Trust-based symmetric game theory for physical layer security in wi-fi communication
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.5.03Keywords:
Wi-Fi, Direct Trust, Indirect Trust, Symmetric Game Theory, Authentication, RoutingDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
A major improvement in growth of cellular networks has been observed in recent years, being an integral of Internet as well as showing reliability in connectivity for decreased military applications and public LAN. This is primarily because of their versatility as well as fewer cost solutions; however they are also vulnerable to a range of attacks relating to data privacy, Denial of service as well as eavesdropping.To withstand the security demand for Wireless Communication this paper presented a trust-based game theory (TRUST-GT). The proposed TRUST-GTintroduces confidence assessment for the development of protected routing topology. Consider PDR, energy consumption and throughput, comprehensive simulations demonstrate that it is efficient. We formally characterize TRUST-GT as a method for iterated as well as demonstrated its co-operation compliance characteristic by using game theory principles. The findings of both mathematical analyses as well as evolutionary simulation demonstrate that TRUST-GT is an important tool for fostering the reliability and evolution of Wi-Fi security.Abstract
How to Cite
Downloads
Similar Articles
- Chetna Dhull, Asha ., Impact of crop insurance and crop loans on agricultural growth in Haryana: A factor analysis approach , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Rama Rao J.V.G, Raja Gopal A.N.V.J, Ponnaganti S. Prasad, Illa V. Ram, Muthuvel B, Power quality improvement in BLDC motor drive using PFC converter , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- J. M. Aslam, K. M. Kumar, Enhancing security of cloud using static IP techniques , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Nitin Chandel, Lalsingh Khalsa, Sunil Prayagi, Vinod Varghese, Three‑phase‑lags thermoelastic infinite medium model with a spherical cavity via memory-dependent derivatives , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Shahala Sheikh, Lalsingh Khalsa, Nitin Chandel, Vinod Varghese, Hygrothermoelastic large deflection behaviour in a thin circular plate with non-Fourier and non-Fick law , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Parismita Bhagawati, Paramita Dey, Animal cruelty legislation in India: A green criminological exploration , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Ravi Chaware, Sajid Anwar, Sunil Prayagi, Thermoelastic response of a finite thick annular disc with radiation-type conditions via time fractional-order effects , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Vishnu Prasad C, Ramaprabha D, Do tax compliance costs mediate the relationship between the complexity of tax structure and fairness perceptions? Evidence from manufacturers , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Amanda Quist Okronipa, Isaac Asampana, Jones Yeboah Nyame, Exploring e-learning system loyalty: The role of system quality and satisfaction , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Y. Mohammed Iqbal, M. Mohamed Surputheen, S. Peerbasha, Swarm intelligence-driven HC2NN model for optimized COVID-19 detection using lung imaging , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- A. Basheer Ahamed, M. Mohamed Surputheen, M. Rajakumar, Quantitative transfer learning- based students sports interest prediction using deep spectral multi-perceptron neural network , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- K. Mohamed Arif Khan, A.R. Mohamed Shanavas, Energy efficient techniques for iot application on resource aware fog computing paradigm , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- J. Fathima Fouzia, M. Mohamed Surputheen, M. Rajakumar, Hybrid pigeon optimization-based feature selection and modified multi-class semantic segmentation for skin cancer detection (HPO-MMSS) , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Enhanced Block Chain Financial Transaction Security Using Chain Link Smart Agreement based Secure Elliptic Curve Cryptography , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- S. Munawara Banu, M. Mohamed Surputheen, M. Rajakumar, Bio-Inspired and Machine Learning-Driven Multipath Routing Protocol for MANETs Using Predictive Link Analytics , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- S. Munawara Banu, M. Mohamed Surputheen, M. Rajakumar, Enhanced AOMDV-based multipath routing approach for mobile ad-hoc network using ETX and ant colony optimization , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper

