Trust-based symmetric game theory for physical layer security in wi-fi communication
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.5.03Keywords:
Wi-Fi, Direct Trust, Indirect Trust, Symmetric Game Theory, Authentication, RoutingDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
A major improvement in growth of cellular networks has been observed in recent years, being an integral of Internet as well as showing reliability in connectivity for decreased military applications and public LAN. This is primarily because of their versatility as well as fewer cost solutions; however they are also vulnerable to a range of attacks relating to data privacy, Denial of service as well as eavesdropping.To withstand the security demand for Wireless Communication this paper presented a trust-based game theory (TRUST-GT). The proposed TRUST-GTintroduces confidence assessment for the development of protected routing topology. Consider PDR, energy consumption and throughput, comprehensive simulations demonstrate that it is efficient. We formally characterize TRUST-GT as a method for iterated as well as demonstrated its co-operation compliance characteristic by using game theory principles. The findings of both mathematical analyses as well as evolutionary simulation demonstrate that TRUST-GT is an important tool for fostering the reliability and evolution of Wi-Fi security.Abstract
How to Cite
Downloads
Similar Articles
- P. Rajkumar, B. Vijay Bhaskar, Assessing the impact of indoor air pollution on respiratory health: A survey of home residents in rural area , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Aakanksha Laiker, Promil Pande, Contribution of policy and regulations to enhance Transparency and Traceability in the Garment Industry , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Syam Sundar. S, Direct reuse of scour and bleach effluent water for cotton knitted fabrics , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Parismita Bhagawati, Paramita Dey, Animal cruelty legislation in India: A green criminological exploration , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- R. Sakthiraman, L. Arockiam, RRFSE: RNN biased random forest and SVM ensemble for RPL DDoS in IoT-WSN environment , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- Somnath Bose, Preeti Singh, INFLUENCE OF SUNLIGHT EXPOSURE ON TOTAL SERUM CALCIUM AND INORGANIC PHOSPHATE LEVEL IN BANK MYNA, ACRIDOTHERES GINGINIANUS (LATHAM) , The Scientific Temper: Vol. 8 No. 1&2 (2017): The Scientific Temper
- Nitin Chandel, Lalsingh Khalsa, Sunil Prayagi, Vinod Varghese, Three‑phase‑lags thermoelastic infinite medium model with a spherical cavity via memory-dependent derivatives , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- R. Sakthiraman, L. Arockiam, RFSVMDD: Ensemble of multi-dimension random forest and custom-made support vector machine for detecting RPL DDoS attacks in an IoT-based WSN environment , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- Priya Nandhagopal, Jayasimman Lawrence, ECE cipher: Enhanced convergent encryption for securing and deduplicating public cloud data , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- Meenakshi Gahlot, Kavita Jaipal, Diversity and status of avian species in the Rann of Hadda, Jaisalmer (Rajasthan) , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
<< < 6 7 8 9 10 11 12 13 14 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- A. Basheer Ahamed, M. Mohamed Surputheen, M. Rajakumar, Quantitative transfer learning- based students sports interest prediction using deep spectral multi-perceptron neural network , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Y. Mohammed Iqbal, M. Mohamed Surputheen, S. Peerbasha, Swarm intelligence-driven HC2NN model for optimized COVID-19 detection using lung imaging , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- J. Fathima Fouzia, M. Mohamed Surputheen, M. Rajakumar, A Unified Consistency-Calibrated Boundary-Aware Framework for Generalizable Skin Cancer Detection , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- J. Fathima Fouzia, M. Mohamed Surputheen, M. Rajakumar, Hybrid pigeon optimization-based feature selection and modified multi-class semantic segmentation for skin cancer detection (HPO-MMSS) , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Enhanced Block Chain Financial Transaction Security Using Chain Link Smart Agreement based Secure Elliptic Curve Cryptography , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- K. Mohamed Arif Khan, A.R. Mohamed Shanavas, Energy efficient techniques for iot application on resource aware fog computing paradigm , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- S. Munawara Banu, M. Mohamed Surputheen, M. Rajakumar, Bio-Inspired and Machine Learning-Driven Multipath Routing Protocol for MANETs Using Predictive Link Analytics , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- S. Munawara Banu, M. Mohamed Surputheen, M. Rajakumar, Enhanced AOMDV-based multipath routing approach for mobile ad-hoc network using ETX and ant colony optimization , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- Mudassir Peeran A, A.R. Mohamed Shanavas, A Hybrid Post-Quantum Cryptography and Machine Learning and Framework for Intrusion Detection and Downgrade Attack Prevention throughout PQC Migration , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper

