Cart (Loading....) | Create Account
Close category search window
 

A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Reddy, Y.B. ; Grambling State Univ., Grambling, LA, USA

Wireless sensor networks has grown a lot in recent years and offers excellent opportunities in defense related applications such as monitoring environment and collecting data related to antisocial activities. Currently, the needs of wireless sensors have become inevitable in daily life. With the continuous growth of wireless sensor networks in daily life, business, and defense applications, the security of transferring data from sensors to their destination has become an important research area. Due to the limitations of power, storage, and processing capabilities, current security mechanisms of wireless networks or wired networks can not apply directly to wireless sensor networks. So there is a need to develop new techniques or modify the current security mechanisms to transfer data from source (from the field) to base station (destination). In this paper, we discuss currently available intrusion detection techniques, attack models using game theory, and then propose a new framework to detect malicious nodes using zero sum game approach for nodes in the forward data path. The first part of research provides the game model with probability of energy required for transferring the data packets. The second part derives the model to detect the malicious nodes using probability of acknowledgement at source.

Published in:

Sensor Technologies and Applications, 2009. SENSORCOMM '09. Third International Conference on

Date of Conference:

18-23 June 2009

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.