{"id":"https://openalex.org/W4385187224","doi":"https://doi.org/10.1109/iwcmc58020.2023.10182764","title":"Secure Wireless Sensor Networks for Anti-Jamming Strategy Based on Game Theory","display_name":"Secure Wireless Sensor Networks for Anti-Jamming Strategy Based on Game Theory","publication_year":2023,"publication_date":"2023-06-19","ids":{"openalex":"https://openalex.org/W4385187224","doi":"https://doi.org/10.1109/iwcmc58020.2023.10182764"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc58020.2023.10182764","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc58020.2023.10182764","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005080443","display_name":"Zina Chkirbene","orcid":"https://orcid.org/0000-0001-6764-188X"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"Zina Chkirbene","raw_affiliation_strings":["Qatar University,College of Engineering","College of Engineering, Qatar University"],"affiliations":[{"raw_affiliation_string":"Qatar University,College of Engineering","institution_ids":["https://openalex.org/I60342839"]},{"raw_affiliation_string":"College of Engineering, Qatar University","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073330071","display_name":"Ridha Hamila","orcid":"https://orcid.org/0000-0002-6920-7371"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Ridha Hamila","raw_affiliation_strings":["Qatar University,College of Engineering","College of Engineering, Qatar University"],"affiliations":[{"raw_affiliation_string":"Qatar University,College of Engineering","institution_ids":["https://openalex.org/I60342839"]},{"raw_affiliation_string":"College of Engineering, Qatar University","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061831106","display_name":"Aiman Erbad","orcid":"https://orcid.org/0000-0001-7565-5253"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]},{"id":"https://openalex.org/I92528248","display_name":"Qatar Foundation","ror":"https://ror.org/01cawbq05","country_code":"QA","type":"funder","lineage":["https://openalex.org/I92528248"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Aiman Erbad","raw_affiliation_strings":["Hamad Bin Khalifa University, Qatar Foundation,Division of Information and Computing Technology, College of Science and Engineering,Doha,Qatar","Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Qatar Foundation, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Hamad Bin Khalifa University, Qatar Foundation,Division of Information and Computing Technology, College of Science and Engineering,Doha,Qatar","institution_ids":["https://openalex.org/I4210144839","https://openalex.org/I92528248"]},{"raw_affiliation_string":"Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Qatar Foundation, Doha, Qatar","institution_ids":["https://openalex.org/I4210144839","https://openalex.org/I92528248"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5005080443"],"corresponding_institution_ids":["https://openalex.org/I60342839"],"apc_list":null,"apc_paid":null,"fwci":1.0061,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.76869965,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1101","last_page":"1106"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.9306154847145081},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7729933261871338},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7302150726318359},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.7068188786506653},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6809325218200684},{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.6807534694671631},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5774972438812256},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5450289249420166},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.535132110118866},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.4623701572418213},{"id":"https://openalex.org/keywords/power-control","display_name":"Power control","score":0.43310484290122986},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4276140332221985},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.37028634548187256},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.35946470499038696},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35632023215293884},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.22163203358650208},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.07560917735099792}],"concepts":[{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.9306154847145081},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7729933261871338},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7302150726318359},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.7068188786506653},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6809325218200684},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.6807534694671631},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5774972438812256},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5450289249420166},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.535132110118866},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.4623701572418213},{"id":"https://openalex.org/C56685638","wikidata":"https://www.wikidata.org/wiki/Q2300474","display_name":"Power