Next Article in Journal
A Hybrid Planning Approach Based on MPC and Parametric Curves for Overtaking Maneuvers
Next Article in Special Issue
Utilising Flow Aggregation to Classify Benign Imitating Attacks
Previous Article in Journal
Wearable Vibration Sensor for Measuring the Wing Flapping of Insects
Previous Article in Special Issue
A Secure IoT-Based Authentication System in Cloud Computing Environment
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Epidemic Analysis of Wireless Rechargeable Sensor Networks Based on an Attack–Defense Game Model

1
School of Mechanical and Electric Engineering, Guangzhou University, Guangzhou 510006, China
2
School of Electronics and Communication Engineering, Guangzhou University, Guangzhou 510006, China
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(2), 594; https://doi.org/10.3390/s21020594
Submission received: 21 December 2020 / Revised: 8 January 2021 / Accepted: 12 January 2021 / Published: 15 January 2021
(This article belongs to the Special Issue Security and Privacy in the Internet of Things (IoT))

Abstract

:
Energy constraint hinders the popularization and development of wireless sensor networks (WSNs). As an emerging technology equipped with rechargeable batteries, wireless rechargeable sensor networks (WRSNs) are being widely accepted and recognized. In this paper, we research the security issues in WRSNs which need to be addressed urgently. After considering the charging process, the activating anti-malware program process, and the launching malicious attack process in the modeling, the susceptible–infected–anti-malware–low-energy–susceptible (SIALS) model is proposed. Through the method of epidemic dynamics, this paper analyzes the local and global stabilities of the SIALS model. Besides, this paper introduces a five-tuple attack–defense game model to further study the dynamic relationship between malware and WRSNs. By introducing a cost function and constructing a Hamiltonian function, the optimal strategies for malware and WRSNs are obtained based on the Pontryagin Maximum Principle. Furthermore, the simulation results show the validation of the proposed theories and reveal the influence of parameters on the infection. In detail, the Forward–Backward Sweep method is applied to solve the issues of convergence of co-state variables at terminal moment.

1. Introduction

Wireless sensor networks (WSNs) are the research hotspot worldwide over the last few years [1,2,3]. Sensor nodes which serve the function of data storing and data transmitting capacities form WSNs in the way of multi-hop or single-hop, as depicted in Figure 1. To monitor the physical parameters, such as temperature, humidity, pressure, etc., sensor nodes are randomly deployed in unattended areas. WSNs have widespread applications which are ranging from everyday life to various manufacturing industries [4]. However, due to the vulnerability of the sensor nodes and battery capacity limitations, the issues of security [5] and short lifespan [6] of WSNs are urgent to be tackled.
Focusing on optimizing energy utilization, scholars have proposed efficient schemes. However, comparing with the optimizing strategies, the operation of deploying rechargeable batteries can figure out the energy problem radically. Networks which are composed of rechargeable sensor nodes are named as wireless rechargeable sensor networks (WRSNs). Research hotspots on WRSNs mainly focus on solving the problems of both charging scheduling and system performance optimizations [7,8,9] in recent years. However, security issues in WRSNs are seldom attracting the attention of scholars. Malware, as a self-replicating malicious code, can lead to network interruption and paralysis once it propagates in the networks. Even worse, rechargeable sensor nodes also suffer from the Denial of Charge (DOC) attacks [10]. Such attacks will cause catastrophic consequence to real-time and pre-warning application fields [11]. Thus, it is urgent to study the security of WRSNs based on the rechargeable characteristics.
For the past few years, some scholars have made contributions to security issues of WRSNs based on the characteristics of information transmission. Recent relevant studies are listed in Table 1.
Due to the high similarity between infection mechanism of diseases in the population and the propagation mechanism of malware in WSNs, epidemic dynamics has also been widely used in the research of WSN security issues. In general, the applications of epidemic dynamics in WSNs mainly focus on the stability analysis of the built model. Recent relevant studies are listed in Table 2.
Although the above models consider the characteristics of WSNs from various aspects, they do not analyze and model the networks based on the energy level. Besides, to our knowledge, the studies combining epidemic dynamics with WRSNs are very few. Therefore, this paper divides sensor nodes in WRSNs according to the residual energy and infection of sensor nodes and introduces the charging process. Differential games are also widely used in WSNs as a method of studying optimal dynamic strategies. Recent relevant studies are listed in Table 3.
Based on the previous works [41] and inspired by [23], this paper proposes an epidemic model that includes the anti-malware (A) state, constructs game between malware and WRSNs, and obtains the optimal control strategies for both parties.
In the research on the security of WRSNs, few scholars analyze the issues by applying the relevant knowledge of epidemic dynamics. By establishing the dynamic differential equations of the propagation of malware in WRSNs, both the propagation mechanism of malware and the defense mechanism of WRSNs can be dynamically understood so as to provide novel thoughts and directions for resisting the invasion of malware.
In this paper, a susceptible infected anti-malware low-energy susceptible (SIALS) model is proposed by considering the charging process and the process of activating of the anti-malware program.The SIALS model can not only reflect the infection in WRSNs but also reveal the trend of the residual energy of the sensor nodes. At the same time, to describe the attack modes of malware, this paper considers the hardware attacks launched by malware and charging process compromised with malware.
Additionally, through the theory of stability analysis, the local and global stabilities of the disease-free equilibrium point and the epidemic equilibrium point of SIALS model are proved. Furthermore, this paper analyzes the game composed of malware and WRSNs by applying the Pontryagin Maximum Principle and obtains the optimal control strategies. Consequently, this work enriches the application of epidemic dynamics and differential games in addressing the security issues on WRSNs.
The rest of the paper is organized as follows. The introduction of the modeling of SIALS is presented in Section 2. Theorems of the local and global stability and the optimal strategies are proved in Section 3. The simulation results are shown in Section 4. The conclusions are drawn in Section 5.

2. Modeling

2.1. Dynamic Equation

In this paper, WRSNs consist of homogeneous rechargeable nodes which are randomly distributed. Meanwhile, the number of nodes increase at rate Λ , where Λ is greater than 0. Suppose that nodes in the networks belong to one of six possible compartment: susceptible (S), infected (I), anti-malware (A), low-energy and susceptible ( L S ), low-energy and infected ( L I ), and dysfunction (D). The relationship between the six compartments are depicted in Figure 2. S nodes are vulnerable to malware; I nodes are compromised with attacker; A nodes clear malware by activating anti-malware program; L S and L I nodes are both in low-energy level and remain dormant; and D nodes are totally out of function. Now, let us impose a set of hypotheses as follows.
(a)
Malware propagates by broadcasting. Assuming that the ratio of I nodes successfully infecting S nodes is α 1 S ( t ) , where α 1 is greater than 0, then the proportion of the new infected in the network is α 1 S ( t ) I ( t ) .
(b)
Considering mobile chargers and rechargeable modules, after the nodes in A drop to L S at β 2 , anti-malware programs stop running, and the nodes return to S at rate γ when they are fully charged. β 2 and γ are all greater than 0.
(c)
Nodes in S, I, and A drop to low-energy level at different ratios β 1 , β 3 , and β 2 , where β 1 < β 2 < β 3 . Among them, owing to the running of anti-malware program, β 2 is greater than β 1 . Due to the software attack launched by malware, β 3 is greater than β 1 and β 2 . β 1 , β 2 , and β 3 are all greater than 0.
(d)
Suppose that, except for I, the four remaining compartments S, A, L S , and L I have the same mortality μ . I is different in that malware also launches hardware attacks at rate a to cause damage. μ and a are all greater than 0.
(e)
Regardless of other protective measures, this paper only considers activating anti-malware program to achieve the purpose of clearing malware temporarily.
In particular, the parameters are summarized in Table 4.
On the basis of the above hypotheses, a novel dynamical system is obtained in (1)–(6):
S ( t ) . = Λ ( α 1 I ( t ) + β 1 + μ ) S ( t ) + γ L S ( t ) ,
I ( t ) . = α 1 S ( t ) I ( t ) ( α 2 + β 3 + μ + a ) I ( t ) + γ L I ( t ) ,
A ( t ) . = ( β 2 + μ ) A ( t ) + α 2 I ( t ) ,
L I ( t ) . = ( γ + μ ) L I ( t ) + β 3 I ( t ) ,
L S ( t ) . = ( γ + μ ) L S ( t ) + β 1 S ( t ) + β 2 A ( t ) ,
and
D ( t ) . = μ N ( t ) + a I ( t ) ,
where N ( t ) = S ( t ) + I ( t ) + A ( t ) + L S ( t ) + L I ( t ) and
N ( t ) . = Λ μ N ( t ) a I ( t ) .

2.2. Computation of the Steady States and the Basic Reproductive Number

Considering L S ( t ) = N ( t ) S ( t ) I ( t ) A ( t ) L I ( t ) , (1) can be rewritten as
S ( t ) . = Λ ( α 1 I ( t ) + β 1 + μ ) S ( t ) + γ ( N S ( t ) I ( t ) A ( t ) L I ( t ) ) ,
where N ( t ) = N ( ) = Λ a I ( t ) μ .
Then, the solutions of the limit system (8) and (2)–(4) are the steady states of the system (1)–(5).
The first solution is the disease-free steady state: E 0 = ( S 0 , I 0 , A 0 , L I 0 ) , where I 0 = 0 , A 0 = 0 , L I 0 = 0 , and
S 0 = Λ ( μ + γ ) ( μ + γ ) ( μ + β 1 ) γ β 1 .
The second solution is the epidemic steady state E * = ( S * , I * , A * , L I * ) , and
S * = ( α 2 + β 3 + μ + a ) ( γ + μ ) γ β 3 α 1 ( γ + μ ) ,
I * = Δ 1 + γ Λ ( β 2 + μ ) ( γ + μ ) Δ 2 + Δ 3 ,
A * = α 2 Δ 1 + α 2 γ Λ ( β 2 + μ ) ( γ + μ ) ( β 2 + μ ) ( Δ 2 + Δ 3 ) ,
and
L I * = β 3 Δ 1 + β 3 γ Λ ( β 2 + μ ) ( γ + μ ) ( γ + μ ) ( Δ 2 + Δ 3 ) ,
where
Δ 1 = [ Λ ( β 1 + μ + γ ) S * ] [ μ ( β 2 + μ ) ( γ + μ ) ] ,
Δ 2 = μ ( β 2 + μ ) ( γ + μ ) [ γ + α 1 S * ] ,
and
Δ 3 = γ [ a ( β 2 + μ ) ( γ + μ ) + α 2 μ ( γ + μ ) + β 3 μ ( β 2 + μ ) ] .
Consequently, considering the next generation matrix method, the basic reproductive number R 0 is its spectral radius.
Set
F = α 1 S ( t ) 0 0 0
and
V = α 2 + β 3 + μ + a γ β 3 γ + μ .
Thus,
R 0 = F · V 1 = α 1 S 0 ( γ + μ ) ( α 2 + β 3 + μ + a ) ( γ + μ ) γ β 3 = α 1 Λ ( γ + μ ) 2 [ ( β 1 + μ ) ( γ + μ ) γ β 1 ] [ ( α 2 + β 3 + μ + a ) ( γ + μ ) γ β 3 ] .

3. Dynamic Analysis and Optimal Strategy

In this section, the stability and the optimal strategy in the SIALS model are discussed. In Section 3.1, the local and global stabilities of the disease-free point are proved by using the eigenvalues and the Lyaponov function. In Section 3.2, the local and global stabilities of the epidemic point are proved by using the Routh criterion and Bendixson-Dulac criterion. In Section 3.3, a five-tuple attack–defense game is proposed and the optimal strategies of malware and WRSNs are obtained by applying the Pontryagin Maximum Principle.

3.1. Analysis of Disease-Free Equilibrium Point

Theorem 1.
The disease-free equilibrium point, E 0 , is locally asymptotically stable if R 0 < 1 .
Proof. 
Here, we use matrix eigenvalues to verify the validity of the theorem. In general, if the eigenvalues of the system matrix are negative, then the system must be stable.
Consider the follow matrix
F V = α 1 S 0 ( α 2 + β 3 + μ + a ) γ β 3 γ μ
The eigenvalues of (20) are
λ 1 = 0.5 ( B 1 + B 1 2 + 4 B 2 )
and
λ 2 = 0.5 ( B 1 B 1 2 + 4 B 2 ) ,
where B 1 = ( γ + μ ) [ α 1 S 0 ( α 2 + μ + β 3 + a ) ] and B 2 = [ ( μ + γ ) ( α 2 + β 3 + μ + a ) γ β 3 ] ( R 0 1 ) . The real parts of the two eigenvalues are negative if R 0 < 1 . Besides,
( Λ ( β 1 + μ ) S ( t ) + γ ( N S ) ) S = β 1 μ γ < 0 .
Thus, E 0 is locally asymptotically stable [42] when R 0 < 1 . Conversely, E 0 is unstable if R 0 > 1 . □
Theorem 2.
The disease-free equilibrium point, E 0 , is globally asymptotically stable if R 0 1 .
Proof. 
Here, Lyapunov stability method is applied. In general, a positive definite Lyaponov function with negative definite first derivative needs to be established to test the stability of the system [43]. Considering a Lyaponov function V ( t ) = ( γ + μ ) I ( t ) + γ L I ( t ) > 0 , we have:
V ( t ) . = ( γ + μ ) I ( t ) . + γ L I ( t ) . I ( t ) [ ( γ + μ ) α 1 S 0 ( γ + μ ) ( α 2 + β 3 + μ + a ) + γ β 3 ] = ( γ + μ ) [ α 1 S 0 I ( t ) ( α 2 + β 3 + μ + a ) I ( t ) ] + γ β 3 I ( t ) = I ( t ) [ ( γ + μ ) α 1 S 0 ( γ + μ ) ( α 2 + β 3 + μ + a ) + γ β 3 ] I ( t ) ( R 0 1 )
In addition, d V d t = 0 if and only if R 0 = 1 and I ( t ) = 0 . Moreover, (S, I, A, L I ) tends to E 0 when t tends to infinity, and the maximum invariant set in { ( S , I , A , L I ) Ω : d V d t = 0 } is E 0 . Thus, Theorem 2 is proved, after considering the La-Salle Invariance Principle [44]. □

3.2. Analysis of Epidemic Equilibrium Point

Theorem 3.
The epidemic equilibrium point, E * , is locally asymptotically stable if R 0 > 1 .
Proof. 
Here, the Routh criterion is applied to prove the theorem. Firstly, the Jacobian matrix of the limit system is:
( α 1 I ( t ) + β 1 + μ ) γ α 1 S ( t ) γ a γ μ γ γ α 1 I ( t ) α 1 S ( t ) ( α 2 + β 3 + μ + a ) 0 γ 0 α 2 ( β 2 + μ ) 0 0 β 3 0 ( γ + μ )
Then, the characteristic polynomial of (25) in E * is
P ( λ ) = P 1 λ 4 + P 2 λ 3 + P 3 λ 2 + P 4 λ 1 + P 5 ,
where
P 1 = 1 > 0 ,
P 2 = a + β 1 + α 2 + β 2 + β 3 + 2 γ + 4 μ + α 1 θ 3 ( R 0 1 ) + γ β 3 γ + μ > 0 ,
P 3 = ( β 2 + μ ) γ β 3 γ + μ + α 1 ( α 1 S * + γ ) θ 3 ( R 0 1 ) + ( γ + μ ) ( β 2 + μ + γ β 3 γ + μ ) + θ 1 ( θ 2 + γ β 3 γ + μ ) > 0 ,
P 4 = ( γ + μ ) ( β 2 + μ ) γ β 2 γ + μ + α 1 θ 3 ( R 0 1 ) ( α 1 S * + γ ) ( β 2 + μ ) θ 2 + θ 1 [ ( γ + μ ) ( β 2 + μ ) + θ 2 γ β 3 γ + μ ] > 0 ,
and
P 5 = α 1 θ 3 ( R 0 1 ) ( α 1 S * + γ ) ( γ + μ ) ( β 2 + μ ) > 0 ,
where
θ 1 = α 1 I * + β 1 + μ + γ ,
θ 2 = γ + 2 μ + β 2 ,
and
θ 3 = β 2 + μ α 1 ( γ + μ ) [ ( α 2 + β 3 + μ + a ) + γ μ ( β 2 + μ ) + a γ ( β 2 + μ ) + α 2 γ μ ]
Moreover, a simple calculation shows P 2 P 3 P 1 P 4 > 0 and P 2 P 3 P 4 P 1 P 4 2 P 2 2 P 5 > 0 . Thus, if R 0 > 1 , applying the Routh criterion [45], the local asymptotically stability of E * is tenable. □
Theorem 4.
The epidemic equilibrium point, E * , is globally asymptotically stable if R 0 1 .
Proof. 
Set
D ( I , L I ) = 1 I L I ,
P = α 1 S ( t ) I ( t ) ( α 2 + β 2 + μ + a ) I ( t ) + γ L I ( t ) ,
and
Q = ( γ + μ ) L I ( t ) + β 3 I ( t ) .
Considering the following formulation:
( D P ) I + ( D Q ) L I = γ I 2 β 3 L I 2 < 0
By applying the Bendixson–Dulac criterion [46], the system admits no periodic orbits in the interior of Ω .
Let (I, LI) be a smooth point on the boundary of Ω . Along the boundary, there exists two possibilities:
(a)
0 I < 1 , L I = 0 . Then, d P ( t ) d t = β 3 I ( t ) 0 . The value 0 occurs if and only if I = 0 .
(b)
0 L I < 1 , I = 0 . Then, d Q ( t ) d t = γ L I ( t ) 0 . The value 0 occurs if and only if L I = 0 .
Thus, there is no periodic solutions that pass through the boundary.
In view of Theorem 3, the claim follows from the generalized Poincare–Bendixson theorem [46]. □

3.3. Optimal Strategies

Based on the evolution of node state during the confrontation between malware and WRSNs, an attack–defense game model is constructed as follows.
The attack–defense game based on the SIALS model can be expressed as a five-tuple G = { P , ν , μ , X , Λ } , where
  • P = { P A , P D } is the set of plays in the attack–defense game. P A is the attacker and P D is the defender.
  • ν = { A S I ( t ) , A L I I ( t ) , A I D ( t ) } is a set of strategies implemented by the malware. A S I ( t ) represents the spreading capability of the malware, A L I I ( t ) represents the strength of the attacks on the charging process, and A I D ( t ) represents the strength of the hardware attack. In particular, the three control strategies are all constrained by the upper and lower bounds.
  • μ = { D I A ( t ) , D L S S ( t ) } is a set of strategies implemented by the WRSNs. D I A ( t ) represents the strength of activation of the anti-malware program and D L S S ( t ) represents the control of the charging process by WRSNs. Similarly, the two strategies have upper and lower bounds.
  • X = { X ( t ) | S ( t ) , I ( t ) , A ( t ) , L S ( t ) , L I ( t ) , D ( t ) } is a set of the state variables on the SIALS model. The denotations of the state variables are the same as the statement in Section 2.1.
  • Λ = { Λ ( t ) | λ S ( t ) , λ I ( t ) , λ A ( t ) , λ L S ( t ) , λ L I ( t ) , λ D ( t ) } is a set of the adjoint variables of the games
Considering the controlled process stated above, (1)–(6) transform to
S . ( t ) = Λ ( α 1 A S I ( t ) I ( t ) + β 1 + μ ) S ( t ) + γ D L S S ( t ) L S ( t ) ,
I . ( t ) = α 1 A S I ( t ) S ( t ) I ( t ) ( α 2 D I A ( t ) + β 3 + μ + a A I D ( t ) ) I ( t ) + γ A L I I ( t ) L I ( t ) ,
A ( t ) . = ( β 2 + μ ) A ( t ) + α 2 D I A ( t ) I ( t ) ,
L S ( t ) . = ( γ D L S S ( t ) + μ ) L S ( t ) + β 1 S ( t ) + β 2 A ( t ) ,
L I ( t ) . = ( γ A L I I ( t ) + μ ) L I ( t ) + β 3 I ( t ) ,
and
D ( t ) . = μ N ( t ) + a A I D ( t ) I ( t ) .
In this paper, we mainly focus on how to effectively suppress the growth of malware. Furthermore, in the purpose of maintaining the operation of the networks, the phenomenon of network interruption and paralysis caused by the dysfunctionality of the sensor nodes need to be minimized. Therefore, the number of the infected and dysfunctional sensor nodes is used to measure the overall cost in the attack–defense game. Set J ( · ) as the overall cost of the game and
J ( X ( t ) , μ ( t ) , ν ( t ) ) = t 0 t f { C I I ( t ) + C D D ( t ) } d t .
The above description of the cost index is a classic Lagrange problem in differential games. In (6), t 0 and t f , respectively, represent the initial and terminal moment of the game. Specifically, C I I ( t ) is the instantaneous cost determined by the damage capability and the number of I nodes at time t, where C I > 0 . C D D ( t ) is the instantaneous cost determined by the impact of network interruption and paralysis at time t, where C D > 0 .
In this game, the goal of both parties is to influence changes in the cost J ( · ) to make it more beneficial to their own development. Malware aims to maximize J ( · ) , while WRSNs aim to minimize J ( · ) . Therefore, malware needs to apply the dynamic strategies in ν ( t ) to maximize J ( · ) and WRSNs need to use the dynamic strategies in μ ( t ) to minimize the J ( · ) . To achieve the purpose of both parties, Theorem 5 is given by applying the Pontryagin Maximum Principle.
Theorem 5.
Based on the state functions (39)–(44), there exist an optimal strategy set { μ * ( t ) , ν * ( t ) } = { ( D I A * ( t ) , D L S S * ( t ) ) , ( A S I * ( t ) , A I D * ( t ) , A L I I * ( t ) ) } in the attack–defense game such that
J ( X ( t ) , μ * ( t ) , ν * ( t ) ) = m a x ν m i n μ J ( X ( t ) , μ ( t ) , ν ( t ) ) = m i n μ m a x ν J ( X ( t ) , μ ( t ) , ν ( t ) ) .
The expressions of the optimal strategies are
A S I * ( t ) = m a x A S I , ( λ I ( t ) λ S ( t ) ) α 1 S ( t ) I ( t ) > 0 m i n A S I , ( λ I ( t ) λ S ( t ) ) α 1 S ( t ) I ( t ) < 0 ,
A I D * ( t ) = m a x A I D , ( λ D ( t ) λ I ( t ) ) a I ( t ) > 0 m i n A I D , ( λ D ( t ) λ I ( t ) ) a I ( t ) < 0 ,
A L I I * ( t ) = m a x A L I I , ( λ I ( t ) λ L I ( t ) ) γ L I ( t ) + C C γ L I ( t ) > 0 m i n A L I I , ( λ I ( t ) λ L I ( t ) ) γ L I ( t ) + C C γ L I ( t ) < 0 ,
D I A * ( t ) = m i n D I A , ( λ A ( t ) λ I ( t ) ) α 2 I ( t ) > 0 m a x D I A , ( λ A ( t ) λ I ( t ) ) α 2 I ( t ) < 0 ,
and
D L S S * ( t ) = m i n D L S S , ( λ S ( t ) λ L S ( t ) ) γ L S ( t ) + C C γ L S ( t ) > 0 m a x D L S S , ( λ S ( t ) λ L S ( t ) ) γ L S ( t ) + C C γ L S ( t ) < 0 .
Proof. 
First, there exists a saddle-point in the game according to [41].
Then, in view of (39)–(44) and (45), the Hamiltonian function constructs as:
H ( X ( t ) , λ ( t ) , μ ( t ) , ν ( t ) , t ) = λ S ( t ) S ( t ) . + λ I ( t ) I ( t ) . + λ A ( t ) A ( t ) . + λ L S ( t ) L S ( t ) . + λ L I ( t ) L I ( t ) . + λ D ( t ) D ( t ) . + C I I ( t ) + C D D ( t )
Note that the constraints of the adjoint variables are given by the following formulas [44]:
λ S ( t ) . = ( λ S ( t ) λ I ( t ) ) α 1 A S I ( t ) I ( t ) + ( λ S ( t ) λ L S ( t ) ) β 1 + ( λ S ( t ) λ D ( t ) ) μ ,
λ I ( t ) . = ( λ S ( t ) λ I ( t ) ) α 1 A S I ( t ) S ( t ) + ( λ I ( t ) λ A ( t ) ) α 2 D I A ( t ) + ( λ I ( t ) λ L I ( t ) ) β 3 + ( λ I ( t ) λ D ( t ) ) ( μ + a A I D ( t ) ) C I ,
λ A ( t ) . = ( λ A ( t ) λ L S ( t ) ) β 2 + ( λ A ( t ) λ D ( t ) ) μ ,
λ L S ( t ) . = ( λ L S ( t ) λ S ( t ) ) γ D L S S ( t ) + ( λ L S ( t ) λ D ( t ) ) μ ,
λ L I ( t ) . = ( λ L I ( t ) λ I ( t ) ) γ A L I I ( t ) + ( λ L I ( t ) λ D ( t ) ) μ ,
and
λ D ( t ) . = C D .
Furthermore, the end values of the adjoint variables all equal to 0, i.e.,
λ S t f = λ I t f = λ A t f = λ L S t f = λ L I t f = 0 .
Finally, according to the Pontryagin Maximum Principle, the optimal strategies are obtained by
H ( t , X * ( t ) , λ ( t ) , μ * ( t ) , ν ( t ) ) H ( t , X * ( t ) , λ ( t ) , μ * ( t ) , ν * ( t ) ) H ( t , X * ( t ) , λ ( t ) , μ ( t ) , ν * ( t ) ) .
As a consequence, in the optimal case, when ( λ I ( t ) λ S ( t ) ) α 1 S ( t ) I ( t ) > 0 , the malware exerts the maximum effort to infect vulnerable sensor nodes; otherwise, it does not propagate. When ( λ D ( t ) λ I ( t ) ) a I ( t ) > 0 , the malware exerts the maximum effort to launch the hardware attack; otherwise, it does nothing in hardware equipped in sensor nodes. When ( λ I ( t ) λ L I ( t ) ) γ L I ( t ) + C C γ L I ( t ) < 0 , the malware exerts the minimum effort to influence the charging process to L I nodes; otherwise, the L I nodes accept the charging requests. Moreover, when ( λ A ( t ) λ I ( t ) ) α 2 I ( t ) < 0 , WRSNs exist the maximum effort to clear the malware; otherwise, the networks do nothing in activating anti-malware program. When ( λ S ( t ) λ L S ( t ) ) γ L S ( t ) + C C γ L S ( t ) < 0 , WRSNs exist the maximum effort to charge the L S nodes; otherwise, L S nodes do not be charged.

4. Simulation

The purpose of this section is to further verify and develop the theorems stated in Section 3. In detail, the first three subsections focus on the stability of the system (1)–(6) and the last three subsections focus on the optimal control of the system (39)–(44).
The parameters used in the simulations were set as: Λ = 0.2 , α 1 = 0.0001 , α 2 = 0.001 , β 1 = 0.005 , β 2 = 0.005 , β 3 = 0.008 , μ = 0.004 , a = 0.005 , and γ = 0.05 . All simulations were run on MacOS Catalina (Intel Core i5, 8GB, 1.8GHz) and MATLAB 2017b.

4.1. Stable Analysis When R 0 < 1

In this subsection, the stability of the system (1)–(6) is verified when R 0 < 1 . Substituting the parameters into (19), we obtained R 0 = 0.432 < 1 . Thus, there must exist a disease-free equilibrium point ( S 0 , I 0 , A 0 , L S 0 , L I 0 ) in the system. According to (10), S 0 = 45.76 , I 0 = 0 , A 0 = 0 , L S 0 = 4.23 , and L I 0 = 0 . The simulation results are illustrated in Figure 3.
For the purpose of showing the changing trend of the system in a more three-dimensional and comprehensive way, we consider to verify the stability of the system in the form of three dimensions. We set N ( t ) 50 (i.e., S ( t ) + I ( t ) + A ( t ) + L S ( t ) + L I ( t ) 50 ). Therefore, in the case of three dimensions, the feasible region is a regular triangular pyramid with an equilateral triangle at its base and a right-angled isosceles triangle (Waist = 50) at its three sides.
The curves in Figure 3a,c,e all begin from the axes and the curves in Figure 3b,d,f all start at the boundary on the hypotenuses.
As shown in Figure 3a,b, in the three-dimensional area formed by the number of A nodes as the x-axis, the number of I nodes as the y-axis, and the number of S nodes as the z-axis, the curves eventually converge to ( 0 , 0 , 45.67 ) from the six boundaries. In detail, in Figure 3a, when the curves start from x-axis, it is assumed that that there exists only A and L I nodes in the networks at the initial moment; when the curve starts from the z-axis, it is assumed that that only S and L I nodes in the network at the initial moment; and when the curve starts from y-axis, it is assumed that that only I and L S nodes in the network at the initial moment. The purpose of these assumptions is to ensure that malware exists in the network at the beginning, otherwise it would be meaningless. In Figure 3b, in the S-A plane, we set the sum of S nodes and A nodes as 49, and the number of L I nodes as 1 at the beginning. In the S-I plane, we set the sum of the number of S and I nodes as 50 at the beginning. In the A-I plane, we set that the sum of the number of A and I nodes is 50 at the beginning.
Similarly, in the three-dimensional area formed by the number of L I nodes as the x-axis, the number of I nodes as the y-axis, and the number of S nodes as the z-axis, the curves eventually converge to ( 0 , 0 , 45.67 ) , as shown in Figure 3c,d. Here, the principle of assumption is the same as above. The curves start from y-axis contain only I and L S nodes at the beginning. The curves start from the x-axis initially contain only L I and L S nodes at the beginning. It is worth noting that, in Figure 3c, the curve starts from the z-axis is reunited with the z-axis because it does not contain malware at the beginning. In Figure 3d, the curves start from the S- L I plane initially contain only S and L I nodes; the curves start from the S-I plane initially contain only S and I nodes; and the curves start from the I- L I plane initially contain only I and LI nodes.
In the three-dimensional area formed by the number of L S nodes as the x-axis, the number of A nods as the y-axis, and the number of S nodes as the z-axis, the curves eventually converge to ( 4.23 , 0 , 45.76 ) , as shown in Figure 3e,f. Similarly, in Figure 3e, the curves begin from the z-axis initially contain S and I nodes; the curves begin from the x-axis initially contain L S and I nodes; and the curves begin from the y-axis initially contain A and I nodes. In Figure 3f, the curves begin from S-A plane initially contain S, A, and I nodes, and the sum of the number of S and A nodes are 49 and the number of I nodes is 1; the curves begin from S- L S plane initially contain S, L S , and I nodes, and the sum of the number of S and L S nodes are 49 and the number of I nodes is 1; and the curves begin from A- L S plane initially contain A, L S , and I nodes, and the sum of the number of A and L S nodes are 49 and the number of I nodes is 1.
In Figure 3a–d, when the initial number of I nodes is less than a threshold, the number of I nodes has a peak value and decreases after that, and finally reaches 0. When the number of I nodes is greater than this threshold, the number of I nodes decreases continuously because the number of newly infected nodes is smaller than the number of newly recovered nodes. All these results confirm Theorems 1 and 2.

4.2. Stable Analysis when R 0 > 1

In this subsection, the situation under R 0 > 1 is discussed. Except for α 1 = 0.001 , the parameters remain the same as above. In this simulation, R 0 = 4.320 > 1 , S * = 10.59 , I * = 15.25 , A * = 1.69 , L S * = 1.13 , L I * = 2.25 and N ( ) = 30.9375 based on (10)–(13) and (19). As in the Section 4.2, suppose N ( t ) 50 . The simulation results are shown in Figure 4.
The assumptions at the initial moment of the curve in this subsection are the same as in Section 4.1. As shown in Figure 4a,b, in the three-dimensional area formed by the number of A nodes as the x-axis, the number of I nodes as the y-axis, and the number of S nodes as the z-axis, the curves eventually converge to ( 1.69 , 15.25 , 10.59 ) from the boundaries at the axes and the hypotenuses. In the three-dimensional area formed by the number of L I nodes as the x-axis, the number of I nodes as the y-axis, and the number of S nodes as the z-axis, the curves eventually converge to ( 2.25 , 15.25 , 10.59 ) from the boundaries, as shown in Figure 4c,d. In the three-dimensional area formed by the number of L S nodes as the x-axis, the number of A nodes as the y-axis, and the number of S nodes as the z-axis, the curves eventually converge to ( 1.13 , 1.69 , 10.59 ) from the boundaries, as shown in Figure 4e,f. All these results confirm Theorems 3 and 4.
Compared with the case of R 0 < 1 , more peaks exist in the process of quantity change when R 0 > 1 , but the general trend is similar. For I nodes, when the initial number is less than a certain threshold, it peaks and then eventually stabilize at the steady state value. When the initial number is greater than this threshold, the number of I nodes continues to decline until the steady state value. It is worth noting that the trend of the number of nodes is affected by the initial value. The trend changes if the initial values are set differently. However, if the model parameters do not change, the final value of the number of nodes does not change.

4.3. Influence of Parameters under Stable State

In this subsection, the influence of parameters on the spread of malware is analyzed. In detail, we analyzed the influence of α 1 , α 2 , β 3 , and γ on the number of I nodes. The values of α 1 , α 2 , and β 3 range from 0.0001 to 0.01, and the value of γ ranges from 0.01 to 1.
Figure 5a shows the relationship between α 1 and α 2 and the number of I nodes when t . Figure 5a shows that, by reducing the transmission rate α 1 , malware can eventually be cleared. At the same time, increasing the removal rate α 2 of malware can effectively suppress the increasing of malware; Figure 5b shows the relationship between α 1 and β 3 and the number of I nodes when t . As shown in Figure 5b, the behavior of malware to drops nodes to L I state by increasing the frequency or intensity of exhaustion attacks cannot be too effective to increase the number of I nodes in the steady state. Figure 5c shows the relationship between γ and α 2 and the number of I nodes in steady state. Figure 5c clearly shows that controlling the frequency or power of charging γ can restrain the spread of malware to a certain extent. Figure 5d shows the relationship between γ and β 3 and the number of I nodes in the steady state. As shown in Figure 5d, increasing the intensity of software attacks has little effect on the eventual prevalence of malware. On the contrary, when the charging rate γ drops to a certain extent, the amount of malware is greatly reduced. This suggests that we can control the charging rate γ to suppress the spread of malware. Figure 5e shows the relationship between β 3 and α 2 and the number of I nodes in the steady state. In Figure 5e, the influence of β 3 on the eventual prevalence of malware is verified again. At the same time, the effect of increasing the rate of activating anti-malware programs on the prevalence of malware is more obvious. Figure 5f shows the relationship between α 1 and γ and the number of I nodes in the steady state. As shown in Figure 5f, the method of reducing the number of I nodes by reducing the charging rate and transmission rate is verified again.
Among them, the most effective suppression method is to reduce the transmission rate α 1 . By increasing removal rate α 2 and reducing the charging rate γ , the number of malware can be reduced to a certain extent when t . In detail, although the method of reducing the transmission rate has a good effect, the effect is obvious when it is reduced to a certain extent, which is impractical in real life. The most direct method is to activate the anti-malware program to remove its own malware. The method of charging control is similar to the method of adjusting the transmission rate, which needs to be reduced to a certain threshold before the effect becomes obvious. Therefore, the method of suppressing malware by adjusting the transmission rate and charging rate is effective but requires much more consideration than activating the ant-malware program.

4.4. Variation of State Variables when R 0 < 1

Here, the evolution of state variables under optimal control is discussed. To verify the optimality, a non-optimal control group is set to compare with the optimal one. In detail, the situation under R 0 < 1 is stated first.
To satisfy (53)–(59), a Forward–Backward Sweep (FBS) method is applied. The flow diagram of the method is illustrated in Figure 6. First, the supposed values of model parameters are given. Then, by applying the finite difference method, the numerical solutions of the state variables are calculated in order and adjoint variables in reversed order. Furthermore, the values of controls are obtained at the same time. Finally, if and only if the difference between the two iterations is less than an error value δ multiplied by the iteration value at the current moment, then the optimality conditions stated in Theorem 5 are considered to be satisfied. Here, we set δ = 0.001 . It is worth noting that, when the system has low computational complexity, the FBS method can achieve better convergence of the adjoint variables. However, with the increasing complexity of the system, the method has difficulty achieving convergence, and it needs to update, which is also one of the directions of our future work.
Figure 7 shows the comparison of evolution of state variables under optimal control and non-optimal control. Here, the blue lines represent the evolution under optimal control and the red lines represent the evolution under non-optimal control. In Figure 7a, we set up 100 datasets, in which cases of the optimal control and the non-optimal control are equally divided. In the sets under optimal control, we assume that the sum of the initial number of nodes S and I of the networks is 50. For example, when the initial number of S nodes is 24, the initial number of I nodes is 26. Figure 7a shows the comparison of the number of S nodes in the two cases. Figure 7a shows that the number of S nodes under optimal control reach the equilibrium point more quickly, and the number is less than that under non-optimal control. Furthermore, the number of S nodes under optimal control is lower than that under non-optimal control when the number stay steady.
The data in Figure 7b follow those in Figure 7a. In the case of optimal control, as the number of S nodes decreases, the number of I nodes decreases more rapidly, as shown in Figure 7b. In other words, malware is eliminated faster under optimal control.
In the setting of the data of the two cases in Figure 7c, we assume that it contains A and I nodes at the beginning, and the sum is 50. As illustrated in Figure 7c, the difference in the number of A nodes is not evident in the two cases, which indicates the removal action never stops.
In Figure 7d, we assume that it contains only L S and L I nodes at the beginning, and their sum is 50. As illustrated in Figure 7d, the reason for the decrease in the number of S nodes is that WRSNs choose to stop charging the L S nodes, which leads to an increase to the number of L S nodes.
The data setting in Figure 7e follows that in Figure 7d. Similarly, the difference in the number of L I nodes is not significant in the two cases, as shown in Figure 7e, which indicates the software attacks never stop.
Therefore, although the spread of malicious programs can be suppressed under the optimal control, the performance of the system is sacrificed, that is, the existence of more low-energy sensor nodes leads to problems in network operation.

4.5. Variation of State Variables when R 0 > 1

In this subsection, the situation under R 0 > 1 is discussed. Comparing with Section 4.4, if the value of T is too high, the adjoint variables do not converge finally under the FBS method, so we set the terminal time of the game to 200, i.e., T = 200 . Meanwhile, the data setting is the same as in Section 4.5.
Figure 8 shows the comparison of the changes in the number of the state variables in the same two cases stated in Section 4.4. Similar to the statement in Section 4.4, the number of S nodes under optimal control always shows a faster decline, as shown in Figure 8a. In contrast, the number of S nodes with non-optimal control does not change much from time 0 to 200. Therefore, in the case of R 0 > 1 , WRSNs can restrain the growth of I nodes by reducing the number of S nodes.
Compared with the case without optimal control, more L S nodes stay in the LS state at this time instead of returning to the S state, as shown in Figure 8d. For the case of non-optimal control, the number of L S nodes decreases rapidly since L S nodes constantly send charging requests and get fully charged. For the optimal control, L S nodes choose to stop charging in order to reduce the growth rate of S nodes’ number.
As illustrated in Figure 8b,c,e, with the effective reduction of the number of S nodes, the numbers of I nodes, A nodes, and L I nodes all show a significant decrease, compared with the situation under non-optimal control.
In the case of R 0 > 1 , for malware, to make the cost as large as possible, the three means controlled by malware maintain the maximum degree of control; for WRSNs, in addition to removing malware in the maximum efforts, it also stops charging the L S nodes to further deter more vulnerable nodes from being attacked.

