|
Article | Mechanism | Description |
|
Attiah et al. [8], 2018 | Evolutionary game | (i) A route selection problem is modeled by using a game-theoretic approach. |
(ii) The replicator dynamics mechanism is used to indicate that the nodes can be trained from their strategies and hence modify their strategies sets with time. |
|
Subba et al. [41], 2018 | Detection | (i) The work combines a lightweight neural network with specification rules for anomaly detection to identify misbehaving nodes in the network. |
(ii) A Bayesian game is designed which takes the IDS and the sensor nodes as two noncooperative players. |
|
Umar et al. [18], 2018 | Incentive-based | (i) Virtual currency referred to as scores is used for selfish node stimulation. |
(ii) Scores are calculated by taking many nodes’ and network’s parameters. |
|
Raja et al. [42], 2018 | Trust management | (i) The selection of cluster heads is done by using the multiple constraint aware glow worm swarm optimization approach (MC-GSO). Every node is evaluated in the network according to this approach. |
(ii) Various objectives are achieved for the trust metrics during the cluster head selection. |
|
Yang et al. [47], 2017 | Incentive-based | (i) Particularly designed for clustered WSN with an aim to balance the consumption of energy among all the nodes. |
(ii) A convex payoff function is designed for the behavior of each node. The game is derived with the help of this convex optimization. |
|
Gemeda et al. [40], 2017 | Evolutionary game-based | (i) Targets cluster-based WSNs. |
(ii) Mainly focus on the cluster heads manipulation and selection process. |
|
Yu [48], 2016 | Incentive-based | (i) Nodes are pushed to cooperate in routing by using some incentives. |
(ii) Some values are exchanged for getting data communication and relay services. |
|
Li et al. [43], 2015 | Trust management | (i) The work is proposed for VANETs where the trustworthiness of both mobile sensor nodes and transmitted data is evaluated. |
(ii) The recommendation trust and functional trust are categorized to indicate nodes' performance. |
|
Duan et al. [17], 2014 | Trust management | (i) A trust-aware routing frame is designed by incorporating lightweight and proficient attacks resistant mechanism. |
(ii) The common features associated with attacks in terms of trust awareness are addressed. |
(iii) The trust derivation is based on the analysis of results. |
|
Chen et al. [21], 2013 | Detection | (i) The cooperation level of each node is calculated and the selfish nodes are punished by blocking them in the network. |
Xu and Guo [49], 2012 | Incentive-based | (i) Particularly target opportunistic networks. |
(ii) The incentive exchange is made through various rounds of a bargaining game. |
|
Bao et al. [50], 2012 | Detection | (i) Uses highly expandable cluster and hierarchical trust-based management protocol for efficiently detecting the malicious and the selfish. |
|