Review of jamming attack using game theory
Title | Review of jamming attack using game theory |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Bhoyar, D. G., Yadav, U. |
Conference Name | 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) |
Keywords | external attack, game theoretic representation, game theoretic security, game theoretic strategies, game theory, Games, human factors, information preservation, interaction model, internal attack, jamming, jamming attack, jamming detection, jamming technique, malicious attack nodes, Metrics, network load, power expenditure, pubcrawl, Scalability, security, security threats, telecommunication security, timing channel, wireless networks, Wireless Sensor Network, Wireless sensor networks, WSN |
Abstract | The paper presents the study of protecting wireless sensor network (WSNs) by using game theory for malicious node. By means of game theory the malicious attack nodes can be effectively modeled. In this research there is study on different game theoretic strategies for WSNs. Wireless sensor network are made upon the open shared medium which make easy to built attack. Jamming is the most serious security threats for information preservation. The key purpose of this paper is to present a general synopsis of jamming technique, a variety of types of jammers and its prevention technique by means of game theory. There is a network go through from numerous kind of external and internal attack. The jamming of attack that can be taking place because of the high communication inside the network execute by the nodes in the network. As soon as the weighty communications raise the power expenditure and network load also increases. In research work a game theoretic representation is define for the safe communication on the network. |
URL | https://ieeexplore.ieee.org/document/8276173 |
DOI | 10.1109/ICIIECS.2017.8276173 |
Citation Key | bhoyar_review_2017 |
- malicious attack nodes
- WSN
- wireless sensor networks
- Wireless Sensor Network
- wireless networks
- timing channel
- telecommunication security
- security threats
- security
- Scalability
- pubcrawl
- power expenditure
- network load
- Metrics
- external attack
- jamming technique
- jamming detection
- jamming attack
- Jamming
- internal attack
- interaction model
- information preservation
- Human Factors
- Games
- game theory
- game theoretic strategies
- game theoretic security
- game theoretic representation