一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

5G網(wǎng)絡(luò)空間安全對抗博弈

徐瑨 吳慧慈 陶小峰

徐瑨, 吳慧慈, 陶小峰. 5G網(wǎng)絡(luò)空間安全對抗博弈[J]. 電子與信息學(xué)報(bào), 2020, 42(10): 2319-2329. doi: 10.11999/JEIT200058
引用本文: 徐瑨, 吳慧慈, 陶小峰. 5G網(wǎng)絡(luò)空間安全對抗博弈[J]. 電子與信息學(xué)報(bào), 2020, 42(10): 2319-2329. doi: 10.11999/JEIT200058
Jin XU, Huici WU, Xiaofeng TAO. 5G Cyberspace Security Game[J]. Journal of Electronics & Information Technology, 2020, 42(10): 2319-2329. doi: 10.11999/JEIT200058
Citation: Jin XU, Huici WU, Xiaofeng TAO. 5G Cyberspace Security Game[J]. Journal of Electronics & Information Technology, 2020, 42(10): 2319-2329. doi: 10.11999/JEIT200058

5G網(wǎng)絡(luò)空間安全對抗博弈

doi: 10.11999/JEIT200058
基金項(xiàng)目: 國家自然科學(xué)基金(61932005, 61901051, 61501057),中央高?;A(chǔ)科研費(fèi)專項(xiàng)資金(2019RC55)
詳細(xì)信息
    作者簡介:

    徐瑨:女,1981年生,副教授,研究方向?yàn)閷拵б苿?dòng)通信、無線網(wǎng)絡(luò)安全

    吳慧慈:女,1992年生,助理教授,研究方向?yàn)闊o線接入安全、異構(gòu)融合協(xié)作

    陶小峰:男,1970年生,教授,博士生導(dǎo)師,研究方向?yàn)闊o線通信、移動(dòng)通信安全

    通訊作者:

    陶小峰 taoxf@bupt.edu.cn

  • 中圖分類號(hào): TN918; TN929.5

5G Cyberspace Security Game

Funds: The National Natural Science Foundation of China (61932005, 61901051, 61501057), The Fundamental Research Funds for The Central Universities (2019RC55)
  • 摘要: 隨著移動(dòng)通信技術(shù)的快速發(fā)展和第5代移動(dòng)通信(5G)網(wǎng)絡(luò)的商用,網(wǎng)絡(luò)空間安全問題日益凸顯。該文針對5G網(wǎng)絡(luò)空間安全中對抗博弈問題進(jìn)行探討,從靜態(tài)博弈、動(dòng)態(tài)博弈、基于演化和圖論的博弈等基礎(chǔ)模型以及竊聽與竊聽對抗、干擾與干擾對抗等典型對抗種類方面,對當(dāng)前國內(nèi)外網(wǎng)絡(luò)空間安全對抗博弈的研究進(jìn)行分析和歸納,并進(jìn)一步闡述5G網(wǎng)絡(luò)空間安全對抗博弈研究中潛在的基礎(chǔ)理論和對抗規(guī)律研究方向,分析5G環(huán)境下安全對抗博弈研究的必要性及面臨的挑戰(zhàn),為5G網(wǎng)絡(luò)空間安全攻防對抗研究提供新視角。
  • 圖  1  5G網(wǎng)絡(luò)架構(gòu)及新增典型安全需求

    圖  2  多天線系統(tǒng)竊聽與協(xié)作竊聽對抗以及干擾與干擾對抗

    表  1  典型的網(wǎng)絡(luò)空間安全對抗博弈模型

    博弈類型博弈模型參考文獻(xiàn)
    基于靜態(tài)博弈的安全對抗斯塔伯克博弈[19-25]
    貝葉斯博弈[26]
    隨機(jī)博弈[27-30]
    混合策略博弈[31]
    零和博弈[32,33]
    完全/不完全信息博弈[20,26,30]
    基于動(dòng)態(tài)博弈的安全對抗完全/不完全信息博弈[34,35]
    微分博弈[36-38]
    信號(hào)傳遞博弈[39]
    基于馬爾可夫判決[40,41]
    遞階對策[42]
    基于演化博弈的安全對抗對稱/非對稱博弈[43,44]
    完全/不完全信息演化博弈[45]
    馬爾可夫演化博弈[46]
    結(jié)合圖論的博弈對抗貝葉斯攻擊圖[47]
    概率攻擊圖[48]
    下載: 導(dǎo)出CSV

