Searching for a mobile intruder in a polygonal region
SIAM Journal on Computing
Utility-based decision-making in wireless sensor networks
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks
Cluster Computing
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8 - Volume 8
Cooperative Packet Forwarding in Multi-Domain Sensor Networks
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Decentralized utility-based sensor network design
Mobile Networks and Applications
Game Theory for Wireless Engineers (Synthesis Lectures on Communications)
Game Theory for Wireless Engineers (Synthesis Lectures on Communications)
Evolution of Cooperation in Multi-Class Wireless Sensor Networks
LCN '07 Proceedings of the 32nd IEEE Conference on Local Computer Networks
Energy-efficient coverage problems in wireless ad-hoc sensor networks
Computer Communications
IEEE Wireless Communications
Ant system: optimization by a colony of cooperating agents
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
IEEE Journal on Selected Areas in Communications
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Reward mechanisms for P2P VoIP networks
Information Technology and Management
Faster algorithms for semi-matching problems
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming
Game theoretic approach in routing protocol for cooperative wireless sensor networks
ICSI'11 Proceedings of the Second international conference on Advances in swarm intelligence - Volume Part II
Cooperative game-based routing approach for wireless sensor network
International Journal of Computer Applications in Technology
Detecting intrusive activities from insiders in a wireless sensor network using game theory
Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments
Hi-index | 0.00 |
Wireless sensor networks (WSNs) comprising of tiny, power-constrained nodes are gaining popularity due to their potential for use in a wide variety of environments like monitoring of environmental attributes, intrusion detection, and various military and civilian applications. While the sensing objectives of these environments are unique and application-dependent, a common performance criteria for wireless sensor networks is prolonging network lifetime while satisfying coverage and connectivity in the deployment region. Security is another important performance parameter in wireless sensor networks, where adverse and remote environments pose various kinds of threats to reliable network operation. In this paper, we look at the problems of security and energy efficiency and different formulations of these problems based on the approach of game theory. The potential applicability of WSNs to intruder detection environments also lends itself to game-theoretic formulation of these environments, where pursuit-evasion games provide a relevant framework to model detection, tracking and surveillance applications. The suitability of using game theory to study security and energy efficiency problems and pursuit-evasion scenarios using WSNs stems from the nature of strategic interactions between nodes. Approaches from game theory can be used to optimize node-level as well as network-wide performance by exploiting the distributed decision-making capabilities of WSNs. The use of game theory has proliferated, with a wide range of applications in wireless sensor networking. In the wake of this proliferation, we survey the use of game-theoretic approaches to formulate problems related to security and energy efficiency in wireless sensor networks.