메뉴 건너뛰기




Volumn 15, Issue 1, 2013, Pages 50-58

A Game-theoretic approach to security and power conservation in wireless sensor networks

Author keywords

Game theory; Security; Wireless sensors

Indexed keywords

FORWARD PACKETS; INCOMING PACKETS; MALICIOUS NODE DETECTIONS; MALICIOUS NODES; NETWORK THROUGHPUT; POWER CONSERVATION; SECURITY; WIRELESS SENSOR;

EID: 84875094020     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (31)

References (40)
  • 1
    • 84875104203 scopus 로고    scopus 로고
    • Maximizing battery life: Applying game theory to wireless sensor networks
    • A. Agah, M. Asadi, and C. Zimmerman, "Maximizing battery life: Applying game theory to wireless sensor networks," The WCU Research Consortium, 2011.
    • (2011) The WCU Research Consortium
    • Agah, A.1    Asadi, M.2    Zimmerman, C.3
  • 6
    • 0041472588 scopus 로고    scopus 로고
    • An energy efficient hierarchical clustering algorithm for wireless sensor networks
    • S. Bandyopadhyay and E. Coyle, "An energy efficient hierarchical clustering algorithm for wireless sensor networks," INFOCOM, 2003.
    • (2003) INFOCOM
    • Bandyopadhyay, S.1    Coyle, E.2
  • 8
    • 61449149413 scopus 로고    scopus 로고
    • A game-theoretic approach to efficient power management in sensor networks
    • E. Campos-Nanez, A. Garcia, and C. Li, "A game-theoretic approach to efficient power management in sensor networks," Operations Research, vol. 56, no. 3, pp. 552-561, 2008.
    • (2008) Operations Research , vol.56 , Issue.3 , pp. 552-561
    • Campos-Nanez, E.1    Garcia, A.2    Li, C.3
  • 10
    • 84875096980 scopus 로고    scopus 로고
    • Battery-aware routing for streaming data transmissions in wireless sensor networks
    • M. Chi and Y. Yang, "Battery-aware routing for streaming data transmissions in wireless sensor networks," Springer Science and Business Media, LLC, 2006.
    • (2006) Springer Science and Business Media, LLC
    • Chi, M.1    Yang, Y.2
  • 12
    • 79960423670 scopus 로고    scopus 로고
    • Location-aware, trust-based detection and isolation of compromised nodes in wireless sensor networks
    • G. V. Crosby, L. Hester, and N. Pissinou, "Location-aware, trust-based detection and isolation of compromised nodes in wireless sensor networks," International Journal of Network Security, vol. 12, no. 2, pp. 107-117, 2011.
    • (2011) International Journal of Network Security , vol.12 , Issue.2 , pp. 107-117
    • Crosby, G.V.1    Hester, L.2    Pissinou, N.3
  • 15
    • 36549012198 scopus 로고    scopus 로고
    • The commit protocol for truthful and cost-efficient routing in ad hoc networks with selfish nodes
    • S. Eidenbenz, G. Resta, and P. Santi, "The commit protocol for truthful and cost-efficient routing in ad hoc networks with selfish nodes," IEEE transactions on mobile computing, vol. 7, no. 1, 2008.
    • (2008) IEEE transactions on mobile computing , vol.7 , Issue.1
    • Eidenbenz, S.1    Resta, G.2    Santi, P.3
  • 19
    • 84875095255 scopus 로고    scopus 로고
    • MEMSIC Inc., "Micaz wireless measurement system
    • MEMSIC Inc., "Micaz wireless measurement system," http://www.memsic.com.
  • 24
    • 53249147143 scopus 로고    scopus 로고
    • A survey of game-theoretic approaches in wireless sensor networks
    • R. Machado and S. Tekinay, "A survey of game-theoretic approaches in wireless sensor networks," Elsevier Computer Networks Journal, vol. 52, 2008.
    • (2008) Elsevier Computer Networks Journal , vol.52
    • Machado, R.1    Tekinay, S.2
  • 26
    • 10644289075 scopus 로고    scopus 로고
    • Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • P. Michiardi and R. Molva, "Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," Communications and Multimedia Security Conference, 2002.
    • (2002) Communications and Multimedia Security Conference
    • Michiardi, P.1    Molva, R.2
  • 28
    • 10644269064 scopus 로고    scopus 로고
    • Prevention of denial of service attack and selfishness in mobile ad hoc networks
    • Institute Eurecom
    • P. Michiardi and R. Molva, "Prevention of denial of service attack and selfishness in mobile ad hoc networks," Research Report RR-02-063, (Institute Eurecom), 2002.
    • (2002) Research Report RR-02-063
    • Michiardi, P.1    Molva, R.2
  • 32
    • 0004260006 scopus 로고    scopus 로고
    • NY: Academic Press
    • G. Owen, Game Theory. NY: Academic Press, 2001.
    • (2001) Game Theory
    • Owen, G.1
  • 33
    • 33845483127 scopus 로고    scopus 로고
    • Battery discharge characteristics of wireless sensor nodes: An experimental analysis
    • C. Park, K. Lahiri, and A. Raghunathan, "Battery discharge characteristics of wireless sensor nodes: An experimental analysis," IEEE SECON, 2005.
    • (2005) IEEE SECON
    • Park, C.1    Lahiri, K.2    Raghunathan, A.3
  • 36
    • 75149136526 scopus 로고    scopus 로고
    • A game theoretic framework for power control in wireless sensor networks
    • S. Sengupta, M. Chatterjee, and K. Kwiat, "A game theoretic framework for power control in wireless sensor networks," IEEE Transactions on COmputers, vol. 59, no. 2, 2010.
    • (2010) IEEE Transactions on COmputers , vol.59 , Issue.2
    • Sengupta, S.1    Chatterjee, M.2    Kwiat, K.3
  • 38
    • 0036343658 scopus 로고    scopus 로고
    • An energy efficient mac protocol for wireless sensor networks
    • J. Heidemann W. Ye and D. Estrin, "An energy efficient mac protocol for wireless sensor networks," IEEE INFOCOM, 2002.
    • (2002) IEEE INFOCOM
    • Heidemann, J.1    Ye, W.2    Estrin, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.