2011
DOI: 10.4304/jnw.6.3.521-532
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Game Theory in Wireless Sensor Networks Security

Abstract:

Wireless Sensor Networks (WSNs) are becoming an integral part of our lives. There are not widespread applications of WSNs without ensuring WSNs security. Due to the limited capabilities of sensor nodes in terms of computation, communication, and energy, providing security to WSNs is challenging. In fact, the process of implementing WSNs security is adaptive and dynamic, which evolves continually. The essence of attack-defend in WSNs security can be expressed by mutual strategies of interdep… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
45
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 54 publications
(45 citation statements)
references
References 57 publications
0
45
0
Order By: Relevance
“…Opposite situations, where the attacker can move a resource and the defender cannot, come under the name of ambush games [28]. In the specific field of WSNs, four main applications for security are currently studied in the literature (see [29] for a detailed survey): preventing denial of services (DoS) attacks [30], [31], [32], intrusion detection [33], [34], [35], strengthening security [36], [37], coexistence of malicious and nonmalicious nodes [38]. In the following, we briefly review the main works.…”
Section: Related Workmentioning
confidence: 99%
“…Opposite situations, where the attacker can move a resource and the defender cannot, come under the name of ambush games [28]. In the specific field of WSNs, four main applications for security are currently studied in the literature (see [29] for a detailed survey): preventing denial of services (DoS) attacks [30], [31], [32], intrusion detection [33], [34], [35], strengthening security [36], [37], coexistence of malicious and nonmalicious nodes [38]. In the following, we briefly review the main works.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, Zahariadis et al [2010a] build a taxonomy of trust metrics, which includes consistency of reported values/data, but they focus mostly on the other network-related metrics. Also Shen et al [2011] survey defensive strategies against attacks to the network layer. In particular, such strategies are derived from game theory and take into account the strategies that can be adopted by the attacker to balance the profit and loss of reputation coming from the attack; in our survey instead, we focus on techniques to assign and maintain such reputation.…”
Section: Related Surveysmentioning
confidence: 99%
“…First, pairwise preferences are computed from the preference sequences of Table 2. Initially, when 1 T and…”
Section: T T T T T    mentioning
confidence: 99%
“…There are several challenging areas in WSNs such as target searching/tracking, topology control, routing protocol, energy saving, power control etc., which are handled by GT. GT is one of the potential tool used to solve several security-related problems in WSNs: preventing DoS attacks, intrusion detection, detecting malicious nodes etc [1][2][3].…”
Section: Introductionmentioning
confidence: 99%