2016 IEEE Trustcom/BigDataSE/Ispa 2016
DOI: 10.1109/trustcom.2016.0099
|View full text |Cite
|
Sign up to set email alerts
|

A Dynamic Game with Adaptive Strategies for IEEE 802.15.4 and IoT

Abstract: The problem of selfishness and misbehaviour in wireless networks is well known, as are the associated solutions that have been proposed for it in IEEE 802.11 Wireless Local Area Network (WLAN) and Wireless Sensory Network (WSN). However, tackling such problem in relation to the Internet of Things (IoT) is relatively new since the IoT is still under development. The central communication infrastructure of IoT is the IEEE 802.15.4 standard which defines low-rate and low energy wireless personal area networks. In… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…Z. Tao et al [6] used a Markov chain to model the CSMA-CA mechanism in IEEE 802.15.4 networks and pointed out that a slight modification to the protocol can considerably improve throughput and delay. J. Abegunde et al [7] presented a game theory-based solution to 802.15.4 channel contention, which reduces energy consumption and increases fairness. Z. Zhang et al [8] applied a priority mechanism and virtual carrier sensing to the traditional CSMA-CA algorithm to improve throughput and reduce energy consumption.…”
Section: Related Workmentioning
confidence: 99%
“…Z. Tao et al [6] used a Markov chain to model the CSMA-CA mechanism in IEEE 802.15.4 networks and pointed out that a slight modification to the protocol can considerably improve throughput and delay. J. Abegunde et al [7] presented a game theory-based solution to 802.15.4 channel contention, which reduces energy consumption and increases fairness. Z. Zhang et al [8] applied a priority mechanism and virtual carrier sensing to the traditional CSMA-CA algorithm to improve throughput and reduce energy consumption.…”
Section: Related Workmentioning
confidence: 99%
“…Network Security and Breach Detection [61] Game theory and NB classifier [62], [63] Deep learning algorithms [64], [65] Algorithms: supervised, unsupervised and reinforcement learning [66] Table 1: AI/ML algorithm application for descriptive, predictive, and prescriptive risk analytics in edge computing Table 1 confirms that by integrating AI/ML in the risk analytics, we can devise a new approach for cognitive data analytics, creating a stronger resilience of systems through cognition in their physical, digital and social dimensions. This approach resolves around understanding how and when compromises happen, to enable systems to adapt and continue to operate safely and securely when they have been compromised.…”
Section: Network Management and Operationsmentioning
confidence: 99%
“…Optimising and balancing resource constrains in edge computing has been investigated with 'dynamic game' [61] and 'game theory' [62] strategies. Such optimisation is primarily theoretical, but highly relevant for red teaming of edge computing risks.…”
Section: Network Management and Operationsmentioning
confidence: 99%
“…In [ 18 ], the authors propose a countermeasure to misbehaviour attacks and optimized energy consumption. They propose a model of the IEEE 802.15.4 standard in the form of a dynamic game, where the different nodes of the network represent players able to assess the state of the game, then select and adapt their game strategies while optimizing energy consumption.…”
Section: Related Workmentioning
confidence: 99%