• Journal of Terahertz Science and Electronic Information Technology
  • Vol. 20, Issue 2, 181 (2022)
ZHOU Quanxing1、*, LI Qiuxian1, WANG Zhenlong1, and WU Yulong2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    DOI: 10.11805/tkyda2020659 Cite this Article
    ZHOU Quanxing, LI Qiuxian, WANG Zhenlong, WU Yulong. Attack and defense optimization of wireless sensor network nodes based on game theory[J]. Journal of Terahertz Science and Electronic Information Technology , 2022, 20(2): 181 Copy Citation Text show less
    References

    [1] RAWAT P,SINGH K D,CHAOUCHI H,et al. Wireless sensor networks: a survey on recent developments and potential synergies[J]. Journal of Supercomputing, 2014, 68(1):68-79.

    [3] MARUTHI S P,PANIGRAHI T,JAGANNATH R P. Distributed version of hybrid swarm intelligence-Nelder Mead algorithm for DOA estimation in WSN[J]. Expert Systems with Applications, 2020,144(1):109-113.

    [4] YICK J,MUKHERJEE B,GHOSAL D. Wireless sensor network survey[J]. Computer Networks, 2008,52(12):2292-2330.

    [5] MOOSAVI H,BUI F M. A game-theoretic framework for robust optimal intrusion detection in wireless sensor networks[J].IEEE Transactions on Information Forensics and Security, 2014,9(9):1367-1379.

    [6] ANASTASI G,CONTI M,FRANCESCO M D,et al. Energy conservation in wireless sensor networks: a survey[J]. Ad Hoc Networks, 2009,7(3):537-568.

    [7] SHI H Y,WANG W L,KWOK N M,et al. Game theory for wireless sensor networks: a survey[J]. Sensors, 2012,12(12):9055-9097.

    [8] DUAN J,GAO D,YANG D,et al. An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications[J]. IEEE Internet of Things Journal, 2014,1(1):58-69.

    [9] LI Y,SHI L,CHENG P,et al. Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach[J]. IEEE Transactions on Automatic Control, 2015,60(10):2831-2836.

    [10] WALDMAN D E,JENSEN E J. Game theory[M]// Industrial Organization. New York:Addison-Wesley Longman, 2019.

    [12] MACHADO R,TEKINAY S. A survey of game-theoretic approaches in wireless sensor networks[J]. Computer Networks,2008,52(16):3047-3061.

    [13] AKKARAJITSAKUL K,HOSSAIN E,NIYATO D,et al. Game theoretic approaches for multiple access in wireless networks:a survey[J]. IEEE Communications Surveys & Tutorials, 2011,13(3):372-395.

    [14] JUAN P,SANTIAGO Z. Wireless networks under a backoff attack: a game theoretical perspective[J]. Sensors, 2018,18(2):404.

    [15] MA Y,CAO H,MA J. The intrusion detection method based on game theory in wireless sensor network[C]// First IEEE International Conference on Ubi-Media Computing. Lanzhou,China:IEEE, 2008.

    [16] AHMED A J M A,LIU Yun,ZHANG Zhenjiang,et al. Study on selfish node incentive mechanism with a forward game node in wireless sensor networks[J]. International Journal of Antennas & Propagation, 2017:1-13.

    [17] YANG L,LU Y,LIU S,et al. A dynamic behavior monitoring game based trust evaluation scheme for clustering in wireless sensor networks[J]. IEEE Access, 2018,6:71404-71412.

    [18] LIAO H,DING S. Mixed and continuous strategy monitor-forward game based selective forwarding solution in WSN[J].International Journal of Distributed Sensor Networks, 2015(1):1-13.

    [19] LAKSHMAN M K. Detecting network intrusions via sampling: a game theoretic approach[C]// IEEE INFOCOM 2003. San Francisco,CA,USA:IEEE, 2003.

    [20] CHEN Z,QIAO C,QIU Y,et al. Dynamics stability in wireless sensor networks active defense model[J]. Journal of Computer and System Sciences, 2014,80(8):1534-1548.

    [21] QIU Y,CHEN Z,XU L. Active defense model of wireless sensor networks based on evolutionary game theory[C]// International Conference on Wireless Communications Networking & Mobile Computing. Chengdu,China:IEEE, 2010:785-787.

    [22] YANG L,LU Y,XIONG L,et al. A game theoretic approach for balancing energy consumption in clustered wireless sensor networks[J]. Sensors, 2017,17(11) :2654.

    [24] YANG Y X,NIU X X. The general theory of information security[M]. Beijing:Publishing House of Electronics Industry, 2018.

    [25] ABUSAIMEH H,YANG S H. Dynamic cluster head for lifetime efficiency in WSN[J]. International Journal of Automation and Computing, 2009,6(1):48-54.

    [26] AGRAWAL D,PANDEY S. FUCA: fuzzy-based unequal clustering algorithm to prolong the lifetime of wireless sensor networks[J]. International Journal of Communication Systems, 2018,31(2):1-18.

    [27] GHEORGHE L,RUGHINIS R,NICOLAE T. Energy-efficient authentication and anti-replay security protocol for wireless sensor networks[J]. Control Engineering & Applied Informatics, 2014,16(4):23-27.

    ZHOU Quanxing, LI Qiuxian, WANG Zhenlong, WU Yulong. Attack and defense optimization of wireless sensor network nodes based on game theory[J]. Journal of Terahertz Science and Electronic Information Technology , 2022, 20(2): 181
    Download Citation