    表  2  5G無線接入網(wǎng)中的典型安全對抗博弈

    對抗種類應(yīng)用模型參考文獻(xiàn)
    竊聽與竊聽對抗斯塔伯克博弈[52-59]
    契約理論[60]
    拍賣模型[61-63]
    聯(lián)盟博弈[64]
    Bertrand博弈[65,66]
    零和博弈[67,68]
    干擾與干擾對抗斯塔伯克博弈[22,23]
    貝葉斯博弈[69]
    協(xié)作干擾攻擊間的博弈[70]
    基于學(xué)習(xí)的干擾對抗[71,72]
    下載: 導(dǎo)出CSV
  • International Telecommunications Union. Framework and overall objectives of the future development of IMT for 2020 and beyond[R]. ITU-R, 2015.
    CUI Qimei, SHI Yulong, TAO Xiaofeng, et al. A unified protocol stack solution for LTE and WLAN in future mobile converged networks[J]. IEEE Wireless Communications, 2014, 21(6): 24–33. doi: 10.1109/MWC.2014.7000968
    WU Huici, TAO Xiaofeng, ZHANG Ning, et al. Cooperative UAV cluster-assisted terrestrial cellular networks for ubiquitous coverage[J]. IEEE Journal on Selected Areas in Communications, 2018, 36(9): 2045–2058. doi: 10.1109/JSAC.2018.2864418
    LORENZ C, HOCK D, SCHERER J, et al. An SDN/NFV-enabled enterprise network architecture offering fine-grained security policy enforcement[J]. IEEE Communications Magazine, 2017, 55(3): 217–223. doi: 10.1109/MCOM.2017.1600414CM
    ORDONEZ-LUCENA J, AMEIGEIRAS P, LOPEZ D, et al. Network slicing for 5G with SDN/NFV: Concepts, architectures, and challenges[J]. IEEE Communications Magazine, 2017, 55(5): 80–87. doi: 10.1109/MCOM.2017.1600935
    XU Xiaodong, ZHANG Huixin, DAI Xun, et al. SDN based next generation mobile network with service slicing and trials[J]. China Communications, 2014, 11(2): 65–77. doi: 10.1109/CC.2014.6821738
    唐倫, 周鈺, 楊友超, 等. 5G網(wǎng)絡(luò)切片場景中基于預(yù)測的虛擬網(wǎng)絡(luò)功能動(dòng)態(tài)部署算法[J]. 電子與信息學(xué)報(bào), 2019, 41(9): 2071–2078. doi: 10.11999/JEIT180894

    TANG Lun, ZHOU Yu, YANG Youchao, et al. Virtual network function dynamic deployment algorithm based on prediction for 5G network slicing[J]. Journal of Electronics &Information Technology, 2019, 41(9): 2071–2078. doi: 10.11999/JEIT180894
    RUPPRECHT D, DABROWSKI A, HOLZ T, et al. On security research towards future mobile network generations[J]. IEEE Communications Surveys & Tutorials, 2018, 20(3): 2518–2542. doi: 10.1109/COMST.2018.2820728
    DUAN Xiaoyu and WANG Xianbin. Authentication handover and privacy protection in 5G HetNets using software-defined networking[J]. IEEE Communications Magazine, 2015, 53(4): 28–35. doi: 10.1109/MCOM.2015.7081072
    LU Xiao, NIYATO D, JIANG Hai, et al. Cyber insurance for heterogeneous wireless networks[J]. IEEE Communications Magazine, 2018, 56(6): 21–27. doi: 10.1109/MCOM.2018.1700504
    季新生, 徐水靈, 劉文彥, 等. 一種面向安全的虛擬網(wǎng)絡(luò)功能動(dòng)態(tài)異構(gòu)調(diào)度方法[J]. 電子與信息學(xué)報(bào), 2019, 41(10): 2435–2441. doi: 10.11999/JEIT181130

    JI Xinsheng, XU Shuiling, LIU Wenyan, et al. A security-oriented dynamic and heterogeneous scheduling method for virtual network function[J]. Journal of Electronics &Information Technology, 2019, 41(10): 2435–2441. doi: 10.11999/JEIT181130
    ITU WP 5D. Minimum requirements related to technical performance for IMT-2020 radio interface(s)[R]. ITU-R, 2017.
    馮登國, 徐靜, 蘭曉. 5G移動(dòng)通信網(wǎng)絡(luò)安全研究[J]. 軟件學(xué)報(bào), 2018, 29(6): 1813–1825. doi: 10.13328/j.cnki.jos.005547

    FENG Dengguo, XU Jing, and LAN Xiao. Study on 5G mobile communication network security[J]. Journal of Software, 2018, 29(6): 1813–1825. doi: 10.13328/j.cnki.jos.005547
    CAO Jin, MA Maode, LI Hui, et al. A survey on security aspects for 3GPP 5G networks[J]. IEEE Communications Surveys & Tutorials, 2020, 22(1): 170–195. doi: 10.1109/COMST.2019.2951818
    KHAN R, KUMAR P, JAYAKODY D N K, et al. A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions[J]. IEEE Communications Surveys & Tutorials, 2020, 22(1): 196–248. doi: 10.1109/COMST.2019.2933899
    PONNIAH J, HU Y C, and KUMAR P R. A system-theoretic clean slate approach to provably secure Ad-Hoc wireless networking[J]. IEEE Transactions on Control of Network Systems, 2016, 3(2): 206–217. doi: 10.1109/TCNS.2015.2428309
    ALPCAN T and BASAR T. Network Security: A Decision and Game-theoretic Approach[M]. Cambridge: Cambridge University Press, 2010: 37–313.
    楊義先, 鈕心忻. 安全通論[M]. 北京: 電子工業(yè)出版社, 2018: 39–173.

    YANG Yixian and NIU Xinxin. General Theory of Information Security[M]. Beijing: Publishing House of Electronic Industry, 2018: 39–173.
    DURKOTA K, LISY V, KIEKINTVELD C, et al. Case studies of network defense with attack graph games[J]. IEEE Intelligent Systems, 2016, 31(5): 24–30. doi: 10.1109/MIS.2016.74
    SANJAB A and SAAD W. Data injection attacks on smart grids with multiple adversaries: A game-theoretic perspective[J]. IEEE Transactions on Smart Grid, 2016, 7(4): 2038–2049. doi: 10.1109/TSG.2016.2550218
    WANG Kun, YUAN Li, MIYAZAKI T, et al. Jamming and eavesdropping defense in green cyber-physical transportation systems using a stackelberg game[J]. IEEE Transactions on Industrial Informatics, 2018, 14(9): 4232–4242. doi: 10.1109/TII.2018.2841033
    AHMED I K and FAPOJUWO A O. Stackelberg equilibria of an anti-jamming game in cooperative cognitive radio networks[J]. IEEE Transactions on Cognitive Communications and Networking, 2018, 4(1): 121–134. doi: 10.1109/TCCN.2017.2769121
    JIA Luliang, XU Yuhua, SUN Youming, et al. Stackelberg game approaches for anti-jamming defence in wireless networks[J]. IEEE Wireless Communications, 2018, 25(6): 120–128. doi: 10.1109/MWC.2017.1700363
    LI Yuzhe, SHI Dawei, and CHEN Tongwen. False data injection attacks on networked control systems: A stackelberg game analysis[J]. IEEE Transactions on Automatic Control, 2018, 63(10): 3503–3509. doi: 10.1109/TAC.2018.2798817
    HAN Yi, ALPCAN T, CHAN J, et al. A game theoretical approach to defend against co-resident attacks in cloud computing: Preventing co-residence using semi-supervised learning[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(3): 556–570. doi: 10.1109/TIFS.2015.2505680
    LA Q D, QUEK T Q S, LEE J, et al. Deceptive attack and defense game in honeypot-enabled networks for the internet of things[J]. IEEE Internet of Things Journal, 2016, 3(6): 1025–2035. doi: 10.1109/JIOT.2016.2547994
    WANG Chunlei, MIAO Qing, and DAI Yiqi. Network survivability analysis based on stochastic game model[C]. The 4th International Conference on Multimedia Information Networking and Security, Nanjing, China, 2014: 199–204. doi: 10.1109/MINES.2012.147.
    WEI Longfei, SARWAT A F, SAAD W, et al. Stochastic games for power grid protection against coordinated cyber-physical attacks[J]. IEEE Transactions on Smart Grid, 2018, 9(2): 684–694. doi: 10.1109/TSG.2016.2561266
    王元卓, 林闖, 程學(xué)旗, 等. 基于隨機(jī)博弈模型的網(wǎng)絡(luò)攻防量化分析方法[J]. 計(jì)算機(jī)學(xué)報(bào), 2010, 33(9): 1748–1762. doi: 10.3724/SP.J.1016.2010.01748

    WANG Yuanzhuo, LIN Chuang, CHENG Xueqi, et al. Analysis for network attack-defense based on stochastic game model[J]. Chinese Journal of Computers, 2010, 33(9): 1748–1762. doi: 10.3724/SP.J.1016.2010.01748
    DORASZELSKI U and ESCOBAR J F. A theory of regular markov perfect equilibria in dynamic stochastic games: Genericity, stability, and purification[J]. Theoretical Economics, 2010, 5(2): 369–402. doi: 10.3982/TE632
    XIAO Liang, XU Dongjin, XIE Caixia, et al. Cloud storage defense against advanced persistent threats: A prospect theoretic study[J]. IEEE Journal on Selected Areas in Communications, 2017, 35(3): 534–544. doi: 10.1109/JSAC.2017.2659418
    ZHANG Rui, ZHU Quanyan, and HAYEL Y. A Bi-level game approach to attack-aware cyber insurance of computer networks[J]. IEEE Journal on Selected Areas in Communications, 2017, 35(3): 779–794. doi: 10.1109/JSAC.2017.2672378
    MIN Minghui, XIAO Liang, XIE Caixia, et al. Defense against advanced persistent threats in dynamic cloud storage: A colonel blotto game approach[J]. IEEE Internet of Things Journal, 2018, 5(6): 4250–4261. doi: 10.1109/JIOT.2018.2844878
    LASZKA A, HORVATH G, FELEGYHAZI M, et al. FlipThem: Modeling Targeted Attacks with Flipit for Multiple Resources[M]. POOVENDRAN R and SAAD W. Decision and Game Theory for Security. Cham: Springer, 2014: 175–194. doi: 10.1007/978-3-319-12601-2_10.
    WANG Chong, HOU Yunhe, and TEN C W. Determination of Nash equilibrium based on plausible attack-defense dynamics[J]. IEEE Transactions on Power Systems, 2017, 32(5): 3670–3680. doi: 10.1109/TPWRS.2016.2635156
    HUANG Shirui, ZHANG Hengwei, WANG Jindong, et al. Markov differential game for network defense decision-making method[J]. IEEE Access, 2018, 6: 39621–39634. doi: 10.1109/ACCESS.2018.2848242
    ZHANG Hengwei, JIANG Lü, HUANG Shirui, et al. Attack-defense differential game model for network defense strategy selection[J], IEEE Access, 2018, 7: 50618–50629. doi: 10.1109/ACCESS.2018.2880214.
    GARCIA E, CASBEER D W, and PACHTER M. Design and analysis of state-feedback optimal strategies for the differential game of active defense[J]. IEEE Transactions on Automatic Control, 2019, 64(2): 553–568. doi: 10.1109/TAC.2018.2828088
    SHEN Shigen, LI Yuanjie, XU Hongyun, et al. Signaling game based strategy of intrusion detection in wireless sensor networks[J]. Computers & Mathematics with Applications, 2011, 62(6): 2404–2416. doi: 10.1016/j.camwa.2011.07.027
    MALEKI H, VALIZADEH S, KOCH W, et al. Markov modeling of moving target defense games[C]. The 2016 ACM Workshop on Moving Target Defense, Vienna, Austria, 2016: 81–92. doi: 10.1145/2995272.2995273.
    LEI Cheng, MA Duohe, and ZHANG Hongqi. Optimal strategy selection for moving target defense based on Markov game[J]. IEEE Access, 2017, 5: 156–169. doi: 10.1109/ACCESS.2016.2633983
    SEDJELMACI S A H, BRAHMI I H, ANSARI N, et al. Cyber security framework for vehicular network based on a hierarchical game[J]. IEEE Transactions on Emerging Topics in Computing, 2019. doi: 10.1109/TETC.2018.2890476
    BALKENBORG D and SCHLAG K H. On the interpretation of evolutionary stable sets in symmetric and asymmetric games[R]. Mimeo, Bonn University Economics Department, 1994.
    FIONDELLA L, RAHMAN A, LOWNES N, et al. Defense of high-speed rail with an evolutionary algorithm guided by game theory[J]. IEEE Transactions on Reliability, 2016, 65(2): 674–686. doi: 10.1109/TR.2015.2491602
    HU Hao, LIU Yuling, ZHANG Hongqi, et al. Optimal network defense strategy selection based on incomplete information evolutionary game[J]. IEEE Access, 2018, 6: 29806–29821. doi: 10.1109/ACCESS.2018.2841885
    HUANG Jianming, ZHANG Hengwei, and WANG Jindong. Markov evolutionary games for network defense strategy selection[J]. IEEE Access, 2017, 5: 19505–19516. doi: 10.1109/ACCESS.2017.2753278
    MIEHLING E, RASOULI M, and TENEKETZIS D. Optimal defense policies for partially observable spreading processes on Bayesian attack graphs[C]. The 2nd ACM Workshop on Moving Target Defense, Colorado, USA, 2015: 67–76.
    陳小軍, 方濱興, 譚慶豐, 等. 基于概率攻擊圖的內(nèi)部攻擊意圖推斷算法研究[J]. 計(jì)算機(jī)學(xué)報(bào), 2014, 37(1): 62–72.

    CHEN Xiaojun, FANG Binxing, TAN Qingfeng, et al. Inferring attack intent of malicious insider based on probabilistic attack graph model[J]. Chinese Journal of Computers, 2014, 37(1): 62–72.
    FUDENBERG D and TIROLE J. Game Theory[M]. Cambridge: Massachusetts Institute of Technology Press, 1991: 65–203.
    ABASS A A A, XIAO Liang, MANDAYAM N B, et al. Evolutionary game theoretic analysis of advanced persistent threats against cloud storage[J]. IEEE Access, 2017, 5: 8482–8491. doi: 10.1109/ACCESS.2017.2691326
    BHARATHI S, KUMAR D, and RAM D. Defence against responsive and non-responsive jamming attack in cognitive radio networks: An evolutionary game theoretical approach[J]. The Journal of Engineering, 2018, 2018(2): 68–75. doi: 10.1049/joe.2017.0285
    HAN Zhu, MARINA N, DEBBAH M, et al. Physical layer security game: How to date a girl with her boyfriend on the same table[C]. The 1st ICST International Conference on Game Theory for Networks, Istanbul, Turkey, 2009: 287–294. doi: 10.1109/GAMENETS.2009.5137412.
    ZHANG Rongqing, SONG Lingyang, HAN Zhu, et al. Physical layer security for two-way untrusted relaying with friendly jammers[J]. IEEE Transactions on Vehicular Technology, 2012, 61(8): 3693–3704. doi: 10.1109/TVT.2012.2209692
    CHU Zheng, CUMANAN K, DING Zhiguo, et al. Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer[J]. IEEE Transactions on Vehicular Technology, 2015, 64(5): 1833–1847. doi: 10.1109/TVT.2014.2336092
    WU Huici, TAO Xiaofeng, HAN Zhu, et al. Secure transmission in MISOME wiretap channel with multiple assisting jammers: Maximum secrecy rate and optimal power allocation[J]. IEEE Transactions on Communications, 2017, 65(2): 775–789. doi: 10.1109/TCOMM.2016.2636288
    FANG He, XU Li, and WANG Xianbin. Coordinated multiple-relays based physical-layer security improvement: A single-leader multiple-followers stackelberg game scheme[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(1): 197–209. doi: 10.1109/TIFS.2017.2746001
    FANG He, XU Li, ZOU Yulong, et al. Three-stage stackelberg game for defending against full-duplex active eavesdropping attacks in cooperative communication[J]. IEEE Transactions on Vehicular Technology, 2018, 67(11): 10788–10799. doi: 10.1109/TVT.2018.2868900
    WANG Wei, TEH K C, LI K H, et al. On the impact of adaptive eavesdroppers in multi-antenna cellular networks[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(2): 269–279. doi: 10.1109/TIFS.2017.2746010
    LUO Yijie, FENG Zhibin, JIANG Han, et al. Game-theoretic learning approaches for secure D2D communications against full-duplex active eavesdropper[J]. IEEE Access, 2019, 7: 41324–41335. doi: 10.1109/ACCESS.2019.2906845
    LI Meng, ZHANG Yanru, WANG Li, et al. Incentive design for collaborative jamming using contract theory in physical layer security[C]. 2016 IEEE/CIC International Conference on Communications in China, Chengdu, China, 2016: 1–6, doi: 10.1109/ICCChina.2016.7636873.
