Game theory meets wireless sensor networks security requirements and threats mitigation: A survey

Mohamed S. Abdalzaher, Karim Seddik, Maha Elsabrouty, Osamu Muta, Hiroshi Furukawa, Adel Abdel-Rahman

Research output: Contribution to journalArticle

37 Citations (Scopus)

Abstract

We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.

Original languageEnglish
Article number1003
JournalSensors (Switzerland)
Volume16
Issue number7
DOIs
Publication statusPublished - Jun 29 2016

Fingerprint

game theory
Game Theory
Network security
Game theory
Wireless sensor networks
requirements
sensors
attack
games
taxonomy
decision making
Taxonomies
lists
Scalability
Decision Making
Decision making
Surveys and Questionnaires

All Science Journal Classification (ASJC) codes

  • Analytical Chemistry
  • Biochemistry
  • Atomic and Molecular Physics, and Optics
  • Instrumentation
  • Electrical and Electronic Engineering

Cite this

Game theory meets wireless sensor networks security requirements and threats mitigation : A survey. / Abdalzaher, Mohamed S.; Seddik, Karim; Elsabrouty, Maha; Muta, Osamu; Furukawa, Hiroshi; Abdel-Rahman, Adel.

In: Sensors (Switzerland), Vol. 16, No. 7, 1003, 29.06.2016.

Research output: Contribution to journalArticle

Abdalzaher, Mohamed S. ; Seddik, Karim ; Elsabrouty, Maha ; Muta, Osamu ; Furukawa, Hiroshi ; Abdel-Rahman, Adel. / Game theory meets wireless sensor networks security requirements and threats mitigation : A survey. In: Sensors (Switzerland). 2016 ; Vol. 16, No. 7.
@article{a3e40349341042859246e43fd5a6b698,
title = "Game theory meets wireless sensor networks security requirements and threats mitigation: A survey",
abstract = "We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.",
author = "Abdalzaher, {Mohamed S.} and Karim Seddik and Maha Elsabrouty and Osamu Muta and Hiroshi Furukawa and Adel Abdel-Rahman",
year = "2016",
month = "6",
day = "29",
doi = "10.3390/s16071003",
language = "English",
volume = "16",
journal = "Sensors",
issn = "1424-3210",
publisher = "Multidisciplinary Digital Publishing Institute (MDPI)",
number = "7",

}

TY - JOUR

T1 - Game theory meets wireless sensor networks security requirements and threats mitigation

T2 - A survey

AU - Abdalzaher, Mohamed S.

AU - Seddik, Karim

AU - Elsabrouty, Maha

AU - Muta, Osamu

AU - Furukawa, Hiroshi

AU - Abdel-Rahman, Adel

PY - 2016/6/29

Y1 - 2016/6/29

N2 - We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.

AB - We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.

UR - http://www.scopus.com/inward/record.url?scp=84976562123&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84976562123&partnerID=8YFLogxK

U2 - 10.3390/s16071003

DO - 10.3390/s16071003

M3 - Article

AN - SCOPUS:84976562123

VL - 16

JO - Sensors

JF - Sensors

SN - 1424-3210

IS - 7

M1 - 1003

ER -