2022
DOI: 10.1109/jiot.2022.3164028
|View full text |Cite
|
Sign up to set email alerts
|

A Game-Theoretic Approach for Cost-Effective Multicast Routing in the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…Also, clusters of trees have been built using different methodologies [11][12][13]. Several approaches use game theory to construct a spanning tree that requires minimal transmission power [14,15]. Finally, some authors have attempted to minimize the path lengths from the source to all other nodes to minimize energy consumption [16,17].…”
Section: Related Workmentioning
confidence: 99%
“…Also, clusters of trees have been built using different methodologies [11][12][13]. Several approaches use game theory to construct a spanning tree that requires minimal transmission power [14,15]. Finally, some authors have attempted to minimize the path lengths from the source to all other nodes to minimize energy consumption [16,17].…”
Section: Related Workmentioning
confidence: 99%
“…A multi-objective ant colony optimisation-based secure routing scheme is proposed to enable devices or servers to jump out easily from the local optima with the minimum possible energy consumption of nodes. Additionally, this algorithm has the built-in capacity to converge more rapidly than other approaches [12].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Meanwhile, our T-S fuzzy trust model can obtain a more accurate trust evaluation value under the premise of ensuring the required stability of IoTs. Referring to [ 3 , 4 , 5 ], we design a repeated game model to perfect the energy-efficient privacy-preserving scheme, where the subgame Nash equilibrium of the repeated game model can balance the data security and network resource consumption [ 6 ]. The contributions of this research are given as follows: Firstly, we propose a novel privacy-preserving scheme based on T-S fuzzy trust theory to mitigate the pollution attacks, in which the security is proved according to the hardness of the discrete logarithm.…”
Section: Introductionmentioning
confidence: 99%