Visible to the public Review of jamming attack using game theory

TitleReview of jamming attack using game theory
Publication TypeConference Paper
Year of Publication2017
AuthorsBhoyar, D. G., Yadav, U.
Conference Name2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)
Keywordsexternal attack, game theoretic representation, game theoretic security, game theoretic strategies, game theory, Games, human factors, information preservation, interaction model, internal attack, jamming, jamming attack, jamming detection, jamming technique, malicious attack nodes, Metrics, network load, power expenditure, pubcrawl, Scalability, security, security threats, telecommunication security, timing channel, wireless networks, Wireless Sensor Network, Wireless sensor networks, WSN
Abstract

The paper presents the study of protecting wireless sensor network (WSNs) by using game theory for malicious node. By means of game theory the malicious attack nodes can be effectively modeled. In this research there is study on different game theoretic strategies for WSNs. Wireless sensor network are made upon the open shared medium which make easy to built attack. Jamming is the most serious security threats for information preservation. The key purpose of this paper is to present a general synopsis of jamming technique, a variety of types of jammers and its prevention technique by means of game theory. There is a network go through from numerous kind of external and internal attack. The jamming of attack that can be taking place because of the high communication inside the network execute by the nodes in the network. As soon as the weighty communications raise the power expenditure and network load also increases. In research work a game theoretic representation is define for the safe communication on the network.

URLhttps://ieeexplore.ieee.org/document/8276173
DOI10.1109/ICIIECS.2017.8276173
Citation Keybhoyar_review_2017