Game theory-based Routing for Wireless Sensor Networks: A Comparative Survey
<p>Categories of game theory-based routing protocols for wireless WMSNs: CH-C-TEEM: Cluster Head Cooperative Trustworthy Energy-Efficient multiinput multioutput; RCFR: Reliable Coalition Formation Routing; PRGT: Probabilistic Routing Based on Game Theory; COMO: Cooperation Optimal Protocol for Multirate Opportunistic Routing; GERA: Game-Theory-Based Energy-Efficient Routing Algorithm; GTEB: Game Theoretic Energy Balanced Routing; EEREG: Energy-Efficient Routing Protocol based on Evolutionary Game; GEEC: Game-Theory-Based Energy-Efficient Clustering; ERG: Evolutionary Routing Game; GBRA: Game-Theory-Based Routing Algorithm.</p> "> Figure 2
<p>Cooperative transmission of data by cluster heads (CHs) in pairs.</p> "> Figure 3
<p>Coalitional short-range relaying.</p> "> Figure 4
<p>Cooperative data transmission between two CHs in the protocol.</p> "> Figure 5
<p>Process of trust derivation.</p> "> Figure 6
<p>Subregion and node selection.</p> "> Figure 7
<p>Network scenario where the neighboring node knows the optimal route to the destination.</p> "> Figure 8
<p>Network scenarios where the neighboring node does not know the optimal route to the destination: (<b>a</b>) the source nodes send route request message to neighbor nodes and the neighboring nodes decide if they can be a relay, (<b>b</b>) the source node receives acknowledgements (ACKs) from the relays and calculates its own pay-off, and (<b>c</b>) the source node chooses its new relay game between <span class="html-italic">B</span> and <span class="html-italic">C</span>.</p> ">
Abstract
:1. Introduction
- Theoretical key concepts required to understand the use of game theory in WSN routing are briefly discussed;
- Routing protocols are examined in relation to their operational principles and key features;
- Routing protocols are classified based on the game applied;
- Routing protocols are compared with each other in terms of major characteristics, pros, and cons;
- Certain challenging problems in the design and implementation of a routing protocol are discussed, in addition to future research directions;
- Possible applications and future improvements of the protocols are discussed.
2. Preliminaries
2.1. Basics of Game Theory
- P = {p1, p2, p3, …, pn}, which is a set of n players;
- A = {a1, a2, a3, …, am}, which is a set of m actions;
- S = {s1, s2, s3, …, sk}, which is a set of k strategies;
- U = pay-off function to calculate the pay-off.
2.2. Games in Routing for WMSNs
2.3. Routing Metrics
3. Game Theory-Based Routing Protocols in WSNs
3.1. Routing Protocols Based on Cooperative Games
3.1.1. Cluster Head Cooperative Trustworthy Energy-efficient Multi-input Multi-output (CH-C-TEEM) Routing Protocol
- Cooperation among CHs leads to energy efficiency;
- Consideration of network security via elimination of the malicious nodes.
- Routing metrics like packet delivery ratio and end-to-end delay are also important and should have been considered while designing the protocol;
- Highly applicable for a channel fading environment where network security is a priority with lesser packet loss ratio.
- Coalition formation algorithm can be elaborated;
- More comparative analysis with the existing protocols;
- Performance analysis with important routing metrics like packet-delivery-ratio, end-to-end delay can be considered.
3.1.2. Assignment Game Approach
- The protocol is extremely energy-efficient and can perform well when several devices are involved.
- The main weakness of the protocol is not considering the downstream links (RAN to UEs)
- The scheme is especially suitable for internet of things (IoT) devices deployed using WSN paradigm;
- The protocol can be applicable for a scenario where several devices are involved.
- Consideration of downstream links;
- More routing metrics can be introduced in the performance analysis.
3.1.3. Reliable Coalition Formation Routing (RCFR) for WSNs
- Information () regarding the created coalitions is put into the table entry that is maintained by each node;
- In the route reply message of AODV, the route residual energy ratio and route cost fields are appended;
- Routes with the lowest costs are selected to find an optimal pathway using coalitional game theory;
- Rate of route residual energy parameter is presented for the optimization of the route maintenance mechanism.
- Reliable data delivery and route maintenance;
- The coalition formation game model can be integrated with the traditional protocols like AODV and dynamic source routing (DSR) [1] for better performance.
- RCFR did not consider the scenario where joining a coalition would yield a negative pay-off:
- No consideration for node failure scenario.
- Applicable for a scenario where reliable data delivery is needed.
- More routing metrics can be introduced for performance analysis;
- Implementation with DSR can be presented.
3.1.4. Probabilistic Routing Scheme Based on Game Theory (PRGT)
- It could successfully deal with the selfishness of the nodes and build cooperation for better routing to save energy;
- The mathematical formulation for the bargaining game is sound and in detail. It will be convenient for real life implementation with the sensor networks.
- Proposed protocol requires a centralized scheme. Not suitable for distributed architecture.
- Applicable for a scenario where there is a reliable backbone for the Internet. Not suitable for deployment during natural disasters.
- More routing metrics can be introduced for performance analysis.
3.1.5. Comparison of the Protocols Based on the Technical Strengths and Weaknesses
3.2. Routing Protocols Based on Noncooperative Games
3.2.1. Resource Allocation Strategy for Cluster-based WSNs
- Development of an energy consumption model with resource allocation scheme;
- The coalition formation game model can be integrated with the traditional protocols like AODV and DSR for a better performance.
- The energy consumption model is incomplete. It was based on the data transmission of the CMs. The energy consumed by the sink node and CHs were ignored.
- Application cannot be specified owing to the incomplete protocol.
- The data transmission phase between the CHs and sink node should be included;
- The energy consumption for data reception can be included in the energy consumption model;
- A performance comparison with the existing state-of-art protocols can be added.
3.2.2. Inter Cluster Routing Algorithm for a WSN
- Leads to higher residual energy of the nodes.
- The protocol is supposed to suffer from an energy hole problem. As CHs aggregate data to the sink node through cooperation, the CHs that are lying in the vicinity of the sink node will deplete energy faster;
- The authors of [39] claimed to reach Nash equilibrium point using certain conditions. Their calculations were not sufficient to prove their claim on finding the equilibrium point;
- The protocol only defines communication among the CHs. Communication between CHs and CMs should have been defined or assumed.
- It is challenging to specify any application for this protocol because it does not elaborate intra-cluster communication. Furthermore, knowing that the protocol may suffer from an energy hole problem, the network failure owing to nodes near the sink node dying early is inevitable. Improvement of this protocol before real time deployment is necessary.
- This kind of protocol, where data is aggregated by the CHs to the sink node in a cooperative manner, requires multiple sink nodes. The protocol can be redesigned by putting in effort to deploy multiple sink nodes to avoid energy hole problem and to support numerous sensor nodes participating in routing.
3.2.3. Routing Framework based in the Energy and Delay Conservation
- The protocol can successfully decrease network delay to a significant amount;
- Energy consumption was successfully decreased to a fair amount.
- The authors did not consider sufficient routing metrics in the performance comparison. A performance comparison graph on network lifetime was necessary to prove the robustness of the protocol with the compared ones.
- Applicable where an application requires continuous data delivery without any delay.
- The authors claimed that the Nash equilibrium was self-imposed. They did not provide sufficient proof to support their claim.
3.2.4. Cooperation Optimal Protocol for Multi-rate Opportunistic (COMO) Routing and Forwarding
- Considerable amount of throughput is gained in presence of the selfish nodes.
- No comparison with the existing state-of-art protocols was demonstrated.
- Applicable for high throughput multimedia data transmission.
- The only routing metric that COMO [38] covers is the end-to-end throughput. This metric is defined as the number of packets transmitted per second. Certain other important routing metrics for the performance comparison could have been considered to prove the robustness of the designed protocol.
3.2.5. Energy-Aware Trust Derivation Scheme
- Security of a WSN is considered with highest priority;
- No performance comparison with the existing state-of-the-art algorithms;
- The trust derivation problem is hop-limited. This can lead to a contradiction. Flooding in an uncontrolled and random manner may lead to energy wastage and latency. For this, hop-limited flooding is useful, but it may lead to reduced trust information collection. The authors of [32] did not mention any solution for this contradictory situation.
- Highly suitable and applicable for military applications.
- Introducing more routing metrics for performance evaluation;
- Comparison of the performance analysis with any existing state-of-art routing protocol;
- Introducing a new intelligent method of broadcasting other than hop-limited flooding to avoid energy wastage and facilitate efficient trust information gathering simultaneously.
3.2.6. Game Theory-based Energy-efficient Routing Algorithm (GERA)
- Energy is well conserved by preventing the nodes that were CHs in the previous round from being CHs in the ongoing round;
- Energy consumption was considered for both data transmission and reception.
- It is basically an extension of the LEACH protocol [68], with an improvised method of CH selection using game theory. The authors did not elaborate on the intra-cluster communication between the CMs and CH. Further, an effort should have been made to explain the LEACH protocol for a better understanding of GERA;
- The protocol cannot adapt to any kind of topology change and node failure.
- GERA can be applied to typical static WSNs that are not subjected to any kind of topology change.
- Explanation of intra-cluster time slotting can be added;
- Routing metrics like end-to-end delay and latency can be introduced for performance comparison.
3.2.7. Comparison of the Protocols Based on the Technical Strengths and Weaknesses
3.3. Routing Protocols Based on Evolutionary Games
3.3.1. Game Theoretic Energy Balanced (GTEB) Routing Protocol
- Creates an energy balance and increases network lifetime significantly;
- Intelligent method to evenly distribute network traffic in a WSN.
- Sensor nodes are capable of reporting a nearby event to the destination on a periodic manner. If the destination is far away, this may lead to energy wastage;
- The protocol is more energy efficient when there are more nodes in a subregion. If there is only one node in a subregion, the data packet is to be transmitted directly to the destination. This is a serious flaw in the protocol, as this may lead to energy wastage;
- The network lifetime was the most prioritized routing metric for GTEB. Unfortunately, the authors did not compare GTEB with a sufficient number of protocols for this metric. It was compared only to the probabilistic forwarding method and that does not prove the superiority of GTEB over the state-of-the-art protocols.
- Applicable for energy-efficient geographical routing.
- Mathematical ambiguity can be removed from the protocol. In one case, K was denoted as a set of subregions in the network, but later K was introduced as a set of strategies, which was ambiguous.
3.3.2. Energy-Efficient Routing Protocol Based on Evolutionary Game (EEREG)
- Cluster size is maintained optimally;
- Avoidance of the low energy nodes becoming a CH;
- Introducing rationality among the nodes so that the nodes with high energy level are encouraged to become CHs.
- Network lifetime is considered as the time taken for the first node to dies in the network. This is impractical because WSNs may still remain fully functional even after the death of the first node.
- Animal and plant habitat monitoring.
- The complexity of the protocol is high. In particular, complex computation involving optimal cluster size determination could have been simplified.
3.3.3. Game Theory-Based Energy-Efficient Clustering (GEEC)
- Introduces rationality to the low energy nodes;
- Pay-offs were considered differently for nodes with higher and lower energy levels.
- Some nodes may not receive advertisement from the CHs resulting in clusters with one node that directly transmits to the sink node.
- Any kind of energy-efficient target tracking and environment monitoring.
- Energy threshold determination procedure can be elaborated for the betterment of the protocol.
3.3.4. Evolutionary Routing Game for Energy Balance in WSN (ERG)
- Pure strategy Nash equilibrium and replicator dynamics of the evolutionary game were explained and formulated comprehensively. Players can not only learn strategies but also can modify it.
- One-hop transmission among nodes are discouraged by imposing lower pay-off. Multi-hop transmissions can be energy consuming.
- Any kind of energy–efficient multi-hop data transmission for WSNs.
- Some experimental results involving network lifetime could be added.
3.4. Routing Protocol Based on Reputation-Based Game
3.4.1. Game Theory-Based Routing Algorithm (GBRA) Based on Reputation
- When there is a packet to send and the destination was within the communication range, the sender sends a ROUTE REQUEST message to its neighbors;
- After certain nodes have received the ROUTE REQUEST message, there could be two scenarios. In the first scenario, a node receiving the ROUTE REQUEST message is itself the destination or knows the destination. In this case, step 5 is followed. In the second scenario, each node getting the ROUTE REQUEST message checks its remaining energy Erem. If Erem was less than Ec, the energy cost of the data transmission, the node would not transmit the data packet to save its energy. The node calculates its pay-off only when Erem ≥ Ec. If the value obtained through this calculation is greater than zero, the node sends an acknowledgement (ACK) to the sending node and acts as a relay node.
- After receiving back the ACKs from the receiving nodes, the sender node selects one among them (receiving nodes) that could maximize the sender’s pay-off to the greatest extent. Next, the sender sends a REPLY message to the chosen relay node.
- When the REPLY messages reach the relay node, a new game starts between the relay node and its next hop. The new sender attaches its ID in the source route and again forwards the ROUTE REQUEST message to its neighbors. Step 2 is repeated until a route is found.
- If the receiving node is the destination node or at least has a route to the destination, the node does not forward the packet. Rather, it replies to the sending node with the full route in a reverse order.
- Finally, when the message reaches the destination, the deduced routing path is selected.
- Good mechanism to stop packet drops;
- Mechanism to avoid malicious nodes from routing path.
- No technical integration process was mentioned for the watchdog mechanism that was used to monitor the neighboring nodes;
- No mathematical formulation or definition regarding who can be the neighbors of a sending node was presented.
- Applicable for any data sensitive application that requires continuous information sending.
- Network architecture is not well defined. To make the protocol GBRA deployable, it is necessary that the authors clarify the network architecture.
