Trust-based symmetric game theory for physical layer security in wi-fi communication
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.5.03Keywords:
Wi-Fi, Direct Trust, Indirect Trust, Symmetric Game Theory, Authentication, RoutingDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
A major improvement in growth of cellular networks has been observed in recent years, being an integral of Internet as well as showing reliability in connectivity for decreased military applications and public LAN. This is primarily because of their versatility as well as fewer cost solutions; however they are also vulnerable to a range of attacks relating to data privacy, Denial of service as well as eavesdropping.To withstand the security demand for Wireless Communication this paper presented a trust-based game theory (TRUST-GT). The proposed TRUST-GTintroduces confidence assessment for the development of protected routing topology. Consider PDR, energy consumption and throughput, comprehensive simulations demonstrate that it is efficient. We formally characterize TRUST-GT as a method for iterated as well as demonstrated its co-operation compliance characteristic by using game theory principles. The findings of both mathematical analyses as well as evolutionary simulation demonstrate that TRUST-GT is an important tool for fostering the reliability and evolution of Wi-Fi security.Abstract
How to Cite
Downloads
Similar Articles
- Sruthy M.S, R. Suganya, An efficient key establishment for pervasive healthcare monitoring , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Bayelign Abebe Zelalem, Ayalew Ali Abebe, Dividend policy and banks’ performance: Assessing the relevance versus irrelevance theory , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- M. Iniyan, A. Banumathi, Brower blowfish nash secured stochastic neural network based disease diagnosis for medical WBAN in cloud environment , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- P. Rathinabhagya, J. Merline Vinotha, Fuzzy vehicle routing problem for a municipal solid waste management system with greenhouse gas emission at various disposal stages , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
- Isaac Asampana, Henry M. Akwetey, Ben Ocra, Jones Y. Nyame, Albert A. Akanferi, Hannah A. Tanye, Factors motivating the adoption of virtual learning environments in higher education. Is gender relevant? , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- S. Munawara Banu, M. Mohamed Surputheen, M. Rajakumar, Enhanced AOMDV-based multipath routing approach for mobile ad-hoc network using ETX and ant colony optimization , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Unified framework for sybil attack detection in mobile ad hoc networks using machine learning approach , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Enhanced Block Chain Financial Transaction Security Using Chain Link Smart Agreement based Secure Elliptic Curve Cryptography , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- Sarika A. Nirmal, Nalanda D. Wani, The Relationship Between Artificial Intelligence and Consumer Decision Making in the Context of Personalized Cosmetic Products , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- Priscilla I, Jayasimman Lawrence, Enhanced Symmetric Cryptography Technique (ESCTGPU) for Secure Communication between the IoT Gateway and the public Cloud Environment , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Y. Mohammed Iqbal, M. Mohamed Surputheen, S. Peerbasha, Swarm intelligence-driven HC2NN model for optimized COVID-19 detection using lung imaging , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- A. Basheer Ahamed, M. Mohamed Surputheen, M. Rajakumar, Quantitative transfer learning- based students sports interest prediction using deep spectral multi-perceptron neural network , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- K. Mohamed Arif Khan, A.R. Mohamed Shanavas, Energy efficient techniques for iot application on resource aware fog computing paradigm , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- J. Fathima Fouzia, M. Mohamed Surputheen, M. Rajakumar, Hybrid pigeon optimization-based feature selection and modified multi-class semantic segmentation for skin cancer detection (HPO-MMSS) , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Enhanced Block Chain Financial Transaction Security Using Chain Link Smart Agreement based Secure Elliptic Curve Cryptography , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- S. Munawara Banu, M. Mohamed Surputheen, M. Rajakumar, Bio-Inspired and Machine Learning-Driven Multipath Routing Protocol for MANETs Using Predictive Link Analytics , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- S. Munawara Banu, M. Mohamed Surputheen, M. Rajakumar, Enhanced AOMDV-based multipath routing approach for mobile ad-hoc network using ETX and ant colony optimization , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper

