A secure dynamic adaptive routing technique using game theory in wireless sensor network

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    A Wireless Sensor Network (WSNs) is popular developing the field in industrial and other major markets. Wireless data security is the central theme in the WSNs application where security of transmitted data is more concerned. Due to the significant concentration of energy efficiency and performance analysis in WSN, providing secured communication is a challenging issue. To overcome this interdependent problem Game theory can be used. Game theory is applied here to select different routes to transfer the data from source to destination. The performance of the WSNs can be increased by providing security for transmitted data. The graph for throughput, end to end delay, delivery, and packet loss ratio are generated using NS2 simulation tool.

  • Keywords

    DSR; Energy Efficient; Game theory; NS2; Wireless Sensor Networks.

  • References

      [1] S. Renubala, K.S.Dhanalakshmi, “Trust based Secure Routing Protocol using Fuzzy Logic in Wireless Sensor Networks”, Computational Intelligence and Computing Research (ICCIC), 2014 IEEE International Conference on 18-20 Dec. 2014. https://doi.org/10.1109/ICCIC.2014.7238435.

      [2] N. Zhu, I. O. Connor, U. De Lyon, N. De Lyon, and I. N. L. Umar, “Energy Measurements and Evaluations on High Data Rate and Ultra Low Power WSN Node”, 2013.

      [3] G. Yue, Y. Xie, and H. Wen, “The security issue of WSN based on cloud computing for smart grid,” Information Technology, vol. 12, no. 22, pp. 6702–6709, 2013. https://doi.org/10.3923/itj.2013.6702.6709.

      [4] M. Sajid, K. Khan, U. Qasim, Z. A. Khan, S. Tariq, and N. Javaid, “A New Linear Cluster Handling (LCH) Technique Towards Energy Efficiency in Linear WSNs,” 2015 IEEE 29th International Conference on Advance Information Networking and Applications (AINA), vol. 7, pp. 389–393, 2015.

      [5] M. Rezaeirad, M. Orooji, S. Mazloom, D. Perkins, and M. Bayoumi, “A novel clustering paradigm for key pre-distribution: Toward a better security in homogenous WSNs,” 2013 IEEE 10th Consumer Communication Networking Conference (CCNC), pp. 308–316, 2013. https://doi.org/10.1109/CCNC.2013.6488463.

      [6] S. M. Sakharkar, R. S. Mangrulkar, and M. Atique, “A survey: A secure routing method for detecting false reports and gray-hole attacks along with Elliptic Curve Cryptography in wireless sensor networks,” 2014 IEEE Students’ Conference Electrical Electronic Computer Science, pp. 1–5, 2014.

      [7] Q. Zhao and Y. Nakamoto, “Routing Algorithms for Preventing Energy Holes and Improving Fault Tolerance in Wireless Sensor Networks,” Proc. 2nd International Symposium on Network Computing, pp. 278–283, 2014. https://doi.org/10.1109/CANDAR.2014.18.

      [8] K. Y. S. B and S. S. Tyagi, “SAERP : An Energy Efficiency Real-time Routing Protocol in Wireless Sensor Networks,” pp. 249–254, 2014.

      [9] M. R. Ahmed and D. Sharma, “Protecting wireless sensor networks from internal attacks based on uncertain decisions,” 2013 IEEE Wireless Communication Network Conference, pp. 1854–1859, 2013.

      [10] Deepali and Padmavati, “Improved energy efficiency semi static routing algorithm using sink mobility for WSNs,” 2014 Recent Advance Engineering and Computational Sciences (RAECS).pp. 1–5, 2014.




Article ID: 10106
DOI: 10.14419/ijet.v7i2.10106

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.