Study on Selfish Node Incentive Mechanism with a Forward Game Node in Wireless Sensor Networks

被引:9
作者
Al-Jaoufi, Mohammed Ahmed Ahmed [1 ]
Liu, Yun [1 ]
Zhang, Zhen-Jiang [1 ]
Uden, Lorna [2 ]
机构
[1] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
[2] Staffordshire Univ, Sch Comp & Digital Technol, Stoke On Trent ST4 2DE, Staffs, England
关键词
ATTACK;
D O I
10.1155/2017/8591206
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In a wireless sensor network, some nodes may act selfishly and noncooperatively, such as not forwarding packets, in response to their own limited resources. If most of the nodes in a network exhibit this selfish behavior, the entire network will be paralyzed, and it will not be able to provide normal service. This paper considers implementing the idea of evolutionary game theory into the nodes of wireless sensor networks to effectively improve the reliability and stability of the networks. We present a new model for the selfish node incentive mechanism with a forward game node for wireless sensor networks, and we discuss applications of the replicator dynamics mechanism to analyze evolutionary trends of trust relationships among nodes. We analyzed our approach theoretically and conducted simulations based on the idea of evolutionary game theory. The results of the simulation indicated that a wireless sensor network that uses the incentive mechanism can forward packets well while resisting any slight variations. Thus, the stability and reliability of wireless sensor networks are improved. We conducted numerical experiments, and the results verified our conclusions based on the theoretical analysis.
引用
收藏
页数:13
相关论文
共 16 条
[1]  
[Anonymous], 2004, P 3 INT S INF PROC S
[2]   Analysis and evaluation of incentive mechanisms in P2P networks: a spatial evolutionary game theory perspective [J].
Cui, Guanghai ;
Li, Mingchu ;
Wang, Zhen ;
Ren, Jiankang ;
Jiao, Dong ;
Ma, Jianhua .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (12) :3044-3064
[3]  
Datema S., 2005, THESIS
[4]  
Fei Hu, 2005, Ad Hoc Networks, V3, P69, DOI 10.1016/j.adhoc.2003.09.009
[5]  
Hartung C., 2005, CUCS98804
[6]  
Karlof C, 2003, PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL WORKSHOP ON SENSOR NETWORK PROTOCOLS AND APPLICATIONS, P113, DOI 10.1109/snpa.2003.1203362
[7]   Optimal jamming attacks and network Defense policies in wireless sensor networks [J].
Li, Mingyan ;
Koutsopoulos, Iordanis ;
Poovendran, Radha .
INFOCOM 2007, VOLS 1-5, 2007, :1307-+
[8]  
Lu K, 2015, 2015 12TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), P2049, DOI 10.1109/FSKD.2015.7382266
[9]  
Ngai ECH, 2006, IEEE ICC, P3383
[10]   SPINS: Security protocols for sensor networks [J].
Perrig, A ;
Szewczyk, R ;
Tygar, JD ;
Wen, V ;
Culler, DE .
WIRELESS NETWORKS, 2002, 8 (05) :521-534