scholarly journals A Game Theory Based Approach for Routing in Wireless Sensor Networks

2011 ◽  
Vol 2-3 ◽  
pp. 599-603 ◽  
Author(s):  
Feng Yun Li ◽  
Fu Xiang Gao ◽  
Lan Yao ◽  
Gui Ran Chang

Aiming at the limited resources and the security issues in wireless sensor networks, a routing approach is proposed. In this approach, the factors of reputation, remaining energy, and the distance to the destination are taken into considered while searching a routing path from an original sender node to the destination. A reputation-based mechanism is also proposed, and a node’s reputation depends on its behaviors. The malicious behaviors nodes will be punished and isolated, and the cooperative ones will be rewarded. Simulation results show that our proposed routing scheme can prolong the lifetime of the network and can offers a relatively high throughput than other routing protocols even when there are malicious nodes in the networks.

The fundamental capacity of a sensor system is to accumulate and forward data to the destination. It is crucial to consider the area of gathered data, which is utilized to sort information that can be procured using confinement strategy as a piece of Wireless Sensor Networks (WSNs).Localization is a champion among the most basic progressions since it agreed as an essential part in various applications, e.g., target tracking. If the client can't gain the definite area information, the related applications can't be skillful. The crucial idea in most localization procedures is that some deployed nodes with known positions (e.g., GPS-equipped nodes) transmit signals with their coordinates so as to support other nodes to localize themselves. This paper mainly focuses on the algorithm that has been proposed to securely and robustly decide thelocation of a sensor node. The algorithm works in two phases namely Secure localization phase and Robust Localization phase. By "secure", we imply that malicious nodes should not effectively affect the accuracy of the localized nodes. By “robust”, we indicate that the algorithm works in a 3D environment even in the presence of malicious beacon nodes. The existing methodologies were proposed based on 2D localization; however in this work in addition to security and robustness, exact localization can be determined for 3D areas by utilizing anefficient localization algorithm. Simulation results exhibit that when compared to other existing algorithms, our proposed work performs better in terms of localization error and accuracy.


Author(s):  
Turki Ali Alghamdi

Abstract Wireless sensor networks (WSNs) comprise tiny devices known as sensors. These devices are frequently employed in short-range communications and can perform various operations such as monitoring, collecting, analyzing, and processing data. WSNs do not require any infrastructure, are reliable, and can withstand adverse conditions. Sensor networks are autonomous structures in which the sensor nodes can enter or leave the network at any time instant. If the entering node is attacker node it will monitor the network operation and can cause security issues in the network that can affect communication. Existing literature presents security improvements in such networks in the form of cryptography, asymmetric techniques, key distribution, and various protocols. However, these techniques may not be effective in the case of autonomous structures and can increase computational complexity. In this paper, a convolutional technique (CT) is proposed that generates security bits using convolutional codes to prevent malicious node attacks on WSNs. Different security codes are generated at different hops and the simulation results demonstrate that the proposed technique enhances network security and reduces computational complexity compared to existing approaches.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Irfan Ahmad ◽  
Taj Rahman ◽  
Asim Zeb ◽  
Inayat Khan ◽  
Inam Ullah ◽  
...  

Underwater Wireless Sensor Networks (UWSN) have gained more attention from researchers in recent years due to their advancement in marine monitoring, deployment of various applications, and ocean surveillance. The UWSN is an attractive field for both researchers and the industrial side. Due to the harsh underwater environment, own capabilities, and open acoustic channel, it is also vulnerable to malicious attacks and threats. Attackers can easily take advantage of these characteristics to steal the data between the source and destination. Many review articles are addressed some of the security attacks and taxonomy of the Underwater Wireless Sensor Networks. In this study, we have briefly addressed the taxonomy of the UWSNs from the most recent research articles related to the well-known research databases. This paper also discussed the security threats on each layer of the Underwater Wireless sensor networks. This study will help the researchers design the routing protocols to cover the known security threats and help industries manufacture the devices to observe these threats and security issues.


