Open Access   Article Go Back

Game Theory Based Security Approach in Wireless Sensor Network

A. Muruganandam1 , R. Anitha2

  1. Department of Computer Science, Bharathiar University, Coimbatore, India.
  2. Department of MCA, Muthayammal Engineering College, Rasipuram, India.

Correspondence should be addressed to: murugandbc1976@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-6 , Page no. 154-158, Jun-2017

Online published on Jun 30, 2017

Copyright © A. Muruganandam, R. Anitha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A. Muruganandam, R. Anitha, “Game Theory Based Security Approach in Wireless Sensor Network,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.154-158, 2017.

MLA Style Citation: A. Muruganandam, R. Anitha "Game Theory Based Security Approach in Wireless Sensor Network." International Journal of Computer Sciences and Engineering 5.6 (2017): 154-158.

APA Style Citation: A. Muruganandam, R. Anitha, (2017). Game Theory Based Security Approach in Wireless Sensor Network. International Journal of Computer Sciences and Engineering, 5(6), 154-158.

BibTex Style Citation:
@article{Muruganandam_2017,
author = {A. Muruganandam, R. Anitha},
title = {Game Theory Based Security Approach in Wireless Sensor Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2017},
volume = {5},
Issue = {6},
month = {6},
year = {2017},
issn = {2347-2693},
pages = {154-158},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1318},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1318
TI - Game Theory Based Security Approach in Wireless Sensor Network
T2 - International Journal of Computer Sciences and Engineering
AU - A. Muruganandam, R. Anitha
PY - 2017
DA - 2017/06/30
PB - IJCSE, Indore, INDIA
SP - 154-158
IS - 6
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
547 471 downloads 565 downloads
  
  
           

Abstract

Wireless sensor networks have gone through a lot of changes in recent years. Secrecy in data transmission and network standby time are a major concern in communication. Currently, DSR algorithm is used for transmission of data between nodes. The algorithm determines the path for data to be transmitted to the destination node. Once the path is determined, all data are transmitted through the path. This method of data transmission drains the battery of the nodes quickly when the nodes are stationary. All the data are transmitted in a single stretch through the data path selected. When someone gains access to this path, all the data can be collected, and the entire network is compromised. A theory is implemented for eliminating this game. The data path is selected such that the battery level of all the nodes is effectively used. The data are spit and transmitted using more than one path for enhancing data security.

Key-Words / Index Term

Network Life Time, Data Encryption, Game Theory

References

[1] Xiangwen Zhang; Fei-Yue Wang “Key Technologies of Passive Wireless Sensor Networks Based on Surface Acoustic Wave Resonators”. Networking, Sensing and Control, IEEE International Conference (ICNSC) on 6-8 April 2008, pp. 1253 – 1258.
[2] Shi-Wei Li; Dong-Qian Ma; Qiang-Yi Li ; Ju-Wei Zhang; X. Zhang “Nodes deployment algorithm based on perceived probability of heterogeneous wireless network”. International Conference on Advanced Mechatronic Systems (ICAMechS), 25 – 27 Sept. 2013 pp: 374 – 378.
[3] Keisuke Nakatsuka, Kenzo Nakamura, Yuichi Hirata, Takeshi Hattori “A Proposal of the Co-existence MAC of IEEE 802.11b/g and 802.15.4 used for The Wireless Sensor Network” 5th IEEE Conference on EXCO, Daegu, Korea October 22-25, 2006.
[4] Vaibhav V. Deshpande; Arvind R. Bhagat Patil “Energy efficient clustering in Wireless Sensor Network using Cluster of Cluster heads”, Wireless and Optical Communication Networks (WOCN), 2013, Tenth International IEEE Conference on 26 – 28 July 2013, pp: 1 – 5.
[5] Wei. Zhao; Yao. Liang “Kernel-based Markov random fields learning for wireless sensor networks”, Local Computer Networks (LCN) IEEE 36th Conference on 4 -7 Oct 2011, pp: 155 – 158.
[6] M. Jeyalakshmi “Location aware end-end data security using Mac for secured wireless sensor networks”. International Conference on Advances in Engineering, Science, and Management (ICAESM), 2012.
[7] Md. Anisur Rahman, Mitu Kumar Debnath “An energy-efficient data security system for Wireless Sensor Network”, 11th International IEEE Conference on Computer and Information Technology, (ICCIT) 24 – 27 Dec. 2008, pp: 381 – 386.
[8] Akshay S. Nagdive, Piyush K. Ingole “An implementation of energy efficient data compression & security mechanism in clustered Wireless Sensor Network”, International IEEE Conference on Advances in Computer Engineering and Applications (ICACEA), 19 – 20 March 2015, pp: 375 – 380.
[9] M. Panda “Data Security in Wireless Sensor Networks via AES algorithm”. IEEE 9th International Conference on Intelligent Systems and Control (ISCO), 9 – 10 Jan. 2015. pp: 1 – 5.
[10] R. Velayutham, J. Mary Suganya “Security Authentication through AES and fine-grained distributed Data Access Control using Clustering in Wireless Sensor Networks”. Third International Conference on Computing Communication and Networking Technologies, 26 – 28 July 2012, pp: 1- 6.