    HAN Zhu, MARINA N, DEBBAH M, et al. Improved wireless secrecy rate using distributed auction theory[C]. The 5th International Conference on Mobile Ad-hoc and Sensor Networks, Fujian, China, 2009: 442–447. doi: 10.1109/MSN.2009.73.
    ZHANG Rongqing, SONG Lingyang, HAN Zhu, et al. Improve physical layer security in cooperative wireless network using distributed auction games[C]. 2011 IEEE Conference on Computer Communications Workshops, Shanghai, China, 2011: 18–23. doi: 10.1109/INFCOMW.2011.5928805.
    KHAN A S, RAHULAMATHAVAN Y, BASUTLI B, et al. Blockchain-based distributive auction for relay-assisted secure communications[J]. IEEE Access, 2019, 7: 95555–95568. doi: 10.1109/ACCESS.2019.2929136
    SAAD W, HAN Zhu, BASAR T, et al. Physical layer security: Coalitional games for distributed cooperation[C]. The 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Seoul, South Korea, 2009: 1–8.
    WANG Kun, YUAN Li, MIYAZAKI T, et al. Strategic antieavesdropping game for physical layer security in wireless cooperative networks[J]. IEEE Transactions on Vehicular Technology, 2017, 66(10): 9448–9457. doi: 10.1109/TVT.2017.2703305
    WANG Kun, YUAN Li, MIYAZAKI T, et al. Antieavesdropping with selfish jamming in wireless networks: A Bertrand game approach[J]. IEEE Transactions on Vehicular Technology, 2017, 66(7): 6268–6279. doi: 10.1109/TVT.2016.2639827
    YUKSEL M, LIU Xi, and ERKIP E. A secure communication game with a relay helping the eavesdropper[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 818–830. doi: 10.1109/TIFS.2011.2125956
    ALSABA Y, LEOW C Y, and ABDUL RAHIM S K. A zero-sum game approach for non-orthogonal multiple access systems: Legitimate eavesdropper case[J]. IEEE Access, 2018, 6: 58764–58773. doi: 10.1109/ACCESS.2018.2874215
    SAGDUYU Y E, BERRY R, and EPHREMIDES A. MAC games for distributed wireless network security with incomplete information of selfish and malicious user types[C]. The 2009 International Conference on Game Theory for Networks, Istanbul, Turkey, 2009: 130–139. doi: 10.1109/GAMENETS.2009.5137394.
    TANG Ling, CHEN Hao, and LI Qianmu. Social tie based cooperative jamming for physical layer security[J]. IEEE Communications Letters, 2015, 19(10): 1790–1793. doi: 10.1109/LCOMM.2015.2462826
    Lü Shichao, XIAO Liang, HU Qing, et al. Anti-jamming power control game in unmanned aerial vehicle networks[C]. 2017 IEEE Global Communications Conference, Singapore, 2017: 1–6. doi: 10.1109/GLOCOM.2017.8253988.
    LU Xiaozhen, XU Dongjin, XIAO Liang, et al. Anti-jamming communication game for UAV-aided VANETs[C]. 2017 IEEE Global Communications Conference, Singapore, 2017: 1–6. doi: 10.1109/GLOCOM.2017.8253987.
  • 加載中
圖(2) / 表(2)
計(jì)量
  • 文章訪問數(shù):  3619
  • HTML全文瀏覽量:  1596
  • PDF下載量:  451
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2020-01-15
  • 修回日期:  2020-06-19
  • 網(wǎng)絡(luò)出版日期:  2020-06-26
  • 刊出日期:  2020-10-13

目錄

    /

    返回文章
    返回