A Game Theory Based Approach for Routing in Wireless Sensor Networks

Article Preview

Abstract:

Aiming at the limited resources and the security issues in wireless sensor networks, a routing approach is proposed. In this approach, the factors of reputation, remaining energy, and the distance to the destination are taken into considered while searching a routing path from an original sender node to the destination. A reputation-based mechanism is also proposed, and a node’s reputation depends on its behaviors. The malicious behaviors nodes will be punished and isolated, and the cooperative ones will be rewarded. Simulation results show that our proposed routing scheme can prolong the lifetime of the network and can offers a relatively high throughput than other routing protocols even when there are malicious nodes in the networks.

You have full access to the following eBook

Info:

Periodical:

Pages:

599-603

Citation:

Online since:

December 2011

Export:

Share:

Citation:

[1] D. Christin, A. Reinhardt, P. Mogre and R. Steinmetz, Wireless sensor networks and the internet of things: selected challenges, Proceedings of the 8th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze,. (2009) 31-33.

Google Scholar

[2] J. Yick, B. Mukherjee, and D. Ghosal, Wireless sensor network survey, Computer Networks. 52 (2008) 2292–2330.

DOI: 10.1016/j.comnet.2008.04.002

Google Scholar

[3] R. Machado, S. Tekinay, A survey of game-theoretic approaches in wireless sensor networks, Computer Networks. 52 (2008) 3047–3061.

DOI: 10.1016/j.gaceta.2008.07.003

Google Scholar

[4] P. Trakadas, T. Zahariadis, H. C. Leligou, S. Voliotis, and K. Papadopoulos, AWISSENET: Setting up a Secure Wireless Sensor Network, 50th International Symposium ELMAR-2008. (2008) 519–523.

DOI: 10.1063/1.2990951

Google Scholar

[5] R. Kannan, S.S. Iyengar, Game-theoretic models for reliable path length and energy-constrained routing with data aggregation in wireless sensor networks, IEEE Journal of Selected Areas in Communications. (2004) 1141-1150.

DOI: 10.1109/jsac.2004.830937

Google Scholar

[6] A. Agah, K. Basu and S.K. Das, Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling, Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems Conference. (2005) 526–535.

DOI: 10.1109/mahss.2005.1542840

Google Scholar

[7] A. Agah, S.K. Das, and K. Basu, A non-cooperative game approach for intrusion detection in sensor networks, Proceedings of 2004 IEEE 60th Vehicular Technology Conference. (2004) 2902–2906.

DOI: 10.1109/vetecf.2004.1400591

Google Scholar

[8] Yenumula B. Reddy, A game theory approach to detect malicious nodes in wireless sensor networks, Proc. 2009 Third International Conference on Sensor Technologies and Applications (SENSORCOMM). (2009) 462–468.

DOI: 10.1109/sensorcomm.2009.76

Google Scholar

[9] A. Agah, and S.K. Das, Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach, International Journal of Network Security, 5 (2007) 145–153.

Google Scholar

[10] Yenumula B. Reddy, S. Srivathsan, Game theory model for selective forward attacks in wireless sensor networks, 17th Mediterranean Conference on Control and Automation. (2009) 458-463.

DOI: 10.1109/med.2009.5164584

Google Scholar

[11] S. Marti, T.J. Giuli, K. Lai and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, Proceeding of The 6th International Conference on Mobile Computing and Networking (MOBICOM). (2000) 255-265.

DOI: 10.1145/345910.345955

Google Scholar

[12] F.Y. Li, G.R. Chang, L. Yao, F.X. Gao, Cooperative based routing approach for wireless sensor networks, International Journal of Computer Applications in Technology, in press.

Google Scholar

[13] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, An Application-Specific Protocol Architecture for wireless microsensor networks, IEEE Transactions on Wireless Communications, 1 (2002) 660–670.

DOI: 10.1109/twc.2002.804190

Google Scholar