Game Theory Based Security Approach in Wireless Sensor Network
Keywords:
Network Life Time, Data Encryption, Game TheoryAbstract
Wireless sensor networks have gone through a lot of changes in recent years. Secrecy in data transmission and network standby time are a major concern in communication. Currently, DSR algorithm is used for transmission of data between nodes. The algorithm determines the path for data to be transmitted to the destination node. Once the path is determined, all data are transmitted through the path. This method of data transmission drains the battery of the nodes quickly when the nodes are stationary. All the data are transmitted in a single stretch through the data path selected. When someone gains access to this path, all the data can be collected, and the entire network is compromised. A theory is implemented for eliminating this game. The data path is selected such that the battery level of all the nodes is effectively used. The data are spit and transmitted using more than one path for enhancing data security.
References
Xiangwen Zhang; Fei-Yue Wang “Key Technologies of Passive Wireless Sensor Networks Based on Surface Acoustic Wave Resonators”. Networking, Sensing and Control, IEEE International Conference (ICNSC) on 6-8 April 2008, pp. 1253 – 1258.
Shi-Wei Li; Dong-Qian Ma; Qiang-Yi Li ; Ju-Wei Zhang; X. Zhang “Nodes deployment algorithm based on perceived probability of heterogeneous wireless network”. International Conference on Advanced Mechatronic Systems (ICAMechS), 25 – 27 Sept. 2013 pp: 374 – 378.
Keisuke Nakatsuka, Kenzo Nakamura, Yuichi Hirata, Takeshi Hattori “A Proposal of the Co-existence MAC of IEEE 802.11b/g and 802.15.4 used for The Wireless Sensor Network” 5th IEEE Conference on EXCO, Daegu, Korea October 22-25, 2006.
Vaibhav V. Deshpande; Arvind R. Bhagat Patil “Energy efficient clustering in Wireless Sensor Network using Cluster of Cluster heads”, Wireless and Optical Communication Networks (WOCN), 2013, Tenth International IEEE Conference on 26 – 28 July 2013, pp: 1 – 5.
Wei. Zhao; Yao. Liang “Kernel-based Markov random fields learning for wireless sensor networks”, Local Computer Networks (LCN) IEEE 36th Conference on 4 -7 Oct 2011, pp: 155 – 158.
M. Jeyalakshmi “Location aware end-end data security using Mac for secured wireless sensor networks”. International Conference on Advances in Engineering, Science, and Management (ICAESM), 2012.
Md. Anisur Rahman, Mitu Kumar Debnath “An energy-efficient data security system for Wireless Sensor Network”, 11th International IEEE Conference on Computer and Information Technology, (ICCIT) 24 – 27 Dec. 2008, pp: 381 – 386.
Akshay S. Nagdive, Piyush K. Ingole “An implementation of energy efficient data compression & security mechanism in clustered Wireless Sensor Network”, International IEEE Conference on Advances in Computer Engineering and Applications (ICACEA), 19 – 20 March 2015, pp: 375 – 380.
M. Panda “Data Security in Wireless Sensor Networks via AES algorithm”. IEEE 9th International Conference on Intelligent Systems and Control (ISCO), 9 – 10 Jan. 2015. pp: 1 – 5.
R. Velayutham, J. Mary Suganya “Security Authentication through AES and fine-grained distributed Data Access Control using Clustering in Wireless Sensor Networks”. Third International Conference on Computing Communication and Networking Technologies, 26 – 28 July 2012, pp: 1- 6.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
