Abstract
This paper presents a comprehensive study on applications of game theory to face the security problems in wireless sensor networks. The dynamic nature of WSNs makes them vulnerable to different security challenges. In the literature, three techniques have been proposed to protect WSNs from malicious nodes, cryptography, trust-based methods, and game theory. In this paper, we review the major game theory approaches to overcome denial-of-service attacks and selfish behaviors in wireless sensor networks; we propose at the end the fusion of cryptography techniques and game theory for more privacy and security. Finally, we discuss some limitations of game theory solutions in WSNs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
M. Elappila, S. Chinara, D.R. Parhi, Survivable path routing in WSN for IoT applications. Pervasive Mob. Comput. (2017)
P. Spachos, L. Song, D. Hatzinakos, Comparison of traditional and opportunistic multihop routing in wireless networking scalability, vol. 1, pp. 182–185 (2012)
E. Efficiency, K. Zeng, Opportunistic routing in multihop wireless networks (2008)
A.A. Abins, N. Duraipandian, A survey on opportunistic routing protocols in wireless networks. Proc. Comput. Sci. 10(3), 148–153 (2015)
Y. Xu, P. Scerri, M. Lewis, K. Sycara, Token-based approach for scalable team coordination
E. Rozner, J. Seshadri, Y. Mehta, L. Qiu, SOAR: Simple opportunistic adaptive routing protocol for wireless mesh networks. IEEE Trans. Mob. Comput. 8(12), 1622–1635 (2009)
F.A. Aoudia, M. Gautier, O. Berder, OPWUM : opportunistic MAC protocol leveraging wake-up receivers in WSNs, vol. 2016 (2016)
G. Hosseinabadi, N. Vaidya, Token-DCF: an opportunistic MAC protocol for wireless networks (2012)
F. Wu, K. Gong, T. Zhang, G. Chen, COMO: A game-theoretic approach for joint multirate opportunistic routing and forwarding in non-cooperative wireless networks, vol. 1276, pp. 1–12 (2014)
A. Chhabra, V. Vashishth, D.K. Sharma, A game theory based secure model against black hole attacks in opportunistic networks (2017)
J. Newsome, D. Song, A. Perrig, The sybil attack in sensor networks: analysis & defenses (2004)
K. Zhang, R. Wang, D. Qian, AIM: An auction incentive mechanism in wireless networks with opportunistic routing (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Saidi, H., Gretete, D., Addaim, A. (2020). Game Theory for Wireless Sensor Network Security. In: Yang, XS., Sherratt, S., Dey, N., Joshi, A. (eds) Fourth International Congress on Information and Communication Technology. Advances in Intelligent Systems and Computing, vol 1041. Springer, Singapore. https://doi.org/10.1007/978-981-15-0637-6_21
Download citation
DOI: https://doi.org/10.1007/978-981-15-0637-6_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0636-9
Online ISBN: 978-981-15-0637-6
eBook Packages: EngineeringEngineering (R0)