.
Published: (2020)
by: Khan, Burhan ul Islam, et al.
Published: (2020)
DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
STCM: Secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
STCM: secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2016)
by: Khan, Burhan ul Islam, et al.
Published: (2016)
Malicious behaviour of node and its significant security techniques in MANET- a review
by: Khan, Burhan ul Islam, et al.
Published: (2013)
by: Khan, Burhan ul Islam, et al.
Published: (2013)
JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
SGM : Strategic game model for resisting node misbehaviour in IoT-cloud ecosystem
by: Khan, Burhan Ul Islam, et al.
Published: (2022)
by: Khan, Burhan Ul Islam, et al.
Published: (2022)
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Enhanced Medium Access Control Protocol for Resolving Node Misbehavior in Wireless Networks
by: Nordin, Noorsalwati
Published: (2007)
by: Nordin, Noorsalwati
Published: (2007)
Strategic profiling for behaviour visualization of malicious node in MANETs using game theory
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
Rehashing system security solutions in e-banking
by: Khan, Burhan ul Islam, et al.
Published: (2018)
by: Khan, Burhan ul Islam, et al.
Published: (2018)
Modeling malicious multi-attacker node collusion
in MANETs via game theory
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
Exploring manet security aspects: analysis of attacks and node misbehaviour issues
by: Islam Khan, Burhan Ul, et al.
Published: (2022)
by: Islam Khan, Burhan Ul, et al.
Published: (2022)
Linking software engineering paradigms to Islamic values
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
QoS oriented mapReduce optimization for hadoop based
bigData application
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Secure annihilation of out-of-band authorization for
online transactions
by: Hussain, Sabahat, et al.
Published: (2018)
by: Hussain, Sabahat, et al.
Published: (2018)
Offline OTP based solution for secure internet banking access
by: Khan, Burhan ul Islam, et al.
Published: (2019)
by: Khan, Burhan ul Islam, et al.
Published: (2019)
A critical insight into the effectiveness of research
methods evolved to secure IoT ecosystem
by: Khan, Burhan ul Islam, et al.
Published: (2018)
by: Khan, Burhan ul Islam, et al.
Published: (2018)
A novel multi-agent and multilayered game formulation for Intrusion Detection in Internet of Things (IoT)
by: Khan, Burhan Ul Islam, et al.
Published: (2020)
by: Khan, Burhan Ul Islam, et al.
Published: (2020)
Internet of things security vulnerabilities and recommended solutions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
Banner : Share ADHOC Workshop
by: ISITI, -CoERI
Published: (2013)
by: ISITI, -CoERI
Published: (2013)
Understanding the Misbehavior of At-Risk Students: Contributing Factors
by: Elias, Habibah, et al.
Published: (2009)
by: Elias, Habibah, et al.
Published: (2009)
Predictors of student misbehavior in Jordanian high schools
by: Mahasneh, Ameen Mohammed Mousa
Published: (2012)
by: Mahasneh, Ameen Mohammed Mousa
Published: (2012)
Conquest XHTML: a programers guide to extensible HyperText Markup Language
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
A survey on MANETs: architecture, evolution, applications,
security issues and solutions
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
An adaptive and viable face identification for Android mobile devices
by: Mehraj, Tehseen, et al.
Published: (2019)
by: Mehraj, Tehseen, et al.
Published: (2019)
Critical challenges in access management schemes for smartphones: an appraisal
by: Mehraj, Tehseen, et al.
Published: (2019)
by: Mehraj, Tehseen, et al.
Published: (2019)
Scrutinising internet banking security solutions
by: Khan, Burhan ul Islam, et al.
Published: (2020)
by: Khan, Burhan ul Islam, et al.
Published: (2020)
Critical insight for MAPReduce optimization in Hadoop
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
Evaluating the effect of IP and IGP on
the ICMP throughput of a WAN
by: Khan , Burhan ul Islam, et al.
Published: (2013)
by: Khan , Burhan ul Islam, et al.
Published: (2013)
DFAM: A distributed feedback analysis mechanism for knowledge based educational big data
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
Analysis of packet reordering delay for bandwidth aggregation in heterogeneous wireless networks
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
Bandwidth allocation policy using the game theory model in heterogeneous wireless networks
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
Similar Items
-
STRATEGIC PROFILING & ANALYTIC MODELLING OF NODE MISBEHAVIOR IN MANET BASED IOT PARADIGM THEORY
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018) -
Manifestation and mitigation of node misbehaviour in adhoc networks
by: Khan, Burhan ul Islam, et al.
Published: (2014) -
Strategic Profiling and Analytic Modelling of Node Misbehaviour in Adhoc Networks via Game Theory
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018) -
ElePSO: energy aware elephant swarm optimization for Mobile Adhoc Network
by: Khan, Burhan ul Islam, et al.
Published: (2014) -
EloPSO: energy aware elephant swarm optimization for mobile adhoc networks
by: Khan , Burhan ul Islam, et al.
Published: (2014)