Trust-based symmetric game theory for physical layer security in wi-fi communication
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.5.03Keywords:
Wi-Fi, Direct Trust, Indirect Trust, Symmetric Game Theory, Authentication, RoutingDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
A major improvement in growth of cellular networks has been observed in recent years, being an integral of Internet as well as showing reliability in connectivity for decreased military applications and public LAN. This is primarily because of their versatility as well as fewer cost solutions; however they are also vulnerable to a range of attacks relating to data privacy, Denial of service as well as eavesdropping.To withstand the security demand for Wireless Communication this paper presented a trust-based game theory (TRUST-GT). The proposed TRUST-GTintroduces confidence assessment for the development of protected routing topology. Consider PDR, energy consumption and throughput, comprehensive simulations demonstrate that it is efficient. We formally characterize TRUST-GT as a method for iterated as well as demonstrated its co-operation compliance characteristic by using game theory principles. The findings of both mathematical analyses as well as evolutionary simulation demonstrate that TRUST-GT is an important tool for fostering the reliability and evolution of Wi-Fi security.Abstract
How to Cite
Downloads
Similar Articles
- Sruthy M.S, R. Suganya, An efficient key establishment for pervasive healthcare monitoring , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- A. Rukmani, C. Jayanthi, Fuzzy optimization trust aware clustering approach for the detection of malicious node in the wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Rahul Maurya, Thirupataiah B, Lakshminarayana Misro, Thulasi R, Effect of the Solvent Polarity and Temperature in the Isolation of Pure Andrographolide from Andrographis paniculata , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- Chinnadurai U, A. Vinayagam, Energy efficient routing with cluster approach in wireless networks – A literature review , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Bayelign Abebe Zelalem, Ayalew Ali Abebe, Dividend policy and banks’ performance: Assessing the relevance versus irrelevance theory , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- Amanda Quist Okronipa, Lucy Ewuresi Eghan, A theoretical investigation of students’ adoption of artificial intelligence chatbots using social cognitive theory and uses and gratification theory , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- Kshema Manu, Malathi S, A Comprehensive Study on Addressing Trust Erosion in Multimedia in The Indian Context , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- M. Iniyan, A. Banumathi, Brower blowfish nash secured stochastic neural network based disease diagnosis for medical WBAN in cloud environment , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Enhanced Block Chain Financial Transaction Security Using Chain Link Smart Agreement based Secure Elliptic Curve Cryptography , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Unified framework for sybil attack detection in mobile ad hoc networks using machine learning approach , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- A. Basheer Ahamed, M. Mohamed Surputheen, M. Rajakumar, Quantitative transfer learning- based students sports interest prediction using deep spectral multi-perceptron neural network , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Y. Mohammed Iqbal, M. Mohamed Surputheen, S. Peerbasha, Swarm intelligence-driven HC2NN model for optimized COVID-19 detection using lung imaging , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- J. Fathima Fouzia, M. Mohamed Surputheen, M. Rajakumar, A Unified Consistency-Calibrated Boundary-Aware Framework for Generalizable Skin Cancer Detection , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- J. Fathima Fouzia, M. Mohamed Surputheen, M. Rajakumar, Hybrid pigeon optimization-based feature selection and modified multi-class semantic segmentation for skin cancer detection (HPO-MMSS) , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Enhanced Block Chain Financial Transaction Security Using Chain Link Smart Agreement based Secure Elliptic Curve Cryptography , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- K. Mohamed Arif Khan, A.R. Mohamed Shanavas, Energy efficient techniques for iot application on resource aware fog computing paradigm , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- S. Munawara Banu, M. Mohamed Surputheen, M. Rajakumar, Bio-Inspired and Machine Learning-Driven Multipath Routing Protocol for MANETs Using Predictive Link Analytics , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- Mudassir Peeran A, A.R. Mohamed Shanavas, A Hybrid Post-Quantum Cryptography and Machine Learning and Framework for Intrusion Detection and Downgrade Attack Prevention throughout PQC Migration , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- S. Munawara Banu, M. Mohamed Surputheen, M. Rajakumar, Enhanced AOMDV-based multipath routing approach for mobile ad-hoc network using ETX and ant colony optimization , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper

