“…Some techniques were developed to meet different WSNs security threats mitigation [ 1 , 2 , 3 , 4 ]. There are other techniques that are used for protection in WSNs that rely on the reputation principle [ 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 ]. These reputation-based techniques are out of the scope of this survey paper since our main focus in this paper is on game-theoretic-based protection techniques.…”