Abstract:We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.
Nowadays, trust models of wireless sensor networks (WSNs) security have flourished due to the day-today attack challenges, which are most popular for internet of things (IoT). This article proposes a trust model based on non-zero-sum game approach for clustered-WSNs (CWSNs) security to maximise the data trustworthiness transmission. The proposed model is developed for two different attack-defence scenarios. In the first scenario, the trust model is used to face a denial-of-service (DoS) attack in which the attacker is able to drop or partially drop the delivered acknowledgments (ACKs) from a cluster member (CM) to the cluster head (CH). In the second scenario, the model target is to protect CWSNs from ON-OFF attack where the attacker is capable to frequently infect the CMs. Simulation results show improved performance of protecting the CWSNs against DoS/ON-OFF attacks and maximising data trustworthiness represented by the CMs compliance of sending the ACKs to the CH. Consequently, this mechanism can attain the appropriate security and performance for WSN-based IoT systems.
The rapid development of wireless sensor networks (WSNs) is the significant incentive to contribute in the vulnerable applications such as cognitive radio (CR). This paper proposes a Stackelberg game approach to enhance the WSN-based CR security against the spectrum sensing data falsification (SSDF) attack and conserve the consequent lost power consumption. The attack aims to corrupt the spectrum decision by imposing interference power to the delivered reports from the sensor nodes (SNs) to the fusion center (FC) to make a protection level below a specific threshold. The proposed model utilizes the intelligent Stackelberg game features along with the matched filter (MF) to maximize the number of protected reports sent by the SNs to the FC leading to accurate decision of the spectrum status. Furthermore, the TDMA protocol is utilized to resolve the complexity of employing MF for the spectrum detection to avoid the collision between the delivered reports. The proposed model aims to enhance the number of correctly received reports at the FC, and hence manage the lost energy of reports retransmission due to the malicious attack effect. Moreover, the model can conserve the lost power of the failure communication attempts due to the SSDF attack impact. Simulation results indicate the improved performance of the proposed protection model along with the MF over the six different environments against the SSDF attack as compared to two defense schemes, namely, random and equal weight defense strategies.In this regard, secured WSNs can dramatically contribute in CR networks (CRNs) as the fusion center (FC) needs to rely on distributed sensor nodes (SNs) to sense the spectrum status. In other words, WSNs suffer from security and power management problems specially in harsh environments. The uncontrolled WSNs security is a double defect: one is data deterioration and second is losing power consumption in transmission of designated infected data. Consequently, security in WSNs-based CR is a prominent issue that has been considered in [8,[17][18][19][20][21].One of the eminent techniques utilized in the literature to handle the security problem in WSNs is game theory [22][23][24][25][26]. Game theory is a special optimization branch which tackles the interaction among a set of rational intelligent users that aim to enhance their individual gains in an intelligent and adaptive way [27]. To this end, three main dependent challenges affecting a smooth operation for CR are spectrum sensing, mitigating security threats, and the consequent lost energy. One of the security threats in CRNs is spectrum sensing data falsification (SSDF) attack [28]. Here, the defender represents the FC. Therefore, the whole communication system in such CRN can be strictly disrupted and the network performance will be steeply degraded. In addition, this attack can disrupt the delivered reports at the FC, and hence, a wrong decision will be taken by the FC about the spectrum status. Moreover, it does not only reduce the number of correctly received reports...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.