Next Article in Journal
An Enhanced Technique for Ultrasonic Flow Metering Featuring Very Low Jitter and Offset
Next Article in Special Issue
Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming
Previous Article in Journal
A 75-ps Gated CMOS Image Sensor with Low Parasitic Light Sensitivity
Previous Article in Special Issue
DARAL: A Dynamic and Adaptive Routing Algorithm for Wireless Sensor Networks
Article Menu

Export Article

Open AccessReview
Sensors 2016, 16(7), 1003; doi:10.3390/s16071003

Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey

1
Electronics and Communications Engineering Department, Egypt-Japan University of Science and Technology (E-JUST), Alexandria 21934, Egypt
2
Kyushu University, Fukuoka 819-0395, Japan
3
Electronics and Communications Engineering Department, American University in Cairo, Cairo 11835, Egypt
*
Author to whom correspondence should be addressed.
Academic Editors: Ignacio Bravo, Esther Palomar, Alfredo Gardel and José Luis Lázaro
Received: 22 May 2016 / Revised: 23 June 2016 / Accepted: 24 June 2016 / Published: 29 June 2016
(This article belongs to the Special Issue Trusted and Secure Wireless Sensor Network Designs and Deployments)
View Full-Text   |   Download PDF [865 KB, uploaded 18 July 2016]   |  

Abstract

We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs. View Full-Text
Keywords: game theory; WSNs security; evolutionary game; game-theoretic based trust model; WSNs applications game theory; WSNs security; evolutionary game; game-theoretic based trust model; WSNs applications
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Abdalzaher, M.S.; Seddik, K.; Elsabrouty, M.; Muta, O.; Furukawa, H.; Abdel-Rahman, A. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey. Sensors 2016, 16, 1003.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top