[1]
D. Christin, A. Reinhardt, P. Mogre and R. Steinmetz, Wireless sensor networks and the internet of things: selected challenges, Proceedings of the 8th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze,. (2009) 31-33.
Google Scholar
[2]
J. Yick, B. Mukherjee, and D. Ghosal, Wireless sensor network survey, Computer Networks. 52 (2008) 2292–2330.
DOI: 10.1016/j.comnet.2008.04.002
Google Scholar
[3]
R. Machado, S. Tekinay, A survey of game-theoretic approaches in wireless sensor networks, Computer Networks. 52 (2008) 3047–3061.
DOI: 10.1016/j.gaceta.2008.07.003
Google Scholar
[4]
P. Trakadas, T. Zahariadis, H. C. Leligou, S. Voliotis, and K. Papadopoulos, AWISSENET: Setting up a Secure Wireless Sensor Network, 50th International Symposium ELMAR-2008. (2008) 519–523.
DOI: 10.1063/1.2990951
Google Scholar
[5]
R. Kannan, S.S. Iyengar, Game-theoretic models for reliable path length and energy-constrained routing with data aggregation in wireless sensor networks, IEEE Journal of Selected Areas in Communications. (2004) 1141-1150.
DOI: 10.1109/jsac.2004.830937
Google Scholar
[6]
A. Agah, K. Basu and S.K. Das, Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling, Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems Conference. (2005) 526–535.
DOI: 10.1109/mahss.2005.1542840
Google Scholar
[7]
A. Agah, S.K. Das, and K. Basu, A non-cooperative game approach for intrusion detection in sensor networks, Proceedings of 2004 IEEE 60th Vehicular Technology Conference. (2004) 2902–2906.
DOI: 10.1109/vetecf.2004.1400591
Google Scholar
[8]
Yenumula B. Reddy, A game theory approach to detect malicious nodes in wireless sensor networks, Proc. 2009 Third International Conference on Sensor Technologies and Applications (SENSORCOMM). (2009) 462–468.
DOI: 10.1109/sensorcomm.2009.76
Google Scholar
[9]
A. Agah, and S.K. Das, Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach, International Journal of Network Security, 5 (2007) 145–153.
Google Scholar
[10]
Yenumula B. Reddy, S. Srivathsan, Game theory model for selective forward attacks in wireless sensor networks, 17th Mediterranean Conference on Control and Automation. (2009) 458-463.
DOI: 10.1109/med.2009.5164584
Google Scholar
[11]
S. Marti, T.J. Giuli, K. Lai and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, Proceeding of The 6th International Conference on Mobile Computing and Networking (MOBICOM). (2000) 255-265.
DOI: 10.1145/345910.345955
Google Scholar
[12]
F.Y. Li, G.R. Chang, L. Yao, F.X. Gao, Cooperative based routing approach for wireless sensor networks, International Journal of Computer Applications in Technology, in press.
Google Scholar
[13]
W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, An Application-Specific Protocol Architecture for wireless microsensor networks, IEEE Transactions on Wireless Communications, 1 (2002) 660–670.
DOI: 10.1109/twc.2002.804190
Google Scholar