2015
DOI: 10.1155/2015/359780
|View full text |Cite
|
Sign up to set email alerts
|

Mixed and Continuous Strategy Monitor-Forward Game Based Selective Forwarding Solution in WSN

Abstract: Wireless sensor networks are often deployed in unattended and hostile environments. Due to the resource limitations and multihop communication in WSN, selective forwarding attacks launched by compromised insider nodes are a serious threat. A trust-based scheme for identifying and isolating malicious nodes is proposed and a mixed strategy and a continuous strategy Monitor-Forward game between the sender node and its one-hop neighboring node is constructed to mitigate the selective dropping attacks in WSN. The c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 35 publications
0
8
0
Order By: Relevance
“…where G x = φ Q x , G ϕ = φ Φ with symmetric matrix Φ satisfying Q x ( τ I Q x ) 1 Q x Φ true¯ 0 (refer the proof in Appendix 1). We clarify that Liao and Ding 4 is a convex problem and can be solved using off-the-shelf convex optimization solvers, such as CVX 29 (note that Lin et al 16 adopted the bisection method to solve equation (3) in an iterative way. Since their subproblem is also SDP and similar to equation (5), the whole computational complexity is n times of our algorithm, with n denoting the number of iterations which has also been validated by Figure 5 in section “Simulations and discussions”).…”
Section: Df Beamforming With Preferred Power Supplymentioning
confidence: 99%
See 2 more Smart Citations
“…where G x = φ Q x , G ϕ = φ Φ with symmetric matrix Φ satisfying Q x ( τ I Q x ) 1 Q x Φ true¯ 0 (refer the proof in Appendix 1). We clarify that Liao and Ding 4 is a convex problem and can be solved using off-the-shelf convex optimization solvers, such as CVX 29 (note that Lin et al 16 adopted the bisection method to solve equation (3) in an iterative way. Since their subproblem is also SDP and similar to equation (5), the whole computational complexity is n times of our algorithm, with n denoting the number of iterations which has also been validated by Figure 5 in section “Simulations and discussions”).…”
Section: Df Beamforming With Preferred Power Supplymentioning
confidence: 99%
“…3 As such, some two-tiered relay network architectures have been investigated to extend the lifetime of WSNs. 4,5…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Liao and Ding [ 8 ] suggested a trust mechanism for identifying and removing malicious nodes established between the sending node and its one-hop neighbor nodes, a hybrid continuous strategy monitor-forward game, and it can effectively reduce the error rate of packet loss detection in unreliable radio channels. Hu [ 9 ] designs a security mechanism based on monitoring nodes, which are energy-heterogeneous nodes with the function of only monitoring but not forwarding, to suppress the malicious nodes’ insider attacks.…”
Section: Related Workmentioning
confidence: 99%
“…A repeated continued non cooperative game for detecting selective discard attacks was introduced in (Liao and Ding, 2015). In this algorithm, nodes monitor their neighbors in order to find more reliable neighbors.…”
Section: Introductionmentioning
confidence: 99%