control","level":3,"score":0.43310484290122986},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4276140332221985},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.37028634548187256},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.35946470499038696},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35632023215293884},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.22163203358650208},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.07560917735099792},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iwcmc58020.2023.10182764","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc58020.2023.10182764","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},{"id":"pmh:oai:qspace.qu.edu.qa:10576/52614","is_oa":false,"landing_page_url":"https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85167659184&origin=inward","pdf_url":null,"source":{"id":"https://openalex.org/S4306400014","display_name":"Qatar University QSpace (Qatar University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60342839","host_organization_name":"Qatar University","host_organization_lineage":["https://openalex.org/I60342839"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"display_name":"Life in Land","id":"https://metadata.un.org/sdg/15"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320309815","display_name":"Qatar Foundation","ror":"https://ror.org/01cawbq05"},{"id":"https://openalex.org/F4320322472","display_name":"Qatar University","ror":"https://ror.org/00yhnba62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1533302764","https://openalex.org/W2010612033","https://openalex.org/W2026437434","https://openalex.org/W2039431285","https://openalex.org/W2122311135","https://openalex.org/W2580996672","https://openalex.org/W2883514695","https://openalex.org/W2964059069","https://openalex.org/W2964248614","https://openalex.org/W3025295717","https://openalex.org/W3035985667","https://openalex.org/W3119223610","https://openalex.org/W3121629979","https://openalex.org/W3138944253","https://openalex.org/W3180641418","https://openalex.org/W4210499207","https://openalex.org/W4312685340","https://openalex.org/W4364377797","https://openalex.org/W6684862076","https://openalex.org/W6780352211","https://openalex.org/W6791885640"],"related_works":["https://openalex.org/W2037619003","https://openalex.org/W2157398838","https://openalex.org/W4312141693","https://openalex.org/W1536009559","https://openalex.org/W1969185016","https://openalex.org/W2103821767","https://openalex.org/W2111030377","https://openalex.org/W2038750474","https://openalex.org/W2108130044","https://openalex.org/W2134027659"],"abstract_inverted_index":{"The":[0,154],"Wireless":[1],"Sensor":[2],"Networks":[3],"(WSN)":[4],"are":[5,79],"designed":[6],"to":[7,19,54,146,172],"remotely":[8],"monitor":[9],"and":[10,27,84,132],"control":[11],"specific":[12],"physical":[13],"or":[14,64],"environmental":[15],"conditions.":[16],"However,":[17,47],"due":[18],"the":[20,48,56,76,103,108,111,114,119,125,130,135,138,141,148,151,159,164,173,178],"open":[21],"nature":[22],"of":[23,50,58,113,129],"WSN,":[24],"many":[25],"threats":[26],"attacks":[28,100],"may":[29],"arise":[30],"by":[31,60,123,169],"malicious":[32,152],"users":[33],"such":[34,45],"as":[35],"jamming":[36,99],"attacks.":[37],"Several":[38],"techniques":[39],"have":[40],"been":[41],"developed":[42],"for":[43,95,133,167],"detecting":[44],"attack.":[46],"majority":[49],"these":[51],"solutions":[52],"try":[53],"decrease":[55],"impact":[57],"signal-jamming":[59],"increasing":[61],"transmission":[62],"power":[63,143],"using":[65,177],"complicated":[66],"coordinating":[67],"schemes,":[68],"which":[69],"might":[70],"be":[71],"challenging":[72],"in":[73,81],"WSNs,":[74],"where":[75,107],"sensor":[77],"devices":[78],"limited":[80],"their":[82],"energy":[83],"communication":[85,166],"capabilities.":[86],"In":[87],"this":[88],"paper,":[89],"we":[90],"present":[91],"a":[92],"new":[93],"model":[94,161],"securing":[96],"WSNs":[97],"against":[98,150],"based":[101],"on":[102,118],"Colonel":[104],"Blotto":[105],"game":[106,131],"equilibrium":[109],"defines":[110],"minimization":[112],"worst-case":[115],"attack":[116],"effect":[117],"sensors":[120],"communications.":[121],"Then,":[122],"investigating":[124],"Nash":[126],"Equilibrium":[127],"(NE)":[128],"all":[134],"potential":[136],"attackers,":[137],"system":[139],"computes":[140],"optimal":[142],"allocation":[144],"strategy":[145],"protect":[147],"network":[149,180],"nodes.":[153],"simulation":[155],"results":[156],"show":[157],"that":[158],"proposed":[160],"can":[162],"secure":[163],"channel":[165],"WSN":[168],"55%":[170],"compared":[171],"other":[174],"technique":[175],"while":[176],"same":[179],"resources.":[181]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
