{"id":"https://openalex.org/W3005297644","doi":"https://doi.org/10.1109/tifs.2020.2972129","title":"Optimal Byzantine Attacker Identification Based on Game Theory in Network Coding Enabled Wireless Ad Hoc Networks","display_name":"Optimal Byzantine Attacker Identification Based on Game Theory in Network Coding Enabled Wireless Ad Hoc Networks","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3005297644","doi":"https://doi.org/10.1109/tifs.2020.2972129","mag":"3005297644"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2020.2972129","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2020.2972129","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100668159","display_name":"Xiang Liu","orcid":"https://orcid.org/0000-0003-1129-5716"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiang Liu","raw_affiliation_strings":["School of Information Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068478144","display_name":"Teng Joon Lim","orcid":"https://orcid.org/0000-0002-3356-2240"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Teng Joon Lim","raw_affiliation_strings":["School of Electrical and Information Engineering, The University of Sydney, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Information Engineering, The University of Sydney, Sydney, Australia","institution_ids":["https://openalex.org/I129604602"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101857780","display_name":"Jie Huang","orcid":"https://orcid.org/0000-0002-4900-5115"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Huang","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100668159"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":1.2334,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.80487764,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"15","issue":null,"first_page":"2570","last_page":"2583"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8776617646217346},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.6570331454277039},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6462901830673218},{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.6351653933525085},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5869656801223755},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.561181902885437},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.554472804069519},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47529280185699463},{"id":"https://openalex.org/keywords/identification-scheme","display_name":"Identification scheme","score":0.45211517810821533},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.44970014691352844},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4359467923641205},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4327154755592346},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.42080599069595337},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.12965476512908936},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08323848247528076}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8776617646217346},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.6570331454277039},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6462901830673218},{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.6351653933525085},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5869656801223755},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.561181902885437},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.554472804069519},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47529280185699463},{"id":"https://openalex.org/C2778922385","wikidata":"https://www.wikidata.org/wiki/Q3475620","display_name":"Identification scheme","level":3,"score":0.45211517810821533},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.44970014691352844},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4359467923641205},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4327154755592346},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.42080599069595337},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.12965476512908936},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08323848247528076},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2020.2972129","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2020.2972129","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8799999952316284,"display_name":"Good health and well-being","id":"https://metadata.un.org/sdg/3"}],"awards":[{"id":"https://openalex.org/G5389229631","display_name":null,"funder_award_id":"2018YFB2100400","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320322725","display_name":"China Scholarship Council","ror":"https://ror.org/04atp4p48"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1743877615","https://openalex.org/W1831523983","https://openalex.org/W1983596191","https://openalex.org/W2014554046","https://openalex.org/W2032976609","https://openalex.org/W2041248965","https://openalex.org/W2046135376","https://openalex.org/W2048235391","https://openalex.org/W2081836443","https://openalex.org/W2083270107","https://openalex.org/W2097960074","https://openalex.org/W2105185344","https://openalex.org/W2105831729","https://openalex.org/W2106403318","https://openalex.org/W2107520978","https://openalex.org/W2110510622","https://openalex.org/W2117292864","https://openalex.org/W2124990550","https://openalex.org/W2133349752","https://openalex.org/W2136237463","https://openalex.org/W2149863032","https://openalex.org/W2150997530","https://openalex.org/W2153015273","https://openalex.org/W2158690831","https://openalex.org/W2159797391","https://openalex.org/W2171446212","https://openalex.org/W2175927535","https://openalex.org/W2290013323","https://openalex.org/W2403331250","https://openalex.org/W2429303121","https://openalex.org/W2478362353","https://openalex.org/W2534491645","https://openalex.org/W2544805158","https://openalex.org/W2889875699","https://openalex.org/W2999558422","https://openalex.org/W3106293402","https://openalex.org/W3163366489","https://openalex.org/W4234000857","https://openalex.org/W4244778151","https://openalex.org/W6637644075","https://openalex.org/W6685424080","https://openalex.org/W6728374566"],"related_works":["https://openalex.org/W2212571888","https://openalex.org/W2139379087","https://openalex.org/W2285288187","https://openalex.org/W2411336269","https://openalex.org/W2020805386","https://openalex.org/W3014803371","https://openalex.org/W2124128583","https://openalex.org/W2048122699","https://openalex.org/W2952087324","https://openalex.org/W2350191883"],"abstract_inverted_index":{"Byzantine":[0,41],"attack":[1,42],"is":[2],"a":[3,45,53,78,129,161,177],"severe":[4],"security":[5],"concern":[6],"in":[7,147],"network":[8],"coding":[9],"enabled":[10],"wireless":[11],"ad":[12],"hoc":[13],"networks,":[14],"because":[15],"the":[16,25,40,62,81,91,104,122,155,168,172,181],"malicious":[17,46,58,92],"nodes":[18,59,64,83,93,100],"can":[19,51,84],"easily":[20],"inject":[21],"bogus":[22],"packets":[23],"into":[24],"information":[26],"flow":[27],"and":[28,60,89,111,136,151,174],"cause":[29],"an":[30],"epidemic":[31],"propagation":[32],"of":[33,80,106,131,180],"pollution.":[34],"In":[35],"this":[36],"paper,":[37],"we":[38,127,159],"address":[39],"by":[43],"proposing":[44],"node":[47],"identification":[48,55,149,156],"scheme,":[49],"which":[50,140],"achieve":[52],"high":[54],"accuracy":[56,150],"on":[57],"protect":[61],"benign":[63],"from":[65],"being":[66,107],"mis-identified":[67],"as":[68,87],"attackers.":[69],"We":[70],"consider":[71],"two":[72],"practical":[73],"challenges,":[74],"namely,":[75],"1)":[76],"only":[77],"fraction":[79],"intermediate":[82],"be":[85,98],"deployed":[86],"defenders;":[88],"2)":[90],"are":[94],"intelligent-they":[95],"pretend":[96],"to":[97,102,166],"legitimate":[99],"probabilistically":[101],"reduce":[103],"chances":[105],"identified.":[108],"Theoretical":[109],"analysis":[110],"extensive":[112],"simulations":[113],"show":[114,141],"that":[115,142],"our":[116,134,143],"scheme":[117,135,144],"performs":[118],"well":[119],"even":[120],"under":[121],"conditions":[123],"mentioned":[124],"above.":[125],"Furthermore,":[126],"conduct":[128],"series":[130],"comparisons":[132],"between":[133],"several":[137],"existing":[138],"schemes,":[139],"outperforms":[145],"them":[146],"both":[148],"valid":[152],"throughput":[153],"during":[154],"procedure.":[157],"Finally,":[158],"present":[160],"two-player":[162],"game":[163],"theory":[164],"framework":[165],"find":[167],"optimal":[169],"strategy":[170,183],"for":[171],"defender,":[173],"also":[175],"provide":[176],"case":[178],"study":[179],"defender's":[182],"optimization.":[184]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
