2019
DOI: 10.1109/access.2019.2940699
|View full text |Cite
|
Sign up to set email alerts
|

Employing Game Theory and TDMA Protocol to Enhance Security and Manage Power Consumption in WSNs-Based Cognitive Radio

Abstract: The rapid development of wireless sensor networks (WSNs) is the significant incentive to contribute in the vulnerable applications such as cognitive radio (CR). This paper proposes a Stackelberg game approach to enhance the WSN-based CR security against the spectrum sensing data falsification (SSDF) attack and conserve the consequent lost power consumption. The attack aims to corrupt the spectrum decision by imposing interference power to the delivered reports from the sensor nodes (SNs) to the fusion center (… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 43 publications
(22 citation statements)
references
References 46 publications
0
22
0
Order By: Relevance
“…A game can be cooperative or noncooperative depending upon entities' interaction cooperatively or competitively. From the perspective of IDS for IoT and WSN, a game is modeled between the attackers and the defenders either by their interaction or by using the prediction strategy of an attacker 45,48‐50 …”
Section: Ids: Concept and Classificationmentioning
confidence: 99%
“…A game can be cooperative or noncooperative depending upon entities' interaction cooperatively or competitively. From the perspective of IDS for IoT and WSN, a game is modeled between the attackers and the defenders either by their interaction or by using the prediction strategy of an attacker 45,48‐50 …”
Section: Ids: Concept and Classificationmentioning
confidence: 99%
“…TDMA has been proven to provide a long network lifetime for the WSN-IoT devices [29][30][31]. DMAC is a MAC protocol based on the scheduled time of TDMA, and is efficient in the IoT-WSN because it avoids overhearing, prolongs the network life, and improves energy conservation [32]. The block diagram of the DBG method in the IoT-WSN model is shown in Figure 1.…”
Section: System Modelmentioning
confidence: 99%
“…Second, the CH performs a no Beacon (NB) or Beacon (B) action for each CM based on the game theory decision. The benevolent CM is provided with permission and denoted as action B, i.e., it does not drop packets to send the observed data [32]. The sleep mode of CM is also activated based on the B permission and battery life is saved using a rest in packet transmission, and power recovery while recharging is available.…”
Section: System Modelmentioning
confidence: 99%
“…Considering the possibility of hardware failure of sensor nodes in the network, M. Abdalzaher et al [25] proposed an effective attack and defense strategy based on the Stackelberg game and matched filter to resist the spectrum sensing data falsification attack and save power consumption. To decide the spectrum status accurately, the scheme uses the Stackelberg game and matched filter to maximize the number of protected reports sent by sensor nodes to the fusion center.…”
Section: Related Workmentioning
confidence: 99%