EconPapers    
Economics at your fingertips  
 

An Active Defense Model with Low Power Consumption and Deviation for Wireless Sensor Networks Utilizing Evolutionary Game Theory

Mohammed Ahmed Ahmed Al-Jaoufi, Yun Liu and Zhenjiang Zhang
Additional contact information
Mohammed Ahmed Ahmed Al-Jaoufi: School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
Yun Liu: School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
Zhenjiang Zhang: School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 100044, China

Energies, 2018, vol. 11, issue 5, 1-16

Abstract: In wireless sensors networks, nodes may be easily captured and act non-cooperatively, for example by not defending forwarding packets in response to their own limited resources. If most of these nodes are obtained by attackers, and an attack by an internal malicious node occurs, the entire network will be paralyzed and not be able to provide normal service. Low power consumption indicates that the rational sensor nodes tend to be very close to the mean; high power consumption indicates that the rational sensor nodes are spread out over a large range of values. This paper offers an active defense model for wireless sensor networks based on evolutionary game theory. We use evolutionary game theory to analyze the reliability and stability of a wireless sensor network with malicious nodes. Adding a defense model into the strategy space of the rational nodes and establishing a preventive mechanism forces the malicious node to abandon the attack and even switch to cooperative strategies. Thus, this paper argues that the stability and reliability of wireless sensor networks can be improved. Numerical experiments were conducted to evaluate the proposed defense model, and these results verified our conclusions based on a theoretical analysis that showed that, compared with the existing algorithms, our approach has lower energy consumption, lower deviation, and a higher probability to quickly switch each node to cooperative strategies.

Keywords: active defense; malicious node; attack; deviation; wireless sensor network security (search for similar items in EconPapers)
JEL-codes: Q Q0 Q4 Q40 Q41 Q42 Q43 Q47 Q48 Q49 (search for similar items in EconPapers)
Date: 2018
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (3)

Downloads: (external link)
https://www.mdpi.com/1996-1073/11/5/1281/pdf (application/pdf)
https://www.mdpi.com/1996-1073/11/5/1281/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jeners:v:11:y:2018:i:5:p:1281-:d:146931

Access Statistics for this article

Energies is currently edited by Ms. Agatha Cao

More articles in Energies from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jeners:v:11:y:2018:i:5:p:1281-:d:146931