Эта статья является препринтом и не была отрецензирована.
О результатах, изложенных в препринтах, не следует сообщать в СМИ как о проверенной информации.
Game Theory Approach for Communication Security and Safety Assurance in Cyber-physical Systems with Reputation and Trust-based Mechanisms
1. Bastos, D.; Shackleton, M.; El-Moussa, F. Internet of Things: A survey of technologies and security risks in smart home and city environments 2018.
2. Kang, H.S.; Lee, J.Y.; Choi, S.; Kim, H.; Park, J.H.; Son, J.Y.; Kim, B.H.; Do Noh, S. Smart manufacturing: Past research, present findings, and future directions. International journal of precision engineering and manufacturing-green technology 2016, 3, 111–128.
3. Wolf,W. Cyber-physical systems. Computer 2009, pp. 88–89.
4. Tokody, D.; Albini, A.; Ady, L.; Rajnai, Z.; Pongrácz, F. Safety and security through the design of autonomous intelligent vehicle systems and intelligent infrastructure in the smart city. Interdisciplinary Description of Complex Systems: INDECS 2018, 16, 384–396.
5. Kalyaev, I.; Gaiduk, A.; Kapustyan, S. Models and algorithms of collective control in groups of robots. Moscow, Fizmatlit 2009, p. 278.
6. Furno, L.; Nielsen, M.C.; Blanke, M. Centralised versus decentralised control reconfiguration for collaborating underwater robots. IFAC-PapersOnLine 2015, 48, 732–739.
7. Chuprov, S.; Viksnin, I.; Kim, I.; Marinenkov, E.; Usova, M.; Lazarev, E.; Melnikov, T.; Zakoldaev, D. Reputation and Trust Approach for Security and Safety Assurance in Intersection Management System. Energies 2019, 12, 4527.
8. Marinenkov, E.; Chuprov, S.; Viksnin, I.; Kim, I. Empirical Study on Trust, Reputation, and Game Theory Approach to Secure Communication in a Group of Unmanned Vehicles. CEUR Worshop Proceedings 2019, 2590.
9. Gibb, J.R. Trust: A new view of personal and organizational development; Guild of Tutors Pr, 1978.
10. Mui, L.; Mohtashemi, M.; Halberstadt, A. A computational model of trust and reputation. Proceedings of the 35th Annual Hawaii International Conference on System Sciences. IEEE, 2002, pp. 2431–2439.
11. Schollmeier, R. A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. Proceedings First International Conference on Peer-to-Peer Computing. IEEE, 2001, pp. 101–102.
12. SECTOR, S.; ITU, O. Series y: Global information infrastructure, internet protocol aspects and next-generation networks next generation networks–frameworks and functional architecture models. International Telecommunication Union, Geneva, Switzerland, Recommendation ITU-T Y 2012, 2060.
13. Singh, A.; Kumar, M.; Rishi, R.; Madan, D. A relative study of MANET and VANET: Its applications, broadcasting approaches and challenging issues. International Conference on Computer Science and Information Technology. Springer, 2011, pp. 627–632.
14. Chmaj, G.; Walkowiak, K. A P2P computing system for overlay networks. Future Generation Computer Systems 2013, 29, 242–249.
15. Nojoumian, M.; Stinson, D.R. Social secret sharing in cloud computing using a new trust function. 2012 Tenth Annual International Conference on Privacy, Security and Trust. IEEE, 2012, pp. 161–167.
16. Straub, J.; McMillan, J.; Yaniero, B.; Schumacher, M.; Almosalami, A.; Boatey, K.; Hartman, J. CyberSecurity considerations for an interconnected self-driving car system of systems. 2017 12th System of Systems Engineering Conference (SoSE). IEEE, 2017, pp. 1–6.
17. Kim, I.; Viksnin, I. Secure Information Interaction Within a Group of Unmanned Aerial Vehicles Based on Economic Approach. Intelligent Computing-Proceedings of the Computing Conference. Springer, 2019, pp. 59–72.
18. Pham, T.N.D.; Yeo, C.K. Adaptive trust and privacy management framework for vehicular networks. Vehicular Communications 2018, 13, 1–12.
19. Chuprov, S.; Viksnin, I.; Kim, I.; Nedosekin, G. Optimization of Autonomous Vehicles Movement in Urban Intersection Management System. 2019 24th Conference of Open Innovations Association (FRUCT). IEEE, 2019, pp. 60–66.
20. Basar, T.; Zaccour, G. Handbook of Dynamic Game Theory; Springer, 2018.
21. Fielder, A.; Panaousis, E.; Malacaria, P.; Hankin, C.; Smeraldi, F. Game theory meets information security management. IFIP International Information Security Conference. Springer, 2014, pp. 15–29.
22. Roy, S.; Ellis, C.; Shiva, S.; Dasgupta, D.; Shandilya, V.; Wu, Q. A survey of game theory as applied to network security. 2010 43rd Hawaii International Conference on System Sciences. IEEE, 2010, pp. 1–10.
23. Sun, W.; Kong, X.; He, D.; You, X. Information security problem research based on game theory. 2008 International Symposium on Electronic Commerce and Security. IEEE, 2008, pp. 554–557.
24. Guo, J.; Chen, R. A classification of trust computation models for service-oriented internet of things systems. 2015 IEEE International Conference on Services Computing. IEEE, 2015, pp. 324–331.
25. Bankovic, Z.; Vallejo, J.C.; Fraga, D.; Moya, J.M. Detecting false testimonies in reputation systems using self-organizing maps. Logic Journal of the IGPL 2013, 21, 549–559.
26. Li, W.; Song, H.; Zeng, F. Policy-based secure and trustworthy sensing for internet of things in smart cities. IEEE Internet of Things Journal 2017, 5, 716–723. 27.
27. Rawat, D.B.; Yan, G.; Bista, B.B.; Weigle, M.C. Trust On the Security of Wireless Vehicular Ad-hoc Networking. Ad Hoc Sens. Wirel. Networks 2015, 24, 283–305.
28. Petrosyan, L.; Zenkevich, N.; Shevkoplyas, E. Teoriya igr (Game Theory), St. Petersburg: BKhV-Peterburg 2012, 266.
29. Kuzin, L. Foundations of Cybernetics: in 2 v. M.: Energia 1979, 2.
30. Perrone, L.F.; Nelson, S.C. A study of on-off attack models for wireless ad hoc networks. 2006 1stWorkshop on Operator-Assisted (Wireless Mesh) Community Networks. IEEE, 2006, pp. 1–10.
31. Baker C. A. B. et al. Planning search and rescue missions for UAV teams //Proceedings of the Twenty-second European Conference on Artificial Intelligence. – 2016. – С. 1777-1778.