2014
DOI: 10.1155/2014/950618
|View full text |Cite
|
Sign up to set email alerts
|

A Game-Theoretic Response Strategy for Coordinator Attack in Wireless Sensor Networks

Abstract: The coordinator is a specific node that controls the whole network and has a significant impact on the performance in cooperative multihop ZigBee wireless sensor networks (ZWSNs). However, the malicious node attacks coordinator nodes in an effort to waste the resources and disrupt the operation of the network. Attacking leads to a failure of one round of communication between the source nodes and destination nodes. Coordinator selection is a technique that can considerably defend against attack and reduce the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(12 citation statements)
references
References 29 publications
0
12
0
Order By: Relevance
“…Another direction of game theoretic applications to WSNs is the use of evolutionary games. Some examples can be found in [24, 25]. In [24], the authors combined evolutionary game theory and fuzzy logic to countermeasure an attack scenario where the malicious node attacks coordinator nodes in order to waste their resources and disrupt the operation of the network.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Another direction of game theoretic applications to WSNs is the use of evolutionary games. Some examples can be found in [24, 25]. In [24], the authors combined evolutionary game theory and fuzzy logic to countermeasure an attack scenario where the malicious node attacks coordinator nodes in order to waste their resources and disrupt the operation of the network.…”
Section: Related Workmentioning
confidence: 99%
“…Some examples can be found in [24, 25]. In [24], the authors combined evolutionary game theory and fuzzy logic to countermeasure an attack scenario where the malicious node attacks coordinator nodes in order to waste their resources and disrupt the operation of the network. In [25], the authors used evolutionary game theory and its underlying learning mechanism which is known as the replicator dynamics to propose an active defence model.…”
Section: Related Workmentioning
confidence: 99%
“…Liu et al [134] studied the security issues of using centralized coordinator to manage WSNs. Specifically, attacking the coordinator node can severely degrade the network performance and throughput.…”
Section: B Resource Starvation Attacksmentioning
confidence: 99%
“…A number of studies reviewed by Al Skaif et al [79] fall under the category of personal hacker warfare [80,81]. Based on evolutionary game theory, [80] propose an active defense model to protect wireless sensor nodes from attackers.…”
Section: Personal Hacker Warfare Gamesmentioning
confidence: 99%
“…Liu et al [81] consider the security issues that arise for centralized coordinator nodes in wireless sensor networks. In this study, the attackers are considered to be a kind of malicious nodes which aim to disrupt the performance of the coordinator nodes by strategic jamming attack.…”
Section: Personal Hacker Warfare Gamesmentioning
confidence: 99%