{"id":"https://openalex.org/W2607183827","doi":"https://doi.org/10.1109/glocom.2017.8253959","title":"Modeling a Traffic Remapping Attack Game in a Multi-Hop Ad Hoc Network","display_name":"Modeling a Traffic Remapping Attack Game in a Multi-Hop Ad Hoc Network","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2607183827","doi":"https://doi.org/10.1109/glocom.2017.8253959","mag":"2607183827"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2017.8253959","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2017.8253959","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2017 - 2017 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1704.04053","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Jerzy Konorski","orcid":null},"institutions":[{"id":"https://openalex.org/I169333911","display_name":"Gda\u0144sk University of Technology","ror":"https://ror.org/006x4sc24","country_code":"PL","type":"education","lineage":["https://openalex.org/I169333911"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"Jerzy Konorski","raw_affiliation_strings":["Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology, Gdansk, Poland"],"affiliations":[{"raw_affiliation_string":"Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology, Gdansk, Poland","institution_ids":["https://openalex.org/I169333911"]}]},{"author_position":"last","author":{"id":null,"display_name":"Szymon Szott","orcid":null},"institutions":[{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Szymon Szott","raw_affiliation_strings":["Faculty of Computer Science, Electronics and Telecommunications, AGH University of Science and Technology, Krakow, Poland"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, Electronics and Telecommunications, AGH University of Science and Technology, Krakow, Poland","institution_ids":["https://openalex.org/I686019"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I169333911"],"apc_list":null,"apc_paid":null,"fwci":0.4374,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.65842251,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"9","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.698199987411499},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.6816999912261963},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.5080000162124634},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4991999864578247},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.42969998717308044},{"id":"https://openalex.org/keywords/stochastic-game","display_name":"Stochastic game","score":0.3939000070095062},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.3580000102519989}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7020000219345093},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.698199987411499},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.6816999912261963},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5622000098228455},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.5080000162124634},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4991999864578247},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.42969998717308044},{"id":"https://openalex.org/C22171661","wikidata":"https://www.wikidata.org/wiki/Q1074380","display_name":"Stochastic game","level":2,"score":0.3939000070095062},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36579999327659607},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.3580000102519989},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.3427000045776367},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.34049999713897705},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.3391999900341034},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3310000002384186},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.3052000105381012},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.2667999863624573},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.26080000400543213},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.25029999017715454},{"id":"https://openalex.org/C88959737","wikidata":"https://www.wikidata.org/wiki/Q1546627","display_name":"Strategy","level":3,"score":0.2502000033855438}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/glocom.2017.8253959","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2017.8253959","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2017 - 2017 IEEE Global Communications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1704.04053","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1704.04053","pdf_url":"https://arxiv.org/pdf/1704.04053","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1704.04053","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1704.04053","pdf_url":"https://arxiv.org/pdf/1704.04053","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1968910114","https://openalex.org/W1981113510","https://openalex.org/W2001247770","https://openalex.org/W2006055917","https://openalex.org/W2032760659","https://openalex.org/W2037187869","https://openalex.org/W2040823429","https://openalex.org/W2044304742","https://openalex.org/W2076744371","https://openalex.org/W2342987761","https://openalex.org/W2466399651","https://openalex.org/W2561441235","https://openalex.org/W2896127350","https://openalex.org/W3125686698","https://openalex.org/W6747701860"],"related_works":[],"abstract_inverted_index":{"In":[0,63],"multi-hop":[1,61],"ad":[2],"hoc":[3],"networks,":[4],"selfish":[5,99,109,118],"nodes":[6,102,110],"may":[7],"unduly":[8],"acquire":[9],"high":[10],"quality":[11],"of":[12,76,124],"service":[13],"(QoS)":[14],"by":[15],"assigning":[16],"higher":[17],"priority":[18,24],"to":[19,25,35,38,41,45,105,113,117],"source":[20],"packets":[21],"and":[22,43,89,100,131],"lower":[23],"transit":[26],"packets.":[27],"Such":[28],"traffic":[29],"remapping":[30],"attacks":[31],"(TRAs)":[32],"are":[33,103,111,147],"cheap":[34],"launch,":[36],"impossible":[37],"prevent,":[39],"hard":[40],"detect,":[42],"harmful":[44,145],"non-selfish":[46,101],"nodes.":[47],"While":[48],"studied":[49],"mostly":[50],"in":[51,60,115,143,149],"single-hop":[52],"wireless":[53],"network":[54],"settings,":[55],"TRAs":[56,146],"have":[57],"resisted":[58],"analysis":[59],"settings.":[62],"his":[64],"paper":[65],"we":[66,71],"offer":[67],"a":[68,73,80,84,91,140],"game-theoretic":[69],"approach:":[70],"derive":[72],"formal":[74],"model":[75],"opportunistic":[77],"TRAs,":[78],"define":[79],"TRA":[81],"game":[82],"with":[83,139],"heuristic":[85],"rank-based":[86],"payoff":[87],"function,":[88],"propose":[90],"boundedly":[92],"rational":[93],"multistage":[94,128],"attack":[95],"strategy":[96],"that":[97,126,135],"both":[98],"free":[104],"use.":[106],"Thus":[107],"non-":[108],"allowed":[112],"respond":[114],"kind":[116],"ones.":[119],"We":[120],"characterize":[121],"the":[122,127,150],"form":[123],"equilibrium":[125,142],"play":[129],"reaches":[130],"verify":[132],"via":[133],"simulation":[134],"it":[136],"often":[137],"coincides":[138],"Nash":[141],"which":[144],"curbed":[148],"first":[151],"place,":[152],"whereas":[153],"harmless":[154],"ones":[155],"need":[156],"not":[157],"be.":[158]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2017-04-28T00:00:00"}
