[1].R. Koch, “Blackout and Now ? Network Centric Warfare in an Anti-Access Area- Denial Theatre,” pp. 169–184, 2015.
[2].M. Maybury, “Toward the Assured Cyberspace Advantage : Air Force Cyber Vision 2025,” no. February, 2015.
[3].N. Warfare and W. Communications, “Modern warfare is increasingly network-centric,” no. 408, pp. 1–4, 2008.
[4].S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, and Q. Wu, “A Survey of Game Theory as Applied to Network Security ”
[5].A. K. Pathan, S. Khanam, H. Y. Saleem, and W. Mustafa, “Tackling Intruders in Wireless Mesh Networks” in Distributed Networks: Intelligence, Security and Applications, Qurban A.Memon, Ed.FL: CRC Press,2014,pp.167-190.
[6].Shila D.M. and Anjali, T., “Defending Selective Forwarding Attacks in WMNs”, IEEE International Conference on Electro/Information Technology 2008 (EIT’08), Iowa, USA, May 18-20, 2008, pp. 96-101.
[7].Nagaraj Balakrishnan, Reshmi S., and R. Arunkumar. “SMART REAL TIME RESCUE SYSTEM FOR FISHERMEN.” Pak. J. Biotechnol. Vol 15.1 (2018): 73-75.
[8].Cheikhrouhou, O., Laurent-Maknavicius, M., and Chaouchi, H., “Security Architecture in a Multihop Mesh Network”, 5th Conference on Safety and Architectures Networks SAR 2006, Seignosse, Landes, France, June 2006, pp. 1-10.
[9].Shila, D.M., Cheng, Y. and Anjali, T., “Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks”, The Proceedings of IEEE Globecom 2009, Nov. 30 2009-Dec. 4 2009, Honolulu, HI, USA, 2009, pp. 1-6.
[10].Parno, B., Perrig A., Gligor, V., “Distributed Detection of Node Replication Attacks in Sensor Networks”, Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P’05), 8-11 May 2005, pp. 49-63.
[11].Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., and Belding-Royer, E.M., “A Secure Routing Protocol for Ad Hoc Networks”, Proceedings of the 10 th IEEE International Conference on Network Protocols (ICNP’02), 12-15 Nov. 2002, pp.78-87.
[12].Salem, N.B. and Hubaux, J.P., “Securing Wireless Mesh Networks”, IEEE Wireless Communication, Volume: 13, Issue: 2, April 2006, pp. 50-55.
[13].Shila, D.M. and Anjali, T., “A Game Theoretic Approach to Gray Hole Attacks in Wireless Mesh Networks”, in Proc. IEEE MILCOM, San Diego, CA, Nov. 16-19 2008, pp. 1-7.
[14].Srivastava, V., Neel, J., MacKenzie, A.B., Menon, R., DaSilva, L. A., Hicks, J. E., Reed, J. H., and Gilles, R.P., “Using game theory to analyze wireless ad hoc networks”, IEEE Communications Surveys & Tutorials, Fourth Quarter 2005, Volume 7, No. 4, 2005, pp. 46-56.
[15].Javidi, M.M. and Aliahmadipour, L., “Game theory approaches for improving intrusion detection in MANETs”, Scientific Research and Essays, Vol. 6 (31), 16 December 2011, pp. 6535-6539.
[16].www.mathworks.com
Alok J Shukla1, Dr.Manju Nanda2, Kushal K S2
1 Manipal Institute of Technology,
Manipal, India
2 CSIR National Aerospace Laboratories,
Bangalore, India
alokjs89@gmail.com,
manjun@nal.res.in,
ksk261188@gmail.com