Author(s):  
Raed Taleb Al-Zubi ◽  
Abdulraheem Ahmed Kreishan ◽  
Mohammad Qasem Alawad ◽  
Khalid Ahmad Darabkh

<span>In recent years, wireless sensor networks (WSNs) have been considered one of the important topics for researchers due to their wide applications in our life. Several researches have been conducted to improve WSNs performance and solve their issues. One of these issues is the energy limitation in WSNs since the source of energy in most WSNs is the battery. Accordingly, various protocols and techniques have been proposed with the intention of reducing power consumption of WSNs and lengthen their lifetime. Cluster-oriented routing protocols are one of the most effective categories of these protocols. In this article, we consider a major issue affecting the performance of this category of protocols, which we call the intra/inter-cluster event-reporting problem (IICERP). We demonstrate that IICERP severely reduces the performance of a cluster-oriented routing protocol, so we suggest an effective Solution for IICERP (SIICERP). To assess SIICERP’s performance, comprehensive simulations were performed to demonstrate the performance of several cluster-oriented protocols without and with SIICERP. Simulation results revealed that SIICERP substantially increases the performance of cluster-oriented routing protocols.</span>


Game Theory ◽  
2017 ◽  
pp. 337-352
Author(s):  
Mehran Asadi ◽  
Afrand Agah ◽  
Christopher Zimmerman

In this chapter, the authors examine the impacts of applying game theory on the network throughput, network voltage loss, and accuracy of malicious node detection in wireless sensor networks. Nodes in a wireless sensor network use our proposed protocol when deciding whether or not to forward packets they receive from other sensors in order to conserve power. Wireless sensor network nodes achieve this by optimizing their decision-making based on a framework using game theory. Defining a suitable cost and profit for routing and forwarding incoming packets and keeping a history of past behaviors of non-cooperating nodes gradually forces malicious nodes out of the wireless sensor network.In this chapter, the authors examine the impacts of applying game theory on the network throughput, network voltage loss, and accuracy of malicious node detection in wireless sensor networks. Nodes in a wireless sensor network use our proposed protocol when deciding whether or not to forward packets they receive from other sensors in order to conserve power. Wireless sensor network nodes achieve this by optimizing their decision-making based on a framework using game theory. Defining a suitable cost and profit for routing and forwarding incoming packets and keeping a history of past behaviors of non-cooperating nodes gradually forces malicious nodes out of the wireless sensor network.


Author(s):  
Mehran Asadi ◽  
Afrand Agah ◽  
Christopher Zimmerman

In this chapter, the authors examine the impacts of applying game theory on the network throughput, network voltage loss, and accuracy of malicious node detection in wireless sensor networks. Nodes in a wireless sensor network use our proposed protocol when deciding whether or not to forward packets they receive from other sensors in order to conserve power. Wireless sensor network nodes achieve this by optimizing their decision-making based on a framework using game theory. Defining a suitable cost and profit for routing and forwarding incoming packets and keeping a history of past behaviors of non-cooperating nodes gradually forces malicious nodes out of the wireless sensor network.In this chapter, the authors examine the impacts of applying game theory on the network throughput, network voltage loss, and accuracy of malicious node detection in wireless sensor networks. Nodes in a wireless sensor network use our proposed protocol when deciding whether or not to forward packets they receive from other sensors in order to conserve power. Wireless sensor network nodes achieve this by optimizing their decision-making based on a framework using game theory. Defining a suitable cost and profit for routing and forwarding incoming packets and keeping a history of past behaviors of non-cooperating nodes gradually forces malicious nodes out of the wireless sensor network.


Information ◽  
2021 ◽  
Vol 12 (1) ◽  
pp. 42
Author(s):  
Rachid Zagrouba ◽  
Amine Kardi

This paper surveys the energy-efficient routing protocols in wireless sensor networks (WSNs). It provides a classification and comparison following a new proposed taxonomy distinguishing nine categories of protocols, namely: Latency-aware and energy-efficient routing, next-hop selection, network architecture, initiator of communication, network topology, protocol operation, delivery mode, path establishment and application type. We analyze each class, discuss its representative routing protocols (mechanisms, advantages, disadvantages…) and compare them based on different parameters under the appropriate class. Simulation results of LEACH, Mod-LEACH, iLEACH, E-DEEC, multichain-PEGASIS and M-GEAR protocols, conducted under the NS3 simulator, show that the routing task must be based on various intelligent techniques to enhance the network lifespan and guarantee better coverage of the sensing area.


Sign in / Sign up

Export Citation Format

Share Document