2017
DOI: 10.1007/978-3-319-60834-1_23
|View full text |Cite
|
Sign up to set email alerts
|

A Game Theoretic Approach for Optimal and Secure Routing in WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…In the study conducted earlier [15], the coverage problem was handled by adapting kalman filter which in turn improved the network lifetime as well. Similarly, a secure routing with game theoretic scheme was presented in [16]. This scheme is capable of reducing the power consumption, balance and traffic with the adaption of Elliptic Curve Cryptography (ECC).…”
Section: Related Workmentioning
confidence: 99%
“…In the study conducted earlier [15], the coverage problem was handled by adapting kalman filter which in turn improved the network lifetime as well. Similarly, a secure routing with game theoretic scheme was presented in [16]. This scheme is capable of reducing the power consumption, balance and traffic with the adaption of Elliptic Curve Cryptography (ECC).…”
Section: Related Workmentioning
confidence: 99%
“…Ramkumar et al 9 have presented a secure routing with game theory, which is capable of reducing the power, balance and traffic with the adaption of ECC. Lazrag et al 10 have presented a trust‐based model that considers the persistence of correct behavior of nodes in route selection. Saini and Ahlawat 11 have presented a trust orient secure routing scheme, which inherits different features by including energy and trust to identify a least hop route, and the authentication is performed using key exchange.…”
Section: Related Workmentioning
confidence: 99%
“…In [45], the author discusses the requirement of secure routing scheme where data aggregation is performed. The impact of energy of nodes in routing has been discussed in detail in [46]. According to this, the methods of secure routing are classified as follows:…”
Section: Literature Surveymentioning
confidence: 99%