Advertisement

Game Theory for Wireless Sensor Network Security

  • Hanane SaidiEmail author
  • Driss Gretete
  • Adnane Addaim
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1041)

Abstract

This paper presents a comprehensive study on applications of game theory to face the security problems in wireless sensor networks. The dynamic nature of WSNs makes them vulnerable to different security challenges. In the literature, three techniques have been proposed to protect WSNs from malicious nodes, cryptography, trust-based methods, and game theory. In this paper, we review the major game theory approaches to overcome denial-of-service attacks and selfish behaviors in wireless sensor networks; we propose at the end the fusion of cryptography techniques and game theory for more privacy and security. Finally, we discuss some limitations of game theory solutions in WSNs.

Keywords

Wireless sensor networks Game theory Security 

References

  1. 1.
    M. Elappila, S. Chinara, D.R. Parhi, Survivable path routing in WSN for IoT applications. Pervasive Mob. Comput. (2017)Google Scholar
  2. 2.
    P. Spachos, L. Song, D. Hatzinakos, Comparison of traditional and opportunistic multihop routing in wireless networking scalability, vol. 1, pp. 182–185 (2012)Google Scholar
  3. 3.
    E. Efficiency, K. Zeng, Opportunistic routing in multihop wireless networks (2008)Google Scholar
  4. 4.
    A.A. Abins, N. Duraipandian, A survey on opportunistic routing protocols in wireless networks. Proc. Comput. Sci. 10(3), 148–153 (2015)Google Scholar
  5. 5.
    Y. Xu, P. Scerri, M. Lewis, K. Sycara, Token-based approach for scalable team coordinationGoogle Scholar
  6. 6.
    E. Rozner, J. Seshadri, Y. Mehta, L. Qiu, SOAR: Simple opportunistic adaptive routing protocol for wireless mesh networks. IEEE Trans. Mob. Comput. 8(12), 1622–1635 (2009)CrossRefGoogle Scholar
  7. 7.
    F.A. Aoudia, M. Gautier, O. Berder, OPWUM : opportunistic MAC protocol leveraging wake-up receivers in WSNs, vol. 2016 (2016)Google Scholar
  8. 8.
    G. Hosseinabadi, N. Vaidya, Token-DCF: an opportunistic MAC protocol for wireless networks (2012)Google Scholar
  9. 9.
    F. Wu, K. Gong, T. Zhang, G. Chen, COMO: A game-theoretic approach for joint multirate opportunistic routing and forwarding in non-cooperative wireless networks, vol. 1276, pp. 1–12 (2014)Google Scholar
  10. 10.
    A. Chhabra, V. Vashishth, D.K. Sharma, A game theory based secure model against black hole attacks in opportunistic networks (2017)Google Scholar
  11. 11.
    J. Newsome, D. Song, A. Perrig, The sybil attack in sensor networks: analysis & defenses (2004)Google Scholar
  12. 12.
    K. Zhang, R. Wang, D. Qian, AIM: An auction incentive mechanism in wireless networks with opportunistic routing (2010)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Ibn Tofail UniversityKenitraMorocco

Personalised recommendations