3.4.2. Comparison of the Protocols Based on the Technical Strengths and Weaknesses
4. Comparison of the Routing Protocols
5. Future Directions and Challenges
5.1. Future Research Directions
5.2. Challenging Problems
6. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Agrawal, D.; De Morais Cordeiro, C. Ad Hoc And Sensor Networks, 3rd ed.; World Scientific Publishing Company: Singapore, 2006. [Google Scholar]
- Ali, A.; Ming, Y.; Chakraborty, S.; Iram, S. A Comprehensive Survey on Real-Time Applications of WSN. Future Internet 2017, 9, 77. [Google Scholar] [CrossRef]
- Khan, M.; Rinner, B. Energy-aware task scheduling in wireless sensor networks based on cooperative reinforcement learning. In Proceedings of the 2014 IEEE International Conference on Communications Workshops (ICC), Sydney, Australia, 10–14 June 2014. [Google Scholar]
- Li, D.; Wong, K.D.; Hu, Y.H.; Sayeed, A.M. Detection, classification, and tracking of targets. IEEE Signal Process. Mag. 2002, 19, 17–29. [Google Scholar]
- Zhu, R.; Ma, M.; Zhang, Y.; Hu, J. Collaborative Wireless Sensor Networks and Applications. Int. J. Distrib. Sens. Netw. 2015, 11, 352761. [Google Scholar] [CrossRef]
- He, T.; Krogh, B.; Krishnamurthy, S.; Stankovic, J.; Abdelzaher, T.; Luo, L.; Stoleru, R.; Yan, T.; Gu, L.; Hui, J. Energy-efficient surveillance system using wireless sensor networks. In Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services—MobiSYS, New York, NY, USA, 6–9 June 2004. [Google Scholar]
- Boustani, A.; Girod, L.; Offenhuber, D.; Britter, R.; Wolf, M.; Lee, D.; Miles, S.; Biderman, A.; Ratti, C. Investigation of the waste-removal chain through pervasive computing. IBM J. Res. Dev. 2011, 55, 11:1–11:11. [Google Scholar] [CrossRef]
- Aldeer, M. A summary survey on recent applications of wireless sensor networks. In Proceedings of the 2013 IEEE Student Conference on Research and Development, Putrajaya, Malaysia, 16–17 December 2013. [Google Scholar]
- Arampatzis, T.; Lygeros, J.; Manesis, S. A Survey of Applications of Wireless Sensors and Wireless Sensor Networks. In Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, Limassol, Cyprus, 27–29 June 2005. [Google Scholar]
- Ciuonzo, D.; Salvo Rossi, P. Distributed detection of a non-cooperative target via generalized locally-optimum approaches. Inf. Fusion 2017, 36, 261–274. [Google Scholar] [CrossRef]
- Ciuonzo, D.; Salvo Rossi, P. Decision Fusion with Unknown Sensor Detection Probability. IEEE Signal Process. Lett. 2014, 21, 208–212. [Google Scholar] [CrossRef]
- Ribeiro, A.; Giannakis, G. Bandwidth-constrained distributed estimation for wireless sensor Networks-part I: Gaussian case. IEEE Trans. Signal Process. 2006, 54, 1131–1143. [Google Scholar] [CrossRef]
- Shirazinia, A.; Dey, S.; Ciuonzo, D.; Salvo Rossi, P. Massive MIMO for Decentralized Estimation of a Correlated Source. IEEE Trans. Signal Process. 2016, 64, 2499–2512. [Google Scholar] [CrossRef]
- Ribeiro, A.; Giannakis, G. Bandwidth-constrained distributed estimation for wireless sensor networks-part II: Unknown probability density function. IEEE Trans. Signal Process. 2006, 54, 2784–2796. [Google Scholar] [CrossRef]
- Chong, C.Y.; Kumar, S. Sensor networks: Evolution, opportunities, and challenges. Proc. IEEE 2003, 91, 1247–1256. [Google Scholar] [CrossRef]
- Pattem, S.; Poduri, S.; Krishnamachari, B. Energy-Quality Tradeoffs for Target Tracking in Wireless Sensor Networks. In Information Processing in Sensor Networks; Springer: Berlin/Heidelberg, Germany, 2003. [Google Scholar]
- Al-Karaki, J.; Kamal, A. Routing techniques in wireless sensor networks: A survey. IEEE Wirel. Commun. 2004, 11, 6–28. [Google Scholar] [CrossRef]
- Kosunalp, S. A New Energy Prediction Algorithm for Energy-Harvesting Wireless Sensor Networks with Q-Learning. IEEE Access 2016, 4, 5755–5763. [Google Scholar] [CrossRef]
- Pavlidou, F.; Koltsidas, G. Game theory for routing modeling in communication networks—A survey. J. Commun. Netw. 2008, 10, 268–286. [Google Scholar] [CrossRef]
- Shi, H.; Wang, W.; Kwok, N.; Chen, S. Game Theory for Wireless Sensor Networks: A Survey. Sensors 2012, 12, 9055–9097. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- AlSkaif, T.; Guerrero Zapata, M.; Bellalta, B. Game theory for energy efficiency in Wireless Sensor Networks: Latest trends. J. Netw. Comput. Appl. 2015, 54, 33–61. [Google Scholar] [CrossRef]
- Crosby, G.; Pissinou, N. Evolution of Cooperation in Multi-Class Wireless Sensor Networks. In Proceedings of the 32nd IEEE Conference on Local Computer Networks (LCN 2007), Dublin, Ireland, 15–18 October 2007. [Google Scholar]
- Felegyhazi, M.; Hubaux, J.; Buttyan, L. Cooperative Packet Forwarding in Multi-Domain Sensor Networks. In Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, Kauai Island, HI, USA, 8–12 March 2005. [Google Scholar]
- Kannan, R.; Iyengar, S. Game-Theoretic Models for Reliable Path-Length and Energy-Constrained Routing with Data Aggregation in Wireless Sensor Networks. IEEE J. Sel. Areas Commun. 2004, 22, 1141–1150. [Google Scholar] [CrossRef]
- Zakiuddin, I.; Hawkins, T.; Moffat, N. Towards A Game Theoretic Understanding of Ad-Hoc Routing. Electron. Notes Theor. Comput. Sci. 2005, 119, 67–92. [Google Scholar] [CrossRef] [Green Version]
- Schillings, A.; Yang, K. VGTR: A Collaborative, Energy and Information Aware Routing Algorithm for Wireless Sensor Networks through the Use of Game Theory. In GeoSensor Networks; Springer: Berlin/Heidelberg, Germany, 2009; pp. 51–62. [Google Scholar]
- Behzadan, A.; Anpalagan, A.; Ma, B. Prolonging Network Lifetime via Nodal Energy Balancing in Heterogeneous Wireless Sensor Networks. In Proceedings of the 2011 IEEE International Conference on Communications (ICC), Kyoto, Japan, 5–9 June 2011. [Google Scholar]
- Jia, Z.; Mu, C.D.; Hu, J.B. Game Theoretic Energy Balance Routing in Wireless Sensor Networks. In Proceedings of the 2007 Chinese Control Conference, Hunan, China, 26-31 July 2007. [Google Scholar]
- Zheng, M. Game Theory Used for Reliable Routing Modeling in Wireless Sensor Networks. In Proceedings of the 2010 International Conference on Parallel and Distributed Computing, Applications and Technologies, Wuhan, China, 8–11 December 2010. [Google Scholar]
- Sun, D.; Huang, X.; Liu, Y.; Zhong, H. Predictable Energy Aware Routing based on Dynamic Game Theory in Wireless Sensor Networks. Comput. Electr. Eng. 2013, 39, 1601–1608. [Google Scholar] [CrossRef]
- Sathian, D.; Baskaran, R.; Dhavachelvan, P. Lifetime enhancement by Cluster Head Cooperative Trustworthy Energy Efficient MIMO routing algorithm based on game theory for WSN. In Proceedings of the 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT’12), Coimbatore, India, 26–28 July 2012. [Google Scholar]
- Duan, J.; Gao, D.; Yang, D.; Foh, C.; Chen, H. An Energy-Aware Trust Derivation Scheme with Game Theoretic Approach in Wireless Sensor Networks for IoT Applications. IEEE Internet Things J. 2014, 1, 58–69. [Google Scholar] [CrossRef]
- Pitchai, K.; Paramasivan, B.; Bhuvaneswari, M. Game Theoretical Computation Based Energy Efficient Routing for Wireless Sensor Networks. In Proceedings of the 2014 3rd International Conference on Eco-Friendly Computing and Communication Systems, Mangalore, India, 18–21 December 2014. [Google Scholar]
- Saghezchi, F.; Radwan, A.; Rodriguez, J. Energy-aware relay selection in cooperative wireless networks: An assignment game approach. Ad Hoc Netw. 2017, 56, 96–108. [Google Scholar] [CrossRef]
- Feng, R.; Yu, N.; Wu, Y.; Li, T. Reliable routing in wireless sensor networks based on coalitional game theory. IET Commun. 2016, 10, 1027–1034. [Google Scholar] [CrossRef]
- Lee, D.; Shin, H.; Lee, C. Game theory-based resource allocation strategy for clustering based wireless sensor network. In Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication—ICUIMC’12, Kuala Lumpur, Malaysia, 20–22 February 2012. [Google Scholar]
- Jamin, B.; Chatterjee, M.; Samanta, T. A game theoretic routing framework based on energy-delay conservation in WSNs. In Proceedings of the 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Singapore, 7–9 April 2015. [Google Scholar]
- Wu, F.; Gong, K.; Zhang, T.; Chen, G.; Qiao, C. COMO: A Game-Theoretic Approach for Joint Multirate Opportunistic Routing and Forwarding in Non-Cooperative Wireless Networks. IEEE Trans. Wirel. Commun. 2015, 14, 948–959. [Google Scholar] [CrossRef]
- Xin, Z.; Xin, Z.; Guo, H.Y.; Qian, L. The Inter-Cluster Routing Algorithm in Wireless Sensor Network Based on the Game Theory. In Proceedings of the 2013 Fourth International Conference on Digital Manufacturing & Automation, Qingdao, China, 29–30 June 2013. [Google Scholar]
- Abd, M.; Singh, B.; Rubeaai, S.; Tepe, K.; Benlamri, R. Game theoretic energy balanced (GTEB) routing protocol for wireless sensor networks. In Proceedings of the 2014 IEEE Wireless Communications and Networking Conference (WCNC), Istanbul, Turkey, 6–9 April 2014. [Google Scholar]
- Lin, D.; Wang, Q.; Lin, D.; Deng, Y. An Energy-Efficient Clustering Routing Protocol Based on Evolutionary Game Theory in Wireless Sensor Networks. Int. J. Distrib. Sens. Netw. 2015, 11, 409503. [Google Scholar] [CrossRef]
- Lin, D.; Wang, Q. A game theory-based energy efficient clustering routing protocol for WSNs. Wirel. Netw. 2016, 23, 1101–1111. [Google Scholar] [CrossRef]
- Li, F.; Gao, F.; Yao, L.; Chang, G. A Game Theory Based Approach for Routing in Wireless Sensor Networks. Adv. Eng. Forum 2011, 2–3, 599–603. [Google Scholar] [CrossRef]
- Qin, X.; Wang, X.; Wang, L.; Lin, Y.; Wang, X. An efficient probabilistic routing scheme based on game theory in opportunistic networks. Comput. Netw. 2019, 149, 144–153. [Google Scholar] [CrossRef]
- Attiah, A.; Amjad, M.; Chatterjee, M.; Zou, C. An evolutionary routing game for energy balance in Wireless Sensor Networks. Comput. Netw. 2018, 138, 31–43. [Google Scholar] [CrossRef]
- Yetgin, H.; Cheung, K.; El-Hajjar, M.; Hanzo, L. A Survey of Network Lifetime Maximization Techniques in Wireless Sensor Networks. IEEE Commun. Surv. Tutor. 2017, 19, 828–854. [Google Scholar] [CrossRef]
- Ogundile, O.; Alfa, A. A Survey on an Energy-Efficient and Energy-Balanced Routing Protocol for Wireless Sensor Networks. Sensors 2017, 17, 1084. [Google Scholar] [CrossRef]
- Osborne, M. An Introduction to Game Theory; Shanghai University of Finance & Economics Press: Shanghai, China, 2005. [Google Scholar]
- Turocy, T.; Stengel, B. Game Theory. Available online: http://www.cdam.lse.ac.uk/Reports/Files/cdam-2001-09.pdf (accessed on 17 May 2019).
- Chalkiadakis, G.; Elkind, E.; Wooldridge, M. Cooperative Game Theory: Basic Concepts and Computational Challenges. IEEE Intell. Syst. 2012, 27, 86–90. [Google Scholar] [CrossRef]
- Jin, H.; Jiang, W. Handbook of Research on Developments and Trends in Wireless Sensor Networks; Information Science Reference: Hershey, PA, USA, 2010. [Google Scholar]
- Sasaki, T.; Yamamoto, H.; Okada, I.; Uchida, S. The Evolution of Reputation-Based Cooperation in Regular Networks. Games 2017, 8, 8. [Google Scholar] [CrossRef]
- Singh, K.; Moh, S. Routing protocols in cognitive radio ad hoc networks: A comprehensive review. J. Netw. Comput. Appl. 2016, 72, 28–37. [Google Scholar] [CrossRef]
- Youssef, M.; Ibrahim, M.; Abdelatif, M.; Chen, L.; Vasilakos, A. Routing Metrics of Cognitive Radio Networks: A Survey. IEEE Commun. Surv. Tutor. 2014, 16, 92–109. [Google Scholar] [CrossRef]
- Sohraby, K.; Minoli, D.; Znati, T. Wireless Sensor Networks: Technology, Protocols, and Applications; John Wiley & Sons: Hoboken, NJ, USA, 2007. [Google Scholar]
- Sathian, D.; Baskaran, R.; Dhavashelvan, P. A trustworthy energy efficient MIMO routing algorithm based on game theory for WSN. In Proceedings of the IEEE-International Conference on Advances in Engineering, Science and Management (ICAESM-2012), Tamil Nadu, India, 30–31 March 2012. [Google Scholar]
- Kazemeyni, F.; Johnsen, E.; Owe, O.; Balasingham, I. Grouping Nodes in Wireless Sensor Networks Using Coalitional Game Theory. In Formal Techniques for Distributed Systems; Springer: Berlin/Heidelberg, Germany, 2010; pp. 95–109. [Google Scholar] [Green Version]
- Theodorakopoulos, G.; Baras, J. On trust models and trust evaluation metrics for ad hoc networks. IEEE J. Sel. Areas Commun. 2006, 24, 318–328. [Google Scholar] [CrossRef] [Green Version]
- Zhang, C.; Zhu, X.; Song, Y.; Fang, Y. A Formal Study of Trust-Based Routing in Wireless Ad Hoc Networks. In Proceedings of the 2010 Proceedings IEEE INFOCOM, San Diego, CA, USA, 14–19 March 2010. [Google Scholar]
- Xia, H.; Jia, Z.; Li, X.; Ju, L.; Sha, E. Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw. 2013, 11, 2096–2114. [Google Scholar] [CrossRef]
- Ren, Y.; Boukerche, A. Performance Analysis of Trust-Based Node Evaluation Schemes in Wireless and Mobile Ad Hoc Networks. In Proceedings of the 2009 IEEE International Conference on Communications, Dresden, Germany, 14–18 June 2009. [Google Scholar]
- Mahmoud, M.; Shen, X. Trust-Based and Energy-Aware Incentive Routing Protocol for Multi-Hop Wireless Networks. In Proceedings of the 2011 IEEE International Conference on Communications (ICC), Kyoto, Japan, 5–9 June 2011. [Google Scholar]
- Ren, Y.; Boukerche, A. Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks. In Proceedings of the 2008 IEEE International Conference on Communications, Beijing, China, 19–23 May 2008. [Google Scholar]
- Duan, J.; Gao, D.; Foh, C.; Zhang, H. TC-BAC: A trust and centrality degree based access control model in wireless sensor networks. Ad Hoc Netw. 2013, 11, 2675–2692. [Google Scholar] [CrossRef]
- Deng, H.; Jin, G.; Sun, K.; Xu, R.; Lyell, M.; Luke, J. Trust-Aware In-Network Aggregation for Wireless Sensor Networks. In Proceedings of the GLOBECOM 2009—2009 IEEE Global Telecommunications Conference, Honolulu, HI, USA, 30 November–4 December 2009. [Google Scholar]
- Liu, X.; Yang, X.; Xia, Y. NetFence. ACM SIGCOMM Comput. Commun. Rev. 2010, 40, 255. [Google Scholar] [CrossRef]
- Xu, Z.Y.; Yin, Y.; Wang, J. A Density-based Energy-efficient Routing Algorithm in Wireless Sensor Networks Using Game Theory. Int. J. Future Gener. Commun. Netw. 2002, 5, 62–70. [Google Scholar]
- Heinzelman, W.; Chandrakasan, A.; Balakrishnan, H. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 2002, 1, 660–670. [Google Scholar] [CrossRef]
- Chipara, O.; He, Z.; Xing, G.; Chen, Q.; Wang, X.; Lu, C.; Stankovic, J.; Abdelzaher, T. Real-time Power-Aware Routing in Sensor Networks. In Proceedings of the 14th IEEE International Workshop on Quality of Service, New Haven, CT, USA, 19–21 June 2006. [Google Scholar]
- Pantazis, N.; Nikolidakis, S.; Vergados, D. Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey. IEEE Commun. Surv. Tutor. 2013, 15, 551–591. [Google Scholar] [CrossRef]
- Lung, C.; Zhou, C. Using hierarchical agglomerative clustering in wireless sensor networks: An energy-efficient and flexible approach. Ad Hoc Netw. 2010, 8, 328–344. [Google Scholar] [CrossRef]
- Manjeshwar, A.; Agrawal, D. TEEN: A routing protocol for enhanced efficiency in wireless sensor networks. In Proceedings of the 15th International Parallel and Distributed Processing Symposium, San Francisco, CA, USA, 23–27 April 2001. [Google Scholar]
- Seah, W.; Tan, Y. Sustainable Wireless Sensor Networks; Tech: Rijeka, Croatia, 2010. [Google Scholar]
- Pathak, A.; Tiwari, M.K. Minimizing the Energy Hole Problem in Wireless Sensor Networks by Normal Distribution of Nodes and Relaying Range Regulation. In Proceedings of the Fourth International Conference on Computational Intelligence and Communication Networks, Mathura, India, 3–5 November 2012. [Google Scholar]
- Akyildiz, I.; Melodia, T.; Chowdhury, K. A survey on wireless multimedia sensor networks. Comput. Netw. 2007, 51, 921–960. [Google Scholar] [CrossRef]
Survey Article | Limitations |
---|---|
Reference [19] |
|
Reference [20] |
|
Reference [21] |
|
Reference [46] |
|
Reference [47] |
|
Survey Article | Practical Examples of Implementation | Classification of the Protocols Based on Game Theory | Qualitative Comparison of the Protocols | Possible Applications of the Protocols | Possible Future Improvements of the Protocols | Challenging and Open Research Issues |
---|---|---|---|---|---|---|
Reference [19] | No | No | No | No | No | No |
Reference [20] | No | Yes | No | No | No | No |
Reference [21] | No | Yes | No | No | No | Yes |
Reference [46] | No | No | No | No | Yes | Yes |
Reference [47] | No | No | No | No | No | Yes |
Our Survey | Yes | Yes | Yes | Yes | Yes | Yes |
Game | Key features | Comparative characteristics | Routing Metrics |
---|---|---|---|
Cooperative game theory | Considers preferences and rational choices of other nodes in the routing game of a WSN. | Binding agreements needed for mutual benefit in games designed for routing. | Considers energy and packet delivery ratio as routing metrics. |
Noncooperative game theory | Considers situation when no two sensor nodes can benefit more by any move after a certain point given that a player sticks to some strategies. | Reaching Nash equilibrium is needed for successful implication. | Considers energy as the main routing metric in most of the protocols. |
Evolutionary game theory | Does not need to consider the preferences of other routing nodes. | Evolutionarily stable strategy is needed for the implication of this type of games in routing. | Considers network lifetime as primary routing metric. |
