The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The coexistence of traditional radio systems in factory automation operating in parallel may be achieved by decoupling the spectrum either in time, frequency, space or code. There is a growing interest in cognitive radio (CR) to overcome a spectrum scarcity problem. The CR is intended to coexist with primary users (PUs) by using either of the white, grey or black spectrum holes by using the software...
Due to the limited capabilities of sensor nodes in Wireless Sensor Networks (WSNs) in terms of computation, communication, and energy, selecting the profitable detection strategy for lowering resources consumption determines whether the IDS can be used practically. The signaling game is used to set up an intrusion detection game modeling the interactions between a malicious sensor node and an IDS...
We use a Bayesian game-theoretic approach to model transmission control in energy-harvesting wireless sensor networks. In general, the energy state of an energy-harvesting sensor varies more dramatically with time as compared to traditional battery-powered sensors. Therefore, each energy-harvesting sensor is aware of its instantaneous energy state, which is modeled as its private information. Each...
In this paper, we address a method for an intrusion detection system (IDS) in wireless sensor networks (WSNs). The type of the attack that we address in this paper focuses on dropping packets attacks (DPA) in WSNs and we focus on the design of security enforcement mechanisms for preventing attacks as well. we present a signaling game-theoretic model to analyze intrusion detection in wireless sensor...
Sensors are energy constrained, which leads to possible selfishness as the sensor may decline to forward packets for other nodes. Sensors also face the problem of unfair depletion of their energy if communication protocols were energy-unaware. To address the above concern, we propose the dynamic Bayesian game approach: our algorithm derives mutually acceptable path selection strategies between the...
Wireless sensor networks (WSNs) are new technologies, foreseen to be used increasingly in the near future, and security is an important issue for them. However because of the nodes resource limitations, other schemes proposed for securing general ad hoc networks, are not appropriate for WSNs. Usually some nodes act maliciously and they are able to do different kinds of DoS attacks. In order to make...
Cooperative diversity protocols are designed with the assumption that terminals always help each other in a socially efficient manner. This assumption may not be valid in commercial wireless networks where terminals may misbehave for selfish or malicious intentions. The presence of misbehaving terminals creates a social-dilemma where terminals exhibit uncertainty about the cooperative behavior of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.