{"id":"https://openalex.org/W3048797240","doi":"https://doi.org/10.1109/infocomwkshps50562.2020.9162702","title":"Non-Cooperative Game to Balance Energy and Security in Resource Constrained IoT Networks","display_name":"Non-Cooperative Game to Balance Energy and Security in Resource Constrained IoT Networks","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3048797240","doi":"https://doi.org/10.1109/infocomwkshps50562.2020.9162702","mag":"3048797240"},"language":"en","primary_location":{"id":"doi:10.1109/infocomwkshps50562.2020.9162702","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps50562.2020.9162702","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101656741","display_name":"Syed Bilal Hussain Shah","orcid":"https://orcid.org/0000-0003-3340-1161"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Syed Bilal Hussain Shah","raw_affiliation_strings":["School of Software, Dalian University of Technology, Dalian, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024966645","display_name":"Lei Wang","orcid":"https://orcid.org/0000-0001-8573-1213"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Wang","raw_affiliation_strings":["School of Software, Dalian University of Technology, Dalian, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108680341","display_name":"Prakasha Reddy","orcid":null},"institutions":[{"id":"https://openalex.org/I301615471","display_name":"Wollega University","ror":"https://ror.org/00316zc91","country_code":"ET","type":"education","lineage":["https://openalex.org/I301615471"]}],"countries":["ET"],"is_corresponding":false,"raw_author_name":"Prakasha Reddy","raw_affiliation_strings":["Wollega University, Wollega, Ethiopia"],"affiliations":[{"raw_affiliation_string":"Wollega University, Wollega, Ethiopia","institution_ids":["https://openalex.org/I301615471"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038898618","display_name":"Anil Carie","orcid":"https://orcid.org/0000-0002-7713-0650"},"institutions":[{"id":"https://openalex.org/I4210131147","display_name":"SRM University","ror":"https://ror.org/037skf023","country_code":"IN","type":"education","lineage":["https://openalex.org/I145286018","https://openalex.org/I4210131147"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Anil Carie","raw_affiliation_strings":["Computer Science and Engineering, VIT-AP, Amaravathi, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, VIT-AP, Amaravathi, India","institution_ids":["https://openalex.org/I4210131147"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101656741"],"corresponding_institution_ids":["https://openalex.org/I27357992"],"apc_list":null,"apc_paid":null,"fwci":0.2968,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.55571452,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"502","last_page":"507"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.7379803657531738},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7321396470069885},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.6407611966133118},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5696455240249634},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.4806305766105652},{"id":"https://openalex.org/keywords/best-response","display_name":"Best response","score":0.44109055399894714},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.42235037684440613},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4136980473995209},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.1285437047481537},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08955234289169312},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.08748072385787964},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08369135856628418}],"concepts":[{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.7379803657531738},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7321396470069885},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.6407611966133118},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5696455240249634},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.4806305766105652},{"id":"https://openalex.org/C32407928","wikidata":"https://www.wikidata.org/wiki/Q2733833","display_name":"Best response","level":3,"score":0.44109055399894714},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.42235037684440613},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4136980473995209},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.1285437047481537},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08955234289169312},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.08748072385787964},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08369135856628418},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocomwkshps50562.2020.9162702","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps50562.2020.9162702","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2111376763","https://openalex.org/W2135479785","https://openalex.org/W2529113503","https://openalex.org/W2599828131","https://openalex.org/W2739837320","https://openalex.org/W2765739766","https://openalex.org/W2765878715","https://openalex.org/W2767876360","https://openalex.org/W2792189324","https://openalex.org/W2884899100","https://openalex.org/W2888643818","https://openalex.org/W2888866153","https://openalex.org/W2937900976","https://openalex.org/W2946134548","https://openalex.org/W2951694401","https://openalex.org/W2969468102","https://openalex.org/W2990037115","https://openalex.org/W4252713891"],"related_works":["https://openalex.org/W2236801283","https://openalex.org/W2728657731","https://openalex.org/W1853631319","https://openalex.org/W2092374696","https://openalex.org/W2481143976","https://openalex.org/W2803932348","https://openalex.org/W3207342620","https://openalex.org/W2607684552","https://openalex.org/W2013767790","https://openalex.org/W2111030377"],"abstract_inverted_index":{"The":[0],"restricted":[1],"resources":[2],"in":[3,12,33,73],"IoT":[4,25],"networks":[5],"such":[6],"as":[7],"limited":[8],"battery":[9],"have":[10,125],"resulted":[11],"strict":[13],"requirements":[14],"to":[15,28,41,68,128],"prolong":[16],"the":[17,23,30,34,42,54,59,74,92,104],"network":[18,63,75],"life":[19,64],"time.":[20,65],"To":[21],"improve":[22],"communication,":[24],"nodes":[26,107],"attempt":[27],"optimize":[29],"available":[31],"energy":[32,60,70,88,96,138],"sensor":[35],"network,":[36],"this":[37],"makes":[38],"them":[39],"vulnerable":[40],"malicious":[43],"attacks":[44],"from":[45],"adversaries":[46],"because":[47],"of":[48,94,106],"open":[49],"scenario.":[50],"In":[51,66],"addition,":[52],"enhancing":[53],"security":[55,72,90,98,140],"level":[56],"will":[57],"consume":[58],"and":[61,71,89,97,109,115,119,139],"decreases":[62],"order":[67],"balance":[69],"game":[76,86,118],"theory":[77],"concept":[78],"is":[79],"used.":[80],"We":[81,112,132],"design":[82],"a":[83],"non":[84],"cooperative":[85],"between":[87],"where":[91],"utilities":[93],"both":[95,137],"players":[99],"are":[100],"maximized":[101],"by":[102],"controlling":[103],"number":[105],"transmitting":[108],"hash":[110],"length.":[111],"consider":[113],"complete":[114],"incomplete":[116],"information":[117],"determine":[120],"Nash":[121,130,134],"equilibrium.":[122,131],"Extensive":[123],"simulation":[124],"been":[126],"performed":[127],"examine":[129],"obtained":[133],"equilibrium":[135],"for":[136],"players.":[141]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
