{"id":"https://openalex.org/W4387870674","doi":"https://doi.org/10.1109/icc45041.2023.10279109","title":"Mitigating Energy Depletion Attack In Wireless Sensor Network Using Signaling Game","display_name":"Mitigating Energy Depletion Attack In Wireless Sensor Network Using Signaling Game","publication_year":2023,"publication_date":"2023-05-28","ids":{"openalex":"https://openalex.org/W4387870674","doi":"https://doi.org/10.1109/icc45041.2023.10279109"},"language":"en","primary_location":{"id":"doi:10.1109/icc45041.2023.10279109","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45041.2023.10279109","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2023 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077467685","display_name":"Ines Carole Kombou Sihomnou","orcid":"https://orcid.org/0009-0002-4522-1790"},"institutions":[{"id":"https://openalex.org/I198415970","display_name":"Universit\u00e9 d'Avignon et des Pays de Vaucluse","ror":"https://ror.org/00mfpxb84","country_code":"FR","type":"education","lineage":["https://openalex.org/I198415970"]},{"id":"https://openalex.org/I178331978","display_name":"Universit\u00e9 de Dschang","ror":"https://ror.org/0566t4z20","country_code":"CM","type":"education","lineage":["https://openalex.org/I178331978"]}],"countries":["CM","FR"],"is_corresponding":true,"raw_author_name":"Ines Carole Kombou Sihomnou","raw_affiliation_strings":["University of Dschang,Cameroon","University of Dschang, Cameroon","Avignon University, France"],"affiliations":[{"raw_affiliation_string":"University of Dschang,Cameroon","institution_ids":["https://openalex.org/I178331978"]},{"raw_affiliation_string":"University of Dschang, Cameroon","institution_ids":["https://openalex.org/I178331978"]},{"raw_affiliation_string":"Avignon University, France","institution_ids":["https://openalex.org/I198415970"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060341203","display_name":"Abderrahim Benslimane","orcid":"https://orcid.org/0000-0001-9307-6132"},"institutions":[{"id":"https://openalex.org/I4210119991","display_name":"Laboratoire Informatique d'Avignon","ror":"https://ror.org/02n399288","country_code":"FR","type":"facility","lineage":["https://openalex.org/I198415970","https://openalex.org/I4210119991"]},{"id":"https://openalex.org/I198415970","display_name":"Universit\u00e9 d'Avignon et des Pays de Vaucluse","ror":"https://ror.org/00mfpxb84","country_code":"FR","type":"education","lineage":["https://openalex.org/I198415970"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Abderrahim Benslimane","raw_affiliation_strings":["Avignon University,France","Avignon University, France"],"affiliations":[{"raw_affiliation_string":"Avignon University,France","institution_ids":["https://openalex.org/I198415970","https://openalex.org/I4210119991"]},{"raw_affiliation_string":"Avignon University, France","institution_ids":["https://openalex.org/I198415970"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109171008","display_name":"Ahmed H. Anwar","orcid":null},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]},{"id":"https://openalex.org/I1304082316","display_name":"United States Department of the Army","ror":"https://ror.org/035w1gb98","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ahmed H. Anwar","raw_affiliation_strings":["Network Security Branch,US Army Research Laboratory","US Army Research Laboratory, Network Security Branch"],"affiliations":[{"raw_affiliation_string":"Network Security Branch,US Army Research Laboratory","institution_ids":["https://openalex.org/I166416128","https://openalex.org/I1304082316"]},{"raw_affiliation_string":"US Army Research Laboratory, Network Security Branch","institution_ids":["https://openalex.org/I166416128"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021072405","display_name":"Gabriel Deugou\u00e9","orcid":"https://orcid.org/0000-0003-1015-0902"},"institutions":[{"id":"https://openalex.org/I178331978","display_name":"Universit\u00e9 de Dschang","ror":"https://ror.org/0566t4z20","country_code":"CM","type":"education","lineage":["https://openalex.org/I178331978"]}],"countries":["CM"],"is_corresponding":false,"raw_author_name":"Gabriel Deugoue","raw_affiliation_strings":["University of Dschang,Cameroon","University of Dschang, Cameroon"],"affiliations":[{"raw_affiliation_string":"University of Dschang,Cameroon","institution_ids":["https://openalex.org/I178331978"]},{"raw_affiliation_string":"University of Dschang, Cameroon","institution_ids":["https://openalex.org/I178331978"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032152029","display_name":"Frederica F. Nelson","orcid":"https://orcid.org/0000-0001-8641-384X"},"institutions":[{"id":"https://openalex.org/I1304082316","display_name":"United States Department of the Army","ror":"https://ror.org/035w1gb98","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796"]},{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Frederica.f Nelson","raw_affiliation_strings":["Network Security Branch,US Army Research Laboratory","US Army Research Laboratory, Network Security Branch"],"affiliations":[{"raw_affiliation_string":"Network Security Branch,US Army Research Laboratory","institution_ids":["https://openalex.org/I166416128","https://openalex.org/I1304082316"]},{"raw_affiliation_string":"US Army Research Laboratory, Network Security Branch","institution_ids":["https://openalex.org/I166416128"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090126029","display_name":"Charles Kamhoua","orcid":"https://orcid.org/0000-0003-2169-5975"},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]},{"id":"https://openalex.org/I1304082316","display_name":"United States Department of the Army","ror":"https://ror.org/035w1gb98","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Charles Kamhoua","raw_affiliation_strings":["Network Security Branch,US Army Research Laboratory","US Army Research Laboratory, Network Security Branch"],"affiliations":[{"raw_affiliation_string":"Network Security Branch,US Army Research Laboratory","institution_ids":["https://openalex.org/I166416128","https://openalex.org/I1304082316"]},{"raw_affiliation_string":"US Army Research Laboratory, Network Security