Full Paper View Go Back

Securing MWSNs using Game Theory and Multiple Evidence Approach

Bindushree V.1

Section:Research Paper, Product Type: Journal-Paper
Vol.7 , Issue.6 , pp.43-45, Dec-2019


Online published on Dec 31, 2019


Copyright © Bindushree V. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Bindushree V., “Securing MWSNs using Game Theory and Multiple Evidence Approach,” International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.6, pp.43-45, 2019.

MLA Style Citation: Bindushree V. "Securing MWSNs using Game Theory and Multiple Evidence Approach." International Journal of Scientific Research in Computer Science and Engineering 7.6 (2019): 43-45.

APA Style Citation: Bindushree V., (2019). Securing MWSNs using Game Theory and Multiple Evidence Approach. International Journal of Scientific Research in Computer Science and Engineering, 7(6), 43-45.

BibTex Style Citation:
@article{V._2019,
author = {Bindushree V.},
title = {Securing MWSNs using Game Theory and Multiple Evidence Approach},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {12 2019},
volume = {7},
Issue = {6},
month = {12},
year = {2019},
issn = {2347-2693},
pages = {43-45},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=1592},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=1592
TI - Securing MWSNs using Game Theory and Multiple Evidence Approach
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Bindushree V.
PY - 2019
DA - 2019/12/31
PB - IJCSE, Indore, INDIA
SP - 43-45
IS - 6
VL - 7
SN - 2347-2693
ER -

232 Views    289 Downloads    136 Downloads
  
  

Abstract :
Mobile wireless sensor network can be distinct as a wireless sensor association in which the nodes are mobile. There are many applications which make use of wireless sensor network so protection of nodes in the network is very important. These nodes are limited in terms of their processing units and power. Each sensor node is vulnerable to malicious attacks, so ensuring proper network operation is essential to protect these nodes from the attacks. In MWSNs, denial of service attack is more damaging the network by sending unnecessary packets to the victim node to drain resources offered to the fatality node. Denial of service attack is exceedingly complicated to detect using traditional invasion recognition systems. The proposed method, adopts a combination of game theory and multiple evidence combination. Game theoretic approach is a diversion between the nodes, attacker and intrusion detection system. The game will be performed at any moment a target node encounters a packet at the same time as a DDoS assail after an unambiguous sill in mobile wireless sensor network. Multiple evidence combination finds out internal attacks, by collecting evidences from the neighbour nodes and detects misbehaving nodes and isolates it. In order to estimate the concert of anticipated form, the optimized link state routing protocol was replicated in NS-2 simulator. The proposed model attack`s detection yields greater packet delivery ratio and reduced average end to end delay and packet loss.

Key-Words / Index Term :
Denial of Service Attack, Network Simulator, malicious, Mobile wireless sensor network, Game theoretic

References :
[1]. A. Agah and S. K. Das, “Preventing DoS attacks in wireless sensor networks: A repeated game theory approach,” International Journal of Network Security, vol.5, Sept. 2007, pp. 145–153.
[2]. M. Kodialam and T. V. Lakshman, “Detecting network intrusions via sampling: A game theoretic approach,” Proc. Annual Joint Conference of the IEEE Computer and Communications (INFOCOM 2003), vol. 3, 2003, pp. 1880-1889.
[3]. Thomas, R., Mark, B., Johnson, T., and Croall, J. (2003) NetBouncer: Clientlegitimacy- based highperformance DDoS filtering. Proceedings of the 3rd DARPA Information Survivability Conference and Exposition, Washington, DC, 22-24 April, pp. 111–113. IEEE CS, USA.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation