GABs: A Game-Based Secure and Energy Efficient Data Aggregation for Wireless Sensor Networks

This paper endeavors to investigate the security and energy issues in wireless sensor networks from prior art such as game theory and various embodiments of methods like public-key cryptography. Due to the needs of interacting with the physical world, thanks to a plethora of innovative applications, the state of the art in wireless sensor networks (WSNs) is focusing on multiple purposes such as monitoring, tracking, and security while relying upon some assumptions about distributed data, whereas these assumptions may not hold in a real scenario. The content herein models homogeneous WSN environment of highly linked nodes, in a theoretical game with synchronized actions, where, in order to transmit their readings securely across the network in some level of hierarchy, using the technique of data aggregation, sensor nodes with communication and computational resources constraint should establish trusted and direct links between their neighbors for the privacy and integrity of their data against faulty nodes, while ensuring energy saving. The study considers the ZigBee known as IEEE 802.15.4 standard for its high trustworthiness and low power consumption in wireless sensor network and compares different topology models.


Introduction
Wireless sensor network (WSNs) have drawn researcher's attention in multiple disciplines related to pervasive computing since sensor devices are helping people to interact with the physical world through a plethora of innovative applications for multiple purposes like monitoring and tracking in military, security, health, farming, industry, factories, mining, houses, and sports.These sensor devices with the ability to provide genuine and important knowledge of specific occurrences of events needed in their surroundings [1] are suffering from resources constraint amongst them, limited processing speed and small communication bandwidth.Because the nodes residing on each network segment are communicating with each other through the wireless channel known to be vulnerable to malicious forgery of external attacks [2], different users can exchange information securely as long as they established a secured collusion-free link, which is requiring that nodes be synchronized and able to cooperate with each other.Game theory [3] is one of the secure and energy efficient mathematical methods, used to address these issues with respect to privacy, accuracy, integrity, and efficiency [4], with security as the most important issue to consider prior to using the WSNs [5].And it is said that game theory analyses and models the security issues in WSN, as it considers multiple scenarios where players are competing with each other [3].This paper focuses on secure and energy efficient data aggregation in wireless sensor networks, which consists of securing data first, while passing it over amongst sensor nodes from the source to the final destination, and proposes a game-based secure and energy efficient data aggregation model (GABs), with the aim of securing information and minimizing energy expenses during data exchanges in a distributed network of homogeneous sensor nodes.
We investigated the security aspects by modeling the cryptographic criteria of secure communications from the pairwise key establishment between pairs of sensors with Nash equilibrium [6] as the solution of the mathematical complexity of two players' theoretical game in decision making, leading to a highly secure network strategy.
The study considers the ZigBee known as IEEE 802.15.4 standard for its high accuracy and low power consumption in wireless sensor network.Because coupling routing and security together are a very complicated operation, most solutions are either addressing security-related issues or are energy-related only, but not tackling both problems at the same time, amongst them the RSA [2] and Elgamal [7].In fact, each node needs to establish a secure private link in order to be able to receive data from its one-hop neighbors or transmit data toward a given base station (sink) securely.Hence, the same game theory approach [8] was used to investigate the energy expenses of WSNs, from each sensor node as a finite part of the whole, considering that for their interactions, each player has only three strategies, including the sensing (), collecting (), and the transmitting () but using only one specific strategy at a time, as they have a half-duplex transceiver which shares a common channel.Since node are synchronized with cooperative manners, the Nash equilibrium (NE) with unstable outcome in terms of the overall performance might not be an appropriate solution, what rings the bell to "whether a Nash equilibrium must be used as all purpose treatment without taking into consideration additional factors [6]." We believe this paper's main contributions could be summarized as follows.
(1) We first proposed a trivial game-based secure model using symmetric cryptography pairwise key establishment.
(2) From game theory perspective, we proposed a gamebased secure and energy efficient algorithm to solve the issues regarding a reliable and secure wireless medium communication for data aggregation against possible forgery and external influences, by preserving the integrity and in-depth energy efficiency analysis for the system lifetime.
The remaining part of this paper is organized as follows.The main objectives of the study and system model are presented in Section 2, followed by a detailed description of the GABs model in Section 3. We draw back prior studies in Section 4, whereas the simulations are presented in Section 5 and discuss their results in Section 6.Finally, Section 7 concludes the paper and opens new room for researches.

