Game theory for energy efficiency in wireless sensor networks: Latest trends
Main article (894,3Kb) (Restricted access) Request copy
Què és aquest botó?
Aquest botó permet demanar una còpia d'un document restringit a l'autor. Es mostra quan:
- Disposem del correu electrònic de l'autor
- El document té una mida inferior a 20 Mb
- Es tracta d'un document d'accés restringit per decisió de l'autor o d'un document d'accés restringit per política de l'editorial
Rights accessRestricted access - publisher's policy
In the area of Wireless Sensor Networks (WSNs), improving energy efficiency and network lifetime is one of the most important and challenging issues. Most of the considered WSNs are formed by nodes with limited resources, in which each node plays dual rule of both sensing the environment and relaying traffic to the sink from other nodes. On the one hand, the nodes need to stay alive as long as possible by achieving energy efficiency. On the other hand, they have to provide the required service. This conflict of interest makes game theory very useful in WSNs. Moreover, nodes usually have to make decisions with limited information about the state of the network. Game theory has been used recently in a remarkable amount of research in this area. In this survey, we review the most recent papers about using game theory in WSNs to achieve a trade-off between maximizing the network lifetime and providing the required service. The paper contains a complete taxonomy of games applied to this specific research problem. It summarizes and compares the different published proposals along with tables and statistical charts showing in which domains game theory has been applied recently. Overall, the paper will give to researchers a clear view of the newest trends in this research area, underlining its main challenges and hopefully fostering discussions and new research directions.
CitationAlskaif, T., Guerrero, M., Bellalta, B. Game theory for energy efficiency in wireless sensor networks: Latest trends. "Journal of network and computer applications", 01 Agost 2015, vol. 54, p. 33-61.
|1-s2.0-S1084804515000806-main.pdf||Main article||894,3Kb||Restricted access|
All rights reserved. This work is protected by the corresponding intellectual and industrial property rights. Without prejudice to any existing legal exemptions, reproduction, distribution, public communication or transformation of this work are prohibited without permission of the copyright holder