Affiliation:
1. The Lincoln University, USA
2. West Chester University of Pennsylvania, USA
Abstract
In this chapter, the authors examine the impacts of applying game theory on the network throughput, network voltage loss, and accuracy of malicious node detection in wireless sensor networks. Nodes in a wireless sensor network use our proposed protocol when deciding whether or not to forward packets they receive from other sensors in order to conserve power. Wireless sensor network nodes achieve this by optimizing their decision-making based on a framework using game theory. Defining a suitable cost and profit for routing and forwarding incoming packets and keeping a history of past behaviors of non-cooperating nodes gradually forces malicious nodes out of the wireless sensor network.In this chapter, the authors examine the impacts of applying game theory on the network throughput, network voltage loss, and accuracy of malicious node detection in wireless sensor networks. Nodes in a wireless sensor network use our proposed protocol when deciding whether or not to forward packets they receive from other sensors in order to conserve power. Wireless sensor network nodes achieve this by optimizing their decision-making based on a framework using game theory. Defining a suitable cost and profit for routing and forwarding incoming packets and keeping a history of past behaviors of non-cooperating nodes gradually forces malicious nodes out of the wireless sensor network.
Reference41 articles.
1. Agah, A., Das, S. K., & Basu, K. (2005). Enforcing security for prevention of DOS attack in wireless sensor networks using economical modeling. In Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (MASS). IEEE.
2. Agah, A., Das, S. K., & Basu, K. (2005). Preventing DOS attack in sensor and actor networks: A game theoretic approach. In Proceedings of IEEE International Conferences on Communications (ICC). IEEE.
3. Akyldiz, I. F., Sankarasubramaniam, Y., Su, W., & Cayirci, E. (2002). Wireless sensor networks: A survey. Journal of Computer Networks, 38.
4. Asadi, M., Zimmerman, C., & Agah, A. (2012). A quest for security in wireless sensor networks: A game theoretic model. In Proceedings of the International Conference on Wireless Networks (ICWN). ICWN.