System Model and Problem
The comprehensive data infrastructure, proposed in this paper, which is based on end-to-end capabilities, aims to meet specific needs such as the wireless collusion-free communication for easy and fast data exchanges and security oriented for privacy and integrity preservation and energy efficient for network life time.Hence, a secure data aggregation model that is reliable, highly available, and scalable while being extensible must be provided.We investigate the game theoretical approach in terms of securing data for aggregation on a wireless medium network considering asymmetric links between pairs of sensors cooperating based on key aspects achieving a perfect secrecy of Claude Shannon's information theory [9] and this aims to avoid possible malicious forgery (e.g., eavesdropping), what is compelling with data privacy, accuracy, integrity, and efficiency as defined in [4].The data aggregation is a known energy efficient method [5], widely discussed in this paper.

The System Model.
The terms "player" and "user" are referring to a "sensor node" while using these terms along this experimental investigation.We consider a simple secure wireless sensor network (Λ, L) as illustrated in Figure 1, where Λ = {1, 2, . . ., } is a set of  nodes and L ⊆ Λ × Λ the set of direct links, assuming the iniquity of each node, say  ( ∈ Λ) with a static location (e.g., the study only refers to static location cases rather than dynamic location), where a given link, say  = (, V), represents the shortest path from a source vertex , to the destination vertex V, and on which, as given in Section 3.2, data flows with respect to the Euclidean distance between a pair of nodes  and V where the value calculated () = (, V) = min{length of all paths between  and V}.
For a sensor node V ∈ Λ, assumed with at least one neighbor, with a proof that that there exists only one link in each direction between a pair of sensor nodes, we denoted by In(V) ∈ L the set of its ingoing links, for receiving data, and Out(V) ∈ L the set of its outgoing links, for transmitting data.Each source node   (=1,2,...,) ∈ Λ is sharing the network (Λ, L) and a throughput demand of average rate   is used when processing data transmission.We say that it is optimizing its energy efficiency and increasing the overall network system lifetime, by diffusing its request   amongst all paths able to connect the source of information to the destination (e.g., the direct diffusion), at which chosen paths determine the link  used by user  to flow its sending's, denoted by    .We say that one node as a source is conveying data to another considered as the destination on a Hamiltonian path [10] as shown in Figure 2.
In addition, because switching from sleep to transmitting mode is expensive, we choose not to consider it when transmitting a packet, assuming that there is always data available for shipping.There are several operational states for each sensor node: sensing (detect), receiving (collect), transmitting (send), and forwarding the data (transfer).(1) Sensing or detecting: a sensor has the capability to sense some multivalue of their environment and detect incoming data as a packets format broadcasted by a given neighbor node.
(2) Receiving: a node receives data transmitted as a packet format from a neighbor node sharing the network.
(3) Transmitting or sending out: a node sends data as a packet format to a neighbor node sharing the network.
(4) Forwarding or transferring: an intermediary node sharing the network transfers data received from its lower layer node (child) via its In(V) link, to its higher layer node (parent) via Out(V) link.
Furthermore, because it is not in the scope of this paper, we do not consider the radio interference from other systems nor from node to node within the system impacting the system performance (e.g., abortion, additive noise, attenuation or interference, path loss, reflections, scattering, and shadowing).

The Problem Statement.
The major task of a sensors node   (=1,2,...,) is to transmit data to other nodes.However there are additional tasks due to security requirements [4] and the high demand on scarce energy resource.In a WSN, data needs a secured solution, preventing malicious attacks as they are transmitted in packet formats on a wireless medium which is subject to security breaches [11] (e.g., eavesdropping and jamming) and needs especially a less computational approach, aiming at saving the scarce energy resource efficiently for the overall system lifetime.When referring to sensors' resources constraints, energy and security are considered as the most crucial issues.Also we needed to tackle these two parameters jointly, but, the security issues are wireless links communications related, whereas we consider the energy to be overall network-related; also a more secured and energy saving data aggregation model could lead to solving our problem, thus "killing two birds with one stone" [12].

Game-Based Secure and Energy Efficient Data Aggregation
In this section we are investigating the security issues from prior art such as the game theory [6,13], and various embodiments of methods like public-key cryptography denoted RSA [10].Hence, the content herein models these issues in a game of two players with synchronized actions.The game only considers the one-hop relationship between players of each pair of nodes that constitute the overall system network, which means, as the data flows from a given source of event occurrence to its final destination in a given hierarchical tree structure, every step on its way; we could say that every intermediate node will form two directs, secure links, respectively, one in each direction (In-links to collect incoming data from other nodes and Out-links to transmit data out to other nodes) while collecting and forwarding data to node at higher layer (e.g., child, parent).Also each different case referring to different topologies of the game is detailed, leading to the proposed game-based secure and energy efficient data aggregation model.We used Nash equilibrium in the game's theory perspective to solve the above mentioned crucial constraints despite its unstable outcome in terms of the overall performance [6], which are justified by the fact that NE aim is noncooperative interaction between nodes.A strategy profile ( * 1 ,  * 2 , . . .,  *  ) is a Nash Equilibrium denoted (NE), if for each player , her choice  *  is a best response to other players' choices  * −1 , meaning that every player is playing its best response to every other players.