Reputation-based games | The nodes are cooperative in this type of game. | Measures the partners’ quality and incentivizes the partners’ behaviors. | Considers average throughput and network life time in the routing protocol. |
Protocol | Technical Strengths | Technical Weaknesses |
---|---|---|
CH-C-TEEM 1 [31] |
|
|
RCFR 2 [35] |
|
|
Assignment game approach [34] |
|
|
PRGT 3 [44] |
|
|
Protocol | Technical Strengths | Technical Weaknesses |
---|---|---|
Resource allocation strategy for clustering-based WSNs [36] |
|
|
Intercluster routing algorithm for WSNs [39] |
|
|
Routing framework based on energy and delay conservation [37] |
|
|
COMO 1 [38] |
|
|
Energy-aware trust deviation scheme [32] |
|
|
GERA 2 [33] |
|
|
Protocol | Technical Strength | Technical Weakness |
---|---|---|
GTEB 1 [40] |
|
|
EEREG 2 [41] |
|
|
GEEC 3 [42] |
|
|
ERG 4 [45] |
|
|
GBRA 5 [43] |
|
|
Protocol | Routing metric | Major features | Advantages | Limitations |
---|---|---|---|---|
CH-C-TEEM 1 [31] | Energy, network lifetime |
|
|
|
RCFR 2 [35] | Energy, packet delivery ratio |
|
|
|
Assignment game approach [34] | Energy |
|
|
|
PRGT 3 [44] | Packet delivery ratio, average latency, overhead ratio |
|
|
|
Protocol | Routing Metric | Major Features | Advantages | Limitations |
---|---|---|---|---|
Resource allocation strategy for clustering-based WSNs [36] | No routing metric |
|
|
|
Intercluster routing algorithm for WSNs [39] | Energy |
|
|
|
Routing framework based on energy and delay conservation [37] | Energy |
|
|
|
COMO 1 [38] | End-to-end throughput |
|
|
|
Energy-aware trust deviation scheme [32] | Energy, average packet delivery ratio, packet loss ratio |
|
|
|
GERA 2 [33] | Energy, packet delivery ratio |
|
|
|
Protocol | Routing metric | Major features | Advantages | Limitations |
---|---|---|---|---|
GTEB 1 [40] | Average packet delivery ratio, network lifetime |
|
|
|
EEREG 2 [41] | Energy, network lifetime |
|
|
|
GEEC 3 [42] | Energy, network lifetime |
|
|
|
ERG 4 [45] | No routing metric |
|
|
|
GBRA 5 [43] | Average throughput, network lifetime |
|
|
|
Protocol | Type of Game | Topology | Data Transmission | Scalability | Fault Tolerance | Communication Reliability | Protocol Complexity | Location Awareness |
---|---|---|---|---|---|---|---|---|
CH-C-TEEM 1 [31] | Cooperative | Hierarchical | Multihop | No | No | No | Low | No |
RCFR 2 [35] | Cooperative | Flat | Multihop | No | Yes | Yes | Moderate | No |
Assignment game approach [34] | Cooperative | Flat | Yes | No | Yes | High | Yes | |
PRGT 3 [44] | Cooperative | Flat | Multihop | No | Yes | Yes | High | No |
Resource allocation strategy for clustering-based WSNs [36] | Noncooperative | Hierarchical | Multihop | No | Yes | Yes | Moderate | No |
Intercluster routing algorithm for WSNs [39] | Noncooperative | Hierarchical | Single hop | No | No | No | Low | No |
Routing framework based on energy and delay conservation [37] | Noncooperative | Flat | Multihop | No | No | No | Moderate | Yes |
COMO 4 [38] | Noncooperative | Grid | Multihop | No | No | Yes | High | Yes |
Energy-aware trust deviation scheme [32] | Noncooperative | Flat | Multihop | Yes | Yes | Yes | High | No |
GERA 5 [33] | Noncooperative | Hierarchical | Multihop | No | No | No | Moderate | Yes |
GTEB 6 [40] | Evolutionary | Hierarchical | Multihop | No | No | No | High | Yes |
EEREG 7 [41] | Evolutionary | Hierarchical | Multihop | Yes | Yes | Yes | High | Yes |
GEEC 8 [42] | Evolutionary | Hierarchical | Multihop | Yes | Yes | Yes | High | Yes |
ERG 9 [45] | Evolutionary | Flat | Multihop | No | No | Yes | High | Yes |
GBRA 10 [43] | Reputation | Flat | Multihop | No | Yes | Yes | Moderate | No |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Habib, M.A.; Moh, S. Game theory-based Routing for Wireless Sensor Networks: A Comparative Survey. Appl. Sci. 2019, 9, 2896. https://doi.org/10.3390/app9142896
Habib MA, Moh S. Game theory-based Routing for Wireless Sensor Networks: A Comparative Survey. Applied Sciences. 2019; 9(14):2896. https://doi.org/10.3390/app9142896
Chicago/Turabian StyleHabib, Md Arafat, and Sangman Moh. 2019. "Game theory-based Routing for Wireless Sensor Networks: A Comparative Survey" Applied Sciences 9, no. 14: 2896. https://doi.org/10.3390/app9142896
APA StyleHabib, M. A., & Moh, S. (2019). Game theory-based Routing for Wireless Sensor Networks: A Comparative Survey. Applied Sciences, 9(14), 2896. https://doi.org/10.3390/app9142896