Skip to main content

Game Theory for Wireless Sensor Network Security

  • Conference paper
  • First Online:
Fourth International Congress on Information and Communication Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1041))

  • 721 Accesses

Abstract

This paper presents a comprehensive study on applications of game theory to face the security problems in wireless sensor networks. The dynamic nature of WSNs makes them vulnerable to different security challenges. In the literature, three techniques have been proposed to protect WSNs from malicious nodes, cryptography, trust-based methods, and game theory. In this paper, we review the major game theory approaches to overcome denial-of-service attacks and selfish behaviors in wireless sensor networks; we propose at the end the fusion of cryptography techniques and game theory for more privacy and security. Finally, we discuss some limitations of game theory solutions in WSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M. Elappila, S. Chinara, D.R. Parhi, Survivable path routing in WSN for IoT applications. Pervasive Mob. Comput. (2017)

    Google Scholar 

  2. P. Spachos, L. Song, D. Hatzinakos, Comparison of traditional and opportunistic multihop routing in wireless networking scalability, vol. 1, pp. 182–185 (2012)

    Google Scholar 

  3. E. Efficiency, K. Zeng, Opportunistic routing in multihop wireless networks (2008)

    Google Scholar 

  4. A.A. Abins, N. Duraipandian, A survey on opportunistic routing protocols in wireless networks. Proc. Comput. Sci. 10(3), 148–153 (2015)

    Google Scholar 

  5. Y. Xu, P. Scerri, M. Lewis, K. Sycara, Token-based approach for scalable team coordination

    Google Scholar 

  6. E. Rozner, J. Seshadri, Y. Mehta, L. Qiu, SOAR: Simple opportunistic adaptive routing protocol for wireless mesh networks. IEEE Trans. Mob. Comput. 8(12), 1622–1635 (2009)

    Article  Google Scholar 

  7. F.A. Aoudia, M. Gautier, O. Berder, OPWUM : opportunistic MAC protocol leveraging wake-up receivers in WSNs, vol. 2016 (2016)

    Google Scholar 

  8. G. Hosseinabadi, N. Vaidya, Token-DCF: an opportunistic MAC protocol for wireless networks (2012)

    Google Scholar 

  9. F. Wu, K. Gong, T. Zhang, G. Chen, COMO: A game-theoretic approach for joint multirate opportunistic routing and forwarding in non-cooperative wireless networks, vol. 1276, pp. 1–12 (2014)

    Google Scholar 

  10. A. Chhabra, V. Vashishth, D.K. Sharma, A game theory based secure model against black hole attacks in opportunistic networks (2017)

    Google Scholar 

  11. J. Newsome, D. Song, A. Perrig, The sybil attack in sensor networks: analysis & defenses (2004)

    Google Scholar 

  12. K. Zhang, R. Wang, D. Qian, AIM: An auction incentive mechanism in wireless networks with opportunistic routing (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hanane Saidi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Saidi, H., Gretete, D., Addaim, A. (2020). Game Theory for Wireless Sensor Network Security. In: Yang, XS., Sherratt, S., Dey, N., Joshi, A. (eds) Fourth International Congress on Information and Communication Technology. Advances in Intelligent Systems and Computing, vol 1041. Springer, Singapore. https://doi.org/10.1007/978-981-15-0637-6_21

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0637-6_21

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0636-9

  • Online ISBN: 978-981-15-0637-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics