Table of Contents Author Guidelines Submit a Manuscript
International Journal of Antennas and Propagation
Volume 2017 (2017), Article ID 8591206, 13 pages
https://doi.org/10.1155/2017/8591206
Research Article

Study on Selfish Node Incentive Mechanism with a Forward Game Node in Wireless Sensor Networks

1School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
2School of Computing and Digital Technologies, Staffordshire University, Stoke-on-Trent ST4 2DE, UK

Correspondence should be addressed to Yun Liu; nc.ude.utjb@nuyuil

Received 4 February 2017; Revised 1 August 2017; Accepted 16 August 2017; Published 8 October 2017

Academic Editor: Francisco Falcone

Copyright © 2017 Mohammed Ahmed Ahmed Al-Jaoufi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, “SPINS: security protocols for sensor networks,” in Proceedings of the 7th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom '01), pp. 189–199, July 2001. View at Scopus
  2. C. Hartung, “Node compromise in sensor network: the need for Secure System,” Tech. Rep. CU-CS-988-04, 2005. View at Google Scholar
  3. W. Xu, K. Ma, W. Trappe, and Y. Zhang, “Jamming sensor networks: attack and defense strategies,” IEEE Network, vol. 20, no. 3, pp. 41–47, 2006. View at Publisher · View at Google Scholar · View at Scopus
  4. J. Newsome et al., “The Sybil attack in sensor network analysis and defenses,” in Proceedings of the 3rd International Symposium on Information Processing in Sensor Network, 2004.
  5. A. D. Wood and J. A. Stankovic, “Denial of service in sensor networks,” Computer, vol. 35, no. 10, pp. 54–62, 2002. View at Publisher · View at Google Scholar · View at Scopus
  6. B. Yu and B. Xiao, “Detecting Selective forwarding attacks in wireless sensor network,” in Proceedings of the 2nd International Workshop on Security in System and Network, 2006.
  7. F. Hu and N. K. Sharma, “Security considerations in ad hoc sensor networks,” Ad Hoc Networks, vol. 3, no. 1, pp. 69–89, 2005. View at Publisher · View at Google Scholar · View at Scopus
  8. M. Li, I. Koutsopoulos, and R. Poovendran, “Optimal jamming attacks and network defense policies in wireless sensor networks,” in Proceedings of the 26th IEEE International Conference on Computer Communications, IEEE INFOCOM '07, pp. 1307–1315, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. S. Datema, A Case Study of Wireless Sensor Network Attacks [M.S. thesis], Parallel and Distributed System Group, Faculty of Electrical Engineering, Mathematics, and Computer Science, Delft University of Technology, Delft, Netherlands, 2005.
  10. E. C. Ngai, J. Liu, and M. R. Lyu, “On the intruder detection for sinkhole attack in wireless sensor networks,” in Proceedings of the 2006 IEEE International Conference on Communications, ICC '06, pp. 3383–3389, July 2006. View at Publisher · View at Google Scholar · View at Scopus
  11. C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” in Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127, May 2003. View at Publisher · View at Google Scholar
  12. Z. Sheng, L. E. Li, Y. G. Liu, and Y. R. Yang, “On designing incentive compatible routing and forwarding protocols in wireless ad-hoc networks,” Wireless Networks, vol. 13, no. 6, pp. 799–816, 2007. View at Publisher · View at Google Scholar · View at Scopus
  13. G. Cui, M. Li, Z. Wang et al., “Analysis and evaluation of incentive mechanisms in P2P networks: a spatial evolutionary game theory perspective,” Concurrency and Computation Practice and Experience, vol. 27, no. 12, pp. 3044–3064, 2015. View at Google Scholar
  14. K. Lu and S. Wang, “A reward-and-punishment aware incentive mechanism in P2P networks,” in Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD '15, pp. 2049–2053, August 2015. View at Publisher · View at Google Scholar · View at Scopus
  15. D.-P. Qu, X.-W. Wang, and M. Huang, “Selfish node detection and incentive mechanism in mobile P2P networks,” Journal of Software, vol. 24, no. 4, pp. 887–899, 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. Y. Wang, A. Nakao, A. V. Vasilakos, and J. Ma, “P2P soft security: on evolutionary dynamics of P2P incentive mechanism,” Computer Communications, vol. 34, no. 3, pp. 241–249, 2011. View at Publisher · View at Google Scholar · View at Scopus