Branch","institution_ids":["https://openalex.org/I166416128"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5077467685"],"corresponding_institution_ids":["https://openalex.org/I178331978","https://openalex.org/I198415970"],"apc_list":null,"apc_paid":null,"fwci":0.2009,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.51602927,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"6016","last_page":"6021"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.8232576847076416},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.681286096572876},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6751168966293335},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6309005618095398},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.49544084072113037},{"id":"https://openalex.org/keywords/boom","display_name":"Boom","score":0.49177125096321106},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.44698524475097656},{"id":"https://openalex.org/keywords/energy","display_name":"Energy (signal processing)","score":0.43159589171409607},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.4278145432472229},{"id":"https://openalex.org/keywords/sleep","display_name":"Sleep (system call)","score":0.41315895318984985},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.27085036039352417},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1952938735485077},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13759776949882507}],"concepts":[{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.8232576847076416},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.681286096572876},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6751168966293335},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6309005618095398},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.49544084072113037},{"id":"https://openalex.org/C141441539","wikidata":"https://www.wikidata.org/wiki/Q1970908","display_name":"Boom","level":2,"score":0.49177125096321106},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.44698524475097656},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.43159589171409607},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.4278145432472229},{"id":"https://openalex.org/C2775841894","wikidata":"https://www.wikidata.org/wiki/Q4683692","display_name":"Sleep (system call)","level":2,"score":0.41315895318984985},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.27085036039352417},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1952938735485077},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13759776949882507},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C87717796","wikidata":"https://www.wikidata.org/wiki/Q146326","display_name":"Environmental engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc45041.2023.10279109","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45041.2023.10279109","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2023 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Responsible consumption and production","score":0.46000000834465027,"id":"https://metadata.un.org/sdg/12"}],"awards":[{"id":"https://openalex.org/G4902763196","display_name":null,"funder_award_id":"W911NF-21-1-0326","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"}],"funders":[{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1487386742","https://openalex.org/W1490014613","https://openalex.org/W1504320512","https://openalex.org/W1551904227","https://openalex.org/W1628601166","https://openalex.org/W1964972187","https://openalex.org/W2029367163","https://openalex.org/W2039186034","https://openalex.org/W2048187645","https://openalex.org/W2058142224","https://openalex.org/W2062831425","https://openalex.org/W2139774323","https://openalex.org/W2292770283","https://openalex.org/W2391410647","https://openalex.org/W2593658177","https://openalex.org/W2603073654","https://openalex.org/W2612172766","https://openalex.org/W2792483895","https://openalex.org/W2801119105","https://openalex.org/W2885367166","https://openalex.org/W2946134548","https://openalex.org/W3030416048","https://openalex.org/W3111882422","https://openalex.org/W4210571452","https://openalex.org/W4281615828","https://openalex.org/W6629107533","https://openalex.org/W6698697267"],"related_works":["https://openalex.org/W1975451135","https://openalex.org/W917005982","https://openalex.org/W2148549110","https://openalex.org/W2295628284","https://openalex.org/W2890570089","https://openalex.org/W3095958166","https://openalex.org/W2129477171","https://openalex.org/W2593729912","https://openalex.org/W3148968234","https://openalex.org/W2012250365"],"abstract_inverted_index":{"Nowadays,":[0],"with":[1],"the":[2,49,74,78,90,142,148],"evolution":[3],"of":[4,29,52,92],"technology,":[5],"sensor":[6,32],"networks":[7,33],"have":[8,55],"experienced":[9],"a":[10,71,83,104,108,154],"real":[11],"boom.":[12],"Due":[13],"to":[14,26,89,146,150],"their":[15],"constitutions,":[16],"sensors":[17,93],"suffer":[18,39],"from":[19,41],"low":[20],"security":[21],"and":[22,86,117,126],"are":[23,77],"therefore":[24],"susceptible":[25],"different":[27],"types":[28],"attacks.":[30,98],"Wireless":[31],"(WSNs)":[34],"deployed":[35],"in":[36,63,82,136,153],"hostile":[37,64,84],"environments":[38,65],"particularly":[40],"energetic":[42],"attacks,":[43],"i.e.":[44],"attacks":[45,81],"aimed":[46],"at":[47],"shortening":[48],"life":[50],"cycle":[51],"sensors.":[53],"Sensors":[54],"limited":[56],"energy":[57,75],"resources;":[58],"replacing":[59],"or":[60],"recharging":[61],"nodes":[62,130],"is":[66,144],"difficult.":[67],"Attacks":[68],"that":[69,113,131,141],"cause":[70],"drain":[72],"on":[73,129],"level":[76],"most":[79],"common":[80],"environment":[85],"can":[87],"lead":[88],"death":[91],"such":[94],"as":[95],"sleep":[96,133],"denial":[97],"In":[99,121],"this":[100,122],"paper,":[101,123],"we":[102,124],"design":[103],"game":[105,110],"model":[106,143],"using":[107],"signaling":[109],"within":[111],"clusters":[112],"enables":[114],"both":[115],"detection":[116],"defense":[118],"against":[119],"attackers.":[120],"identify":[125],"impose":[127],"penalties":[128],"practice":[132],"deprivation":[134],"torture":[135],"WSNs.":[137],"The":[138],"simulations":[139],"showed":[140],"able":[145],"force":[147],"attacker":[149],"behave":[151],"normally":[152],"WSN.":[155]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
