Abstract — Wireless sensor networks has grown a lot in recent years and offers excellent opportunities in defense related applications such as monitoring environment and collecting data related to anti- social activities. So there is a need to develop new techniques or modify the current security mechanisms to transfer data from source to base station. Game theory is a mathematical method that describes the phenomenon of conflict and co- operation between intelligent and rational decision- makers. In particular, the theory has been proven very useful in the design of WSN. A new method for detection of IDS based on cluster and game theory is proposed in this paper. When a target occurs in sensing field of WSN, the sensor node begin to form c...
Wireless Sensor Networks typically consist of a large number of sensor nodes with constrained resour...
Abstract — Wireless sensor and actor networks are a group of sensors and actors linked by wireless m...
In wireless sensor networks, clustering divides network into clusters and makes cluster heads (CHs) ...
International audienceOne of the most significant difficulty in Wireless Sensors Network (WSN) is th...
© IFIP International Federation for Information Processing 2015. In this work we present an Intrusio...
We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish ...
© 2016 by the authors; licensee MDPI, Basel, Switzerland. We present a study of using game theory fo...
The wireless sensor network clustering routing mechanism is the best multihop algorithm used to aggr...
Part 9: Cyber-physical Systems and Critical Infrastructures SecurityInternational audienceIn this wo...
AbstractAs Wireless Sensor Networks (WSNs) become increasingly popular, it is necessary to require I...
Abstract—Insufficiency of memory and battery power of sensors makes the security of sensor networks ...
Abstract- The problem of detecting malicious nodes in wireless sensor networks is considered. Since ...
Energy efficiency is one of the critical challenges in wireless sensor networks (WSNs). WSNs collect...
The unattended nature of wireless sensor networks makes them very vulnerable to an adversary's malic...
This research involves the design, development, and theoretical demonstration of models resulting in...
Wireless Sensor Networks typically consist of a large number of sensor nodes with constrained resour...
Abstract — Wireless sensor and actor networks are a group of sensors and actors linked by wireless m...
In wireless sensor networks, clustering divides network into clusters and makes cluster heads (CHs) ...
International audienceOne of the most significant difficulty in Wireless Sensors Network (WSN) is th...
© IFIP International Federation for Information Processing 2015. In this work we present an Intrusio...
We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish ...
© 2016 by the authors; licensee MDPI, Basel, Switzerland. We present a study of using game theory fo...
The wireless sensor network clustering routing mechanism is the best multihop algorithm used to aggr...
Part 9: Cyber-physical Systems and Critical Infrastructures SecurityInternational audienceIn this wo...
AbstractAs Wireless Sensor Networks (WSNs) become increasingly popular, it is necessary to require I...
Abstract—Insufficiency of memory and battery power of sensors makes the security of sensor networks ...
Abstract- The problem of detecting malicious nodes in wireless sensor networks is considered. Since ...
Energy efficiency is one of the critical challenges in wireless sensor networks (WSNs). WSNs collect...
The unattended nature of wireless sensor networks makes them very vulnerable to an adversary's malic...
This research involves the design, development, and theoretical demonstration of models resulting in...
Wireless Sensor Networks typically consist of a large number of sensor nodes with constrained resour...
Abstract — Wireless sensor and actor networks are a group of sensors and actors linked by wireless m...
In wireless sensor networks, clustering divides network into clusters and makes cluster heads (CHs) ...