4.6. Influence of Parameters under Optimal Controls

As in Section 4.3, the influence of parameters on malware is developed here. It is easy to know from Section 4.4 that, when R 0 < 1 , malware is completely eliminated eventually. Therefore, we only consider the case R 0 > 1 . At the same time, to maintain the continuity with Section 4.3, suppose T = 200 .
Figure 9 shows the influence of the parameters on the number of I nodes, and the range of the parameters is consistent with Section 4.3. It is worth mentioning that, at this time, since the time setting is much smaller than that in Section 4.3, the number of I nodes is larger. Comparing with Figure 5 in Section 4.3, it is not difficult to find that, under optimal control, the influence of parameters on the propagation of malware is very similar to that under non-optimal control. Similarly, the conclusion is similar to Section 4.3, and is not repeated here.
In the optimal dynamic game, the three control methods of malware, namely A S I ( t ) , A I D ( t ) , and A L I I ( t ) , are always present and undiminished. As WRSNs, it stops charging the LS nodes while exerting greatest effort to activate the anti-malware program. Therefore, in the game process, the overall architecture of SIALS model is not affected. In other words, stopping charging has little effect on the model. Meanwhile, this phenomenon also reveals that the influence of reduced charging rate on the spread of malware mainly occurs in the state transition of sensor nodes from L I state to I state.

5. Conclusions

In this paper, we use epidemiology to propose a dynamic model, namely SIALS, describing the propagation of malware in WRSNs. In this model, not only the remaining energy of the sensor nodes is revealed, but also the description of the recovered process is enriched by introducing the anti-malware (A) state. Meanwhile, through the stability analysis of the model, we proved the local and global stability of disease-free equilibrium point and the epidemic equilibrium point. Furthermore, based on the confrontational nature of malware and WRSNs, this paper proposes a five-tuple attack–defense game model. Specifically, after introducing the overall cost, by adopting the Pontryagin Maximum Principle, this paper introduces the dynamic optimal strategies for malware and WRSNs. We verified the validity of the theories through simulations in the form of three-dimensional figures and analyzed the influence of the parameters on the propagation of malware. Then, the evolution of the number of state variables based on optimal control in the two cases of R 0 < 1 and R 0 > 1 was also simulated and analyzed. Meanwhile, the influence of parameters on infection under optimal control was analyzed.
Simulation results show that the malware can be eliminated by adjusting the transmission rate, but it needs to be reduced to a certain threshold. Activating anti-malicious program is the most effective and direct way to suppress the spread of malware. Adjusting the charging rate can also suppress the spread of malware effectively, but, again, it needs to be below a certain threshold. In the dynamic game between malware and WRSNs, WRSNs effectively reduce the number of malware by refusing to charge. In particular, in the case of R 0 < 1 , malware goes extinct more quickly. In the case of R 0 > 1 , the spread of malware is suppressed obviously compared with the case with non-optimal control.
With the continuous development of the wireless power transfer and the intelligent mobile vehicles, the potential security risk of mobile charger cannot be ignored. In our future work, in view of the integrating of various devices, both the homogenous and heterogenous cases will be taken into consideration, and, if the ability permits, the stochastic modeling and the advanced mathematical theories will be applied. Consequently, we hope our works can give some inspirations to interested researchers.

Author Contributions

Conceptualization, G.L. and B.P.; methodology, G.L., B.P. and X.Z.; software, B.P.; validation, G.L., B.P. and X.Z.; formal analysis, B.P.; investigation, G.L. and B.P.; writing—original draft preparation, B.P.; and writing—review and editing, G.L., B.P. and X.Z. All authors have read and agreed to the published version of the manuscript.

Funding

The National Natural Science Foundation of China (61403089) and the 2020 Department of Education of Guangdong Province Innovative and Strong School Project (Natural Sciences) - Young Innovators Project (Natural Sciences) under Grant 2020KQNCX054.

Data Availability Statement

The data presented in this study is contained within the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Xie, H.M.; Yan, Z.; Yan, Z.; Atiquzzaman, M. Data Collection for Security Measurement in Wireless Sensor Networks: A Survey. IEEE Internet Things J. 2020, 6, 2205–2224. [Google Scholar] [CrossRef] [Green Version]
  2. Han, G.J.; Jiang, J.F.; Zhang, C.Y.; Duong, T.Q.; Guizani, M.; Karagiannidis, G.K. A Survey on Mobile Anchor Node Assisted Localization in Wireless Sensor Networks. IEEE Commun. Surv. Tutor. 2016, 18, 2220–2243. [Google Scholar] [CrossRef]
  3. Butun, I.; Osterberg, P.; Song, H.B. Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures. IEEE Commun. Surv. Tutor. 2020, 22, 616–644. [Google Scholar] [CrossRef] [Green Version]
  4. Rashid, B.; Rehmani, M.H. Applications of wireless sensor networks for urban areas: A survey. J. Netw. Comput. Appl. 2016, 60, 192–219. [Google Scholar] [CrossRef]
  5. Yetgin, H.; Cheung, K.T.K.; El-Hajjar, M.; Hanzo, L. A Survey of Network Lifetime Maximization Techniques in Wireless Sensor Networks. IEEE Commun. Surv. Tutor. 2017, 19, 828–854. [Google Scholar] [CrossRef] [Green Version]
  6. Panatik, K.Z.; Kamardin, K.; Shariff, S.A.; Yuhaniz, S.S.; Ahmad, N.A.; Yusop, O.M.; Ismail, S. Energy harvesting in wireless sensor networks: A survey. In Proceedings of the 2016 IEEE 3rd international symposium on Telecommunication Technologies (ISTT), Kuala Lumpur, Malaysia, 28–30 November 2016. [Google Scholar]
  7. Shu, Y.C.; Yousefi, H.; Cheng, P.; Chen, J.M.; Gu, Y.; He, T.; Shin, K.G. Near-Optimal Velocity Control for Mobile Charging in Wireless Rechargeable Sensor Networks. IEEE. Trans. Mob. Comput. 2016, 15, 1699–1713. [Google Scholar] [CrossRef] [Green Version]
  8. Wu, P.F.; Xiao, F.; Sha, C.; Huang, H.P.; Sun, L.J. Trajectory Optimization for UAVs’ Efficient Charging in Wireless Rechargeable Sensor Networks. IEEE Trans. Veh. Technol. 2020, 69, 4207–4220. [Google Scholar] [CrossRef]
  9. Mo, L.; Kritikakou, A.; He, S.B. Energy-Aware Multiple Mobile Chargers Coordination for Wireless Rechargeable Sensor Networks. IEEE Internet Things J. 2019, 6, 8202–8214. [Google Scholar] [CrossRef] [Green Version]
  10. Lin, C.; Shang, Z.; Du, W.; Ren, J.K.; Wang, L.; Wu, G.W. CoDoC: A novel attack for wireless rechargeable sensor networks through denial of charge. In Proceedings of the IEEE INFOCOM 2019-IEEE Conference on Computer Communications, Paris, France, 29 April–2 May 2019. [Google Scholar]
  11. Lin, C.; Zhou, J.Z.; Guo, C.Y.; Song, H.B.; Wu, G.W.; Mohammad, S.O. TSCA: A temporal-spatial real-time charging scheduling algorithm for on-demand architecture in wireless rechargeable sensor networks. IEEE. Trans. Mob. Comput. 2018, 17, 211–224. [Google Scholar] [CrossRef]
  12. Nguyen, A.N.; Vo, V.N.; So-ln, C.; Ha, D.B.; Sanguanpong, S.; Baig, Z.A. On Secure Wireless Sensor Networks With Cooperative Energy Harvesting Relaying. IEEE Access 2019, 7, 139212–139225. [Google Scholar] [CrossRef]
  13. Jung, J.; Kang, M.; Yoon, I.; Noh, D.K. Adaptive forward error correction scheme to improve data reliability in solar-powered wireless sensor networks. In Proceedings of the 2016 International Conference on Information Science and Security (ICISS), Pattaya, Thailand, 19–22 December 2016. [Google Scholar]
  14. Vo, V.N.; Nguyen, T.G.; So-ln, C.; Ha, D.B. Secrecy Performance Analysis of Energy Harvesting Wireless Sensor Networks with a Friendly Jammer. IEEE Access 2017, 5, 25196–25206. [Google Scholar] [CrossRef]
  15. Shafie, A.E.I.; Niyato, D.; Al-Dhahir, N. Security of Rechargeable Energy-Harvesting Transmitters in Wireless Networks. IEEE Wirel. Commun. Lett. 2016, 5, 384–387. [Google Scholar] [CrossRef] [Green Version]
  16. Bhushan, B.; Sahoo, G. E2SR2: An acknowledgement-based mobile sink routing protocol with rechargeable sensors for wireless sensor networks. Wirel. Netw. 2019, 25, 2697–2721. [Google Scholar] [CrossRef]
  17. Lim, S.; Huie, L. Hop-by-hop cooperative detection of selective forwarding attacks in energy harvesting wireless sensor networks. In Proceedings of the 2015 International Conference on Computing, Networking and Communications, Anaheim, CA, USA, 16–19 February 2015. [Google Scholar]
  18. Kommuru, K.J.S.R.; Kadari, K.K.Y.; Alluri, B.K.S.P.K.R. A novel approach to balance the trade-off between security and energy consumption in WSN. In Proceedings of the 2018 2nd International Conference on Micro-Electronics and Telecommunication Engineering, Ghaziabad, India, 20–21 September 2018. [Google Scholar]
  19. Mauro, A.D.; Fafoutis, X.; Dragoni, N. Adaptive Security in ODMAC for Multihop Energy Harvesting Wireless Sensor Networks. Int. J. Distrib. Sens. Netw. 2015, 11, 760302. [Google Scholar] [CrossRef] [Green Version]
  20. Hu, X.; Huang, K.Z.; Chen, Y.J.; Xu, X.M.; Liang, X.H. Secrecy analysis of UL transmission for SWIPT in WSNs with densely clustered eavesdroppers. In Proceedings of the 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP 2017), Nanjing, China, 11–13 October 2017. [Google Scholar]
  21. Bouachir, O.; Mnaouer, A.B.; Touati, F.; Crescini, D. Opportunistic routing and data dissemination protocol for energy harvesting wireless sensor networks. In Proceedings of the 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2016), Larnaca, Cyprus, 21–23 November 2016. [Google Scholar]
  22. Huang, S.Y.; Chen, F.D.; Chen, L.J. Global dynamics of a network-based SIQRS epidemic model with demographics and vaccination. Commun. Nonlinear Sci. Numer. Simul. 2017, 43, 296–310. [Google Scholar] [CrossRef]
  23. Srivastava, P.K.; Pandey, S.P.; Gupta, N.; Singh, S.P.; Ojha, R.P. Modeling and analysis of antimalware effect on wireless sensor network. In Proceedings of the 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS), Singapore, 23–25 February 2019. [Google Scholar]
  24. Zhu, L.H.; Guan, G. Dynamical analysis of a rumor spreading model with self-discrimination and time delay in complex networks. Phys. A 2019, 533, 121953. [Google Scholar] [CrossRef]
  25. Liu, G.Y.; Peng, B.H.; Zhong, X.J. A Novel Epidemic Model for Wireless Rechargeable Sensor Network Security. Sensors 2020, 21, 123. [Google Scholar] [CrossRef]
  26. Hosseini, S.; Azgomi, M.A. The dynamics of an SEIRS-QV malware propagation model in heterogeneous networks. Phys. A 2018, 512, 803–817. [Google Scholar] [CrossRef]
  27. Ojha, R.P.; Srivastava, P.K.; Sanyal, G.; Gupta, N. Improved Model for the Stability Analysis of Wireless Sensor Network Against Malware Attacks. Wirel. Pers. Commun. 2020, 1–24. [Google Scholar] [CrossRef]
  28. Huang, D.W.; Yang, L.X.; Yang, X.F.; Wu, Y.B.; Tang, Y.Y. Towards understanding the effectiveness of patch injection. Phys. A 2019, 526, 120956. [Google Scholar] [CrossRef]
  29. Zhu, L.H.; Zhou, M.T.; Zhang, Z.D. Dynamical Analysis and Control Strategies of Rumor Spreading Models in Both Homogeneous and Heterogeneous Networks. J. Nonlinear Sci. 2020, 30, 2545–2576. [Google Scholar] [CrossRef]
  30. Guillén, J.D.H.; del Rey, A.M. A mathematical model for malware spread on WSNs with population dynamics. Phys. A 2020, 545, 123609. [Google Scholar]
  31. Shen, S.G.; Zhou, H.P.; Feng, S.; Liu, J.H.; Zhang, H.; Cao, Q.Y. An Epidemiology-Based Model for Disclosing Dynamics of Malware Propagation in Heterogeneous and Mobile WSNs. IEEE Access 2020, 8, 43876–43887. [Google Scholar] [CrossRef]
  32. Eshghi, S.; Khouzani, M.H.R.; Sarkar, S. Optimal Patching in Clustered Malware Epidemics. IEEE ACM Trans. Netw. 2016, 24, 283–298. [Google Scholar] [CrossRef] [Green Version]
  33. Khouzani, M.H.R.; Sarkar, S.; Altman, E. Optimal Dissemination of Security Patches in Mobile Wireless Networks. IEEE Trans. Inf. Theory 2012, 58, 4714–4732. [Google Scholar] [CrossRef]
  34. Zhang, L.T.; Xu, J. Differential Security Game in Heterogeneous Device-to-Device Offloading Network under Epidemic Risks. IEEE Trans. Netw. Sci. Eng. 2020, 7, 1852–1861. [Google Scholar] [CrossRef]
  35. Al-Tous, H.; Barhumi, I. Differential game for resource allocation in energy harvesting sensor networks. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018. [Google Scholar]
  36. Huang, Y.H.; Zhu, Q.Y. A Differential Game Approach to Decentralized Virus-Resistant Weight Adaptation Policy over Complex Networks. IEEE Trans. Control Netw. Syst. 2020, 7, 944–955. [Google Scholar] [CrossRef] [Green Version]
  37. Sun, Y.; Li, Y.B.; Chen, X.H.; Li, J. Optimal defense strategy model based on differential game in edge computing. J. Intell. Fuzzy Syst. 2020, 39, 1449–1459. [Google Scholar] [CrossRef]
  38. Shen, S.G.; Li, H.J.; Han, R.S.; Vasilakos, A.V.; Wang, Y.H.; Cao, Q.Y. Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1962–1973. [Google Scholar] [CrossRef]
  39. Hu, J.H.; Qian, Q.; Fang, A.; Fang, S.Z.; Xie, Y. Optimal Data Transmission Strategy for Healthcare-Based Wireless Sensor Networks: A Stochastic Differential Game Approach. Wirel. Pers. Commun. 2016, 89, 1295–1313. [Google Scholar] [CrossRef]
  40. Sarkar, S.; Khouzani, M.H.R.; Kar, K. Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks. IEEE Trans. Autom. Control 2013, 58, 1792–1798. [Google Scholar] [CrossRef] [Green Version]
  41. Liu, G.Y.; Peng, B.H.; Zhong, X.J.; Cheng, L.F.; Li, Z.F. Attack-Defense Game between Malicious Programs and Energy-Harvesting Wireless Sensor Networks Based on Epidemic Modeling. Complexity 2020, 2020, 3680518. [Google Scholar] [CrossRef]
  42. Van den Diressche, P.; Watmough, J. Further notes on the basic reproduction number. In Mathematical Epidemiology; Brauer, F., van den Driessche, P., Wu, J., Eds.; Springer: Berlin, Germany, 2008; pp. 159–178. [Google Scholar]
  43. Lyapunov, A.M. The general problem of the stability of motion. Int. J. Control 1992, 55, 531–534. [Google Scholar] [CrossRef]
  44. Lasalle, J.P. The Stability of Dynamical Systems; SIAM: Philadelphia, PA, USA, 1976. [Google Scholar]
  45. Merkin, D.R. Introduction to the Theory of the Stability; Springer: New York, NY, USA, 2012; Volume 24. [Google Scholar]
  46. Robinson, R.C. An Introduction to Dynamical Systems: Continous and Discrete; Pearson Education; Prentice Hall: Upper Saddle River, NJ, USA, 2004. [Google Scholar]
Figure 1. Communication architecture of wireless sensor networks.
Figure 1. Communication architecture of wireless sensor networks.
Sensors 21 00594 g001
Figure 2. Flow diagram of the improved epidemic model.
Figure 2. Flow diagram of the improved epidemic model.
Sensors 21 00594 g002
Figure 3. Variation of state variables in the case of R 0 < 1 .
Figure 3. Variation of state variables in the case of R 0 < 1 .
Sensors 21 00594 g003
Figure 4. Variation of state variables in the case of R 0 > 1 .
Figure 4. Variation of state variables in the case of R 0 > 1 .
Sensors 21 00594 g004
Figure 5. Change of infection under various parameters when t .
Figure 5. Change of infection under various parameters when t .
Sensors 21 00594 g005aSensors 21 00594 g005b
Figure 6. Flow diagram of Forward–Backward Sweep (FBS) method.
Figure 6. Flow diagram of Forward–Backward Sweep (FBS) method.
Sensors 21 00594 g006
Figure 7. Evolution of state variables under various controls in the case of R 0 < 1 .
Figure 7. Evolution of state variables under various controls in the case of R 0 < 1 .
Sensors 21 00594 g007
Figure 8. Evolution of state variables under various controls in the case of R 0 > 1 .
Figure 8. Evolution of state variables under various controls in the case of R 0 > 1 .
Sensors 21 00594 g008
Figure 9. Change of infection in optimal controls under various parameters when t = 200.
Figure 9. Change of infection in optimal controls under various parameters when t = 200.
Sensors 21 00594 g009aSensors 21 00594 g009b
Table 1. Research on WRSN security.
Table 1. Research on WRSN security.
AuthorsProblemsMethodsResults
A.N. Nguyen et al. [12]Securing the physical layerTime-switching power-splitting (TSPS) mechanismThe secrecy performance under TSPS is higher than the traditional scheme
J. Jung et al. [13]Excessive energy consumption in the forward error correction(FEC) methodEnergy-aware FEC methodThe developed method performs better than the former one.
V.N. Vo et al. [14]Securing energy harvesting wireless sensor networks(EH-WSNs) under eavesdropping and signal interceptionAn optimization scheme that uses a wirelessly powered friendly jammerThe hypotheses are supported.
A. EI Shafie et al. [15]Securing a single-antenna rechargeable source node in the presence of a multi-antenna rechargeable cooperative jammer and a potential single-antenna eavesdropperAn efficient scheme which can optimize the transmission times of the source nodeThe average secrecy rate gain of the scheme is demonstrated significantly
B. Bhushan et al. [16]Securing the mobile sinks position informationEnergy Efficient Secured Ring Routing (E2SR2) protocolE2SR2 achieves improved performance than the existing protocols
S. Lim et al. [17]Securing EH-WSNs under the Denial-of-Service (DoS) attacksHop-by-hop Cooperative Detection (HCD) schemeHCD scheme can significantly reduce the number of forwarding misbehaviors and achieve higher packet delivery ratio
K J.S.R. Kommuru et al. [18]Balancing the trade-off between improving security and reducing energy consumptionLow complexity XOR technique and Hybrid LEACH-PSO algorithmThe proposed approach performs better than the existing approaches.
A. DI Mauro et al. [19]Securing the communications under energy constraintsAdaptive approach which allows nodes to dynamically choose the most appropriate parametersAdaptive solution performs better
X. Hu et al. [20]Securing the up-link (UL) transmissionEstablishing the communication model; deriving the energy outage probabilities (EOP), connection outage probabilities (COP) and secrecy outage probabilities (SOP) through comprehensive analysisThe theoretical derivations are verified
O. Bouachir et al. [21]Securing the transmission between sensor nodes and base stationsA novel strategy to select cluster heads and implement the non-orthogonal multiple access (NOMA) technique in the transmissionThe secrecy performance can be improved
Table 2. Research on stability of epidemic model in WSNs.
Table 2. Research on stability of epidemic model in WSNs.
AuthorsCharacteristicsModelStability
S.Y. Huang et al. [22]HeterogeneitySusceptible-Infected-Quarantined- Recovered-Susceptible (SIQRS)1
P.K. Srivastava et al. [23]Anti-malware processSusceptible-Exposed-Infectious- Antimalware-Recovered (SEIAR)2
L.H. Zhu et al. [24]Time delaySusceptible-Believed-Denied (SBD)2
G.Y. Liu et al. [25]Low-energySusceptible-Infected-Low-energy-Susceptible(SILS)1
S. Hosseini et al. [26]User awareness, network delay and diverse configuration of nodesSusceptible–Exposed–Infected–Recovered-Susceptible with Vaccination and Quarantine state2
R.P. Ojha et al. [27]Quarantine and vaccination techniquesSusceptible–Exposed–Infectious–Quarantined–Recovered–Vaccinated (SEIQRV)2
D.W. Huang et al. [28]Patch injection mechanismSusceptible–Infected–Patched–Susceptible (SIPS)3
L.H. Zhu et al. [29]Time delay in homogeneous and heterogeneous networksIgnorants–Spreaders1–Spreaders2–Stiflers1–Stiflers2 (I2S2R)1
J.D. Hernández Guillén et al. [30]Carrier stateSusceptible–Carrier–Infectious–Recovered–Susceptible (SCIRS)1
S.G. Shen et al. [31]Heterogeneity and MobilityVulnerable–Compromised–Quarantined–Patched–Scrapped (VCQPS)2
1: Local and global stability in malware-free and epidemic points; 2: Local and global stability in malware/rumor/worm-free point; 3: local and global stability in epidemic point.
Table 3. Research on differential game applied in WSNs.
Table 3. Research on differential game applied in WSNs.
AuthorsPlayersGoalStrategies
S. Eshghi et al. [32]Malware and mobile WSNsLeverage the heterogeneity of malware propagationOptimal patching policies
M.H.R. Khouzani et al. [33]Malware and Mobile WSNsAttain desired tradeoffs between security risks and bandwidth consumptionOptimal control in activating dispatchers and selecting their transmission rate
L.T. Zhang, et al. [34]Malware and device to Device (D2D) offloading-enabled mobile networkUnderstand the malware propagation process in D2D offloading-enabled mobile networkOptimal dynamic defense and attack strategies
H. Al-Tous et al. [35]An energy-harvesting multi-hop WSNBalance the normalized buffer states of all sensor nodes and minimize the amount of energy used for data transmission.An online power control and data scheduling algorithm
Y.H. Huang et al. [36]Virus and sensor nodesMitigate virus spreadingVirus-resistant weight adaptation policies
Y. Sun et al. [37]Edge nodes (ENs)Realize the balance between reward and energy consumption cost of ENs in the deployment of defense measuresOptimal defense strategy
S.G. Shen et al. [38]malware and WSNsLimit malware in WSNsOptimal dynamic strategies for the system and malware
J.H. Hu et al. [39]A healthcare-based wireless sensor network (HWSN)Minimize the transmission costOptimal data transmission strategies
S. Sarkar et al. [40]Multi-hop wireless networksOptimize network throughputOptimal routing and scheduling policies
Table 4. Epidemiological coefficients of the model.
Table 4. Epidemiological coefficients of the model.
SymbolDescription
Λ Birth rate
γ The rate of charging sensor nodes from low-energy to high-energy
β 1 Depletion rate determined by the working strength of susceptible nodes
β 2 Depletion rate determined by the working strength of anti-malware nodes
β 3 Depletion rate determined by malware
α 1 Transmission rate of malware
α 2 The rate of activating anti-malware
μ Death rate
aThe rate of hardware attack determined by malware
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Liu, G.; Peng, B.; Zhong, X. Epidemic Analysis of Wireless Rechargeable Sensor Networks Based on an Attack–Defense Game Model. Sensors 2021, 21, 594. https://doi.org/10.3390/s21020594

AMA Style

Liu G, Peng B, Zhong X. Epidemic Analysis of Wireless Rechargeable Sensor Networks Based on an Attack–Defense Game Model. Sensors. 2021; 21(2):594. https://doi.org/10.3390/s21020594

Chicago/Turabian Style

Liu, Guiyun, Baihao Peng, and Xiaojing Zhong. 2021. "Epidemic Analysis of Wireless Rechargeable Sensor Networks Based on an Attack–Defense Game Model" Sensors 21, no. 2: 594. https://doi.org/10.3390/s21020594

APA Style

Liu, G., Peng, B., & Zhong, X. (2021). Epidemic Analysis of Wireless Rechargeable Sensor Networks Based on an Attack–Defense Game Model. Sensors, 21(2), 594. https://doi.org/10.3390/s21020594

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop