Improving the security of wireless sensor networks using Game Theory

Publish Year: 1400
نوع سند: مقاله ژورنالی
زبان: English
View: 157

This Paper With 10 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JACET-7-2_001

تاریخ نمایه سازی: 17 خرداد 1401

Abstract:

Today, the use of wireless sensor networks has become very popular in many applications. Due to the connection in wireless sensor networks, it is done wirelessly, so they are naturally insecure and prone to various types of attacks. In the past, various solutions were offered in this regard, each of which had its problems. Therefore, in this proposed solution, an attempt was made to solve these problems. The proposed solution for securing sensor nodes uses authentication based on the ZKP protocol, which has been improved with Interlock, and game theory has also been used to more quickly identify intrusive nodes. One of the most important benefits of the proposed solution is to prevent attacks such as sleep deprivation. The proposed algorithm is able to detect quickly and is able to prevent network damage in the fastest possible time. The proposed solution was implemented and reviewed in MATLAB environment and the studies showed a very good performance of the proposed method.

Authors

Behzad Seif

Department of Computer Engineering, Garmsar branch, Islamic Azad University, Garmsar, IRAN

mohammad goodarzi

Mohammad goodarzi ,Computer Engineering Department, Islamic Azad University Garmsar branch, IRAN (m_goodarzi۱۸۱@yahoo.com).

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • K. Sharma and S. Pradhan, "Cluster Head Rotation in Wireless ...
  • Y. ZHANG, C. WU, J. CAO, X. LI: A secret ...
  • S. RANJEETHA, N. RENUGA, R. SHARMILA: Secure zone routing protocol ...
  • T. YANG, X. XIANGYANG, L. PENG, L. TONGHUI: A secure ...
  • A. T. ALGHAMDI: Convolutional technique for enhancing security in wireless ...
  • نمایش کامل مراجع