The Cooperative Game Theoretical Model Formulation.
Based on the self-fulfilling belief (SFB), each player believes that everyone will play their best strategies; also they should play their own best strategies as well, because their NE is the best strategy against everyone else.

A Pairwise Key Security Game.
A given node, say  uses the link  to flow data with 0 ≤  ≤ 1, the probability to have two nodes linked in the network, where the total number of all possible pairs of nodes in that network is calculated by (1), considering only that two nodes are linked directly forming a pair based on the pair-wise key (PWK) method [14] as given in (2), which is the probability that a pair of sensors can be symmetrically linked together, requiring less memory during computation (e.g., we know that each sensor node , has at least one reachable neighbor): PWK =  pairs × . (2) 3.1.2.Game 1 Statement.We modeled the exchange in a game between each pair of sensors, where each player has only 3 strategies, including the public key (pk  ), the plaintext (  ), and the secure key (Sk  ) with  ∈ {1, 2} and Table 1 shows the output results.The sensor node considered in this paper are capable to store and execute the program's instructions which were defined before their deployment in the sensing area and because in our scenario we do not consider the intruders that are discussed in [11], when two nodes are linked, they first have to find their shared secret key prior to exchange of their data based on the symmetric public key cryptography principle as in the fully homomorphic encryption approach proposed by Craig Gentry [15]; we say that when communicating, they are playing a game in which their cooperation is as a pure altruism [9].The overall exchange is assimilated to a client/server relationship as shown in Figure 3, where to establish a secure direct link, two players exchange first their public key, which upon reception of the other part is used to operate an encryption function based on the encryption scheme on their data to obtain a ciphertex mutually (e.g., the pk  received is used to encrypts its message (), thus generating a given ciphertext ()), while the correctness is preserved.After the ciphering operation, the nodes communicating directly will exchange their ciphertext.Here a computation is performed to obtain the so-called shared common key (Sh-key), detailed in (6), which is used for the future communication to encrypt data resulting in a second ciphertext.In addition, each player's secret key comes into play, as these keys are used to perform the decryption function that consists of decrypting the newly received second ciphertext.This operation retrieves the original message () sent by each of the two parties to their intended direct linked recipient, and each player's best response strategy is as the Nash equilibrium in (3) (e.g., obtaining their shared secret key).In fact, at the first exchange, none of the player releases its secret key, due to security requirements [4], against collision, exhaustion, and unfairness and also the Nash equilibrium solution of this game is as follows in (3).In addition, let us consider   to be the degree of node  or the number of edges connecting to it, because our study is on a network of strongly connected nodes and the total degree is the sum of in-degree and out-degree.And prior to being exchanged, the public pk  is generated by each sensor node as many times as exists a secured direct link with a peer node (e.g., the scalar multiplication of homomorphic elliptic curve cryptosystems [5]).Hence from ( 3) and ( 4) we could intuitively have the following result in (5).Moreover, from (4), the two players can find their shared secret key for encryption by computing, respectively (3), as the proof of the recovered message's integrity follows similarities in lines from study in [5] as detailed within (6).Consider Node 1 Node 2 Figure 4: The single direct link (one-hop) between a given source node 1 and a given destination node 2.

Game-Based Energy Efficiency
Approach.We consider two different topologies-based scenarios to illustrate our approach in terms of energy cost, assuming Game 1 results.
(1) The single direct link between two nodes (one-hop) is shown in Figure 4.
(2) The double links with intermediary node (two-hop) are shown in Figure 5.
Intuitively, we say that by studying expenses of one single pair, we could determine the overall network cost in terms of energy, which makes our solution trivial.

Game 2 Statement.
Game 2 assumes the secure aspect of game 1, with the particularity to have three strategies for each player, amongst them sensing or detecting all incomes (public key, ciphertext, etc.), collecting (or receiving) the packet sent by another player, and transmitting or sending a packet out to nodes sharing its direct link of communication under onehop topology.There is no egoism act in this game, but a full cooperation is assumed between players, and there is no similarity with the Prisoner's Dilemma game, because the common goal for both players is to communicate securely.Table 2 shows game 2 results, where a given sensor node  has a throughput demand of average rate   .And (7) satisfies user's request and preserves its sending.Consider with    =   ;   V = −   and   V = 0 for  = V.

Game's Payoff from Energy Consumption.
Let us consider the following values Ω > 0 to be the cost of transmitting  () a packet and  > 0 to be the cost of either sensing () or collecting () a packet, while  > 0 is the cost of computing one instruction, and the throughput demand to be  = 50 kbit/s, with  ≥ 0, as the initial charge of a node when deployed.Also, the game's payoff from energy consumption is as given in Table 2.
From Table 2, we can consider the following NE existing in game 2 with full cooperation between partners given in (6) and it is obvious that the each player's power consumption is relative to its tasks (or strategy) as in (7).In addition, Figure 3 shows that, prior to proceed with any data exchange, the secure link establishment requires that each node performs two sending tasks (2 *   ) and two receiving tasks (2 *   ) and one computation task (1 *  CPU ) by the CPU in order to obtain the shared common key (sh-key).Thus (9) is the security settings' cost NE = (, ) ; (, ) ; ( + Ω;  + Ω) Because users are decisions makers from a game theoretic perspective [16], they should be synchronized.For that matter [16] proposed to use a proper time slot to ensure the collision free transmissions, whereas the duty cycling by scattering of wakeup times is introduced in [17].The ambiguity in game 2 results is shown in ( 5) and ( 6); thus we may not consider these as Nash equilibrium (NE), which leads us to give some exceptions conditions to Game 2. In fact Nash equilibrium is been reported to have unstable outcomes regarding the overall performance and thus might not be a suitable solution.In addition, the efficient usage of the scarce energy resource is required for the overall system lifetime and computing the payoff of a node shall be done once, due to these WSNs characteristics.We argued that our data preserving and energy saving model is an efficient strategy.And the energy efficiency is at the heart of our game theoretic problem, the common good of each player, and the main feature of our game is based on the very significant changes, because it is repeated, and the players will always interact with each other in the future.And from their relation in energy consumption, computing is cheaper than communicating.The ZigBee technology is preferred to numerous existing prototypes such as Berkeley mica mote.And ZigBee technology is able to supply a current of about 1200 mA-hours with a current draw of 35 mA when transmitting data and also 35 mA when receiving data, whereas the current consumed by the CPU is 2 A on standby.Also the energy resulting from the PWK data exchange is as shown in Table 2.In addition, when considering each direct link's energy cost denoted by  () , with  = (,V), where  is the source vertex, V is the destination and multiple direct links Out(V) ≥ 2 and then each given user's energy cost, say , equals the sum of cost of each direct link considering (9) as given in (10).And from a live traffic monitoring, of very important demand, we can guess that because of the scarcity of power in WSNs, at least one of the two players will run short of energy resources more rapidly, thus ending the game (what is a dilemma): 3.2.3.Multihop Extension.This section's endeavour provides the second scenario of our study in which, we now extend our approach to more than two players, with  ≥ 2, as shown in Figure 5.In such a case, we say that a given node, say, V acting as an intermediary node, is forwarding data to other nodes often not within direct transmission range of their destination, which means that it is not just host but it routes also data [18].In fact, the two games discussed earlier are directly considered here, as the packet is forwarded from node to node toward its final destination (multihop), it will remain a two players' game, and thus the relationship between players is exactly as described previously.This means a given node V 2 as an intermediary node will forward packets, while the forwarding action is equivalent to sending with the basic difference on the source of information.Referring to Figure 5, node 1 is the source of the message and node 2 will forward it to node 3, which is the latest intended recipient, and this rule applies to all nodes on each determined path of the network; this could be verified in both tree-based topology and meshbased topology network.receive or collect first prior to perform the forwarding task; hence its overall expense includes the cost of both receiving and forwarding tasks as in (7).

Game's
In this scenario, we assume a transitive triad of nodes including node 1 ( 1 ), node 2 ( 2 ), node 3 ( 3 ) with a direct edge between  1 and,  2 as shown in Figure 4, and  1 adjacent to  3 as shown in Figure 5.In addition, it is worth noting that if there exist a direct link from node 1 to node 2 ( 1 ↔  2 ) and a direct link from node 2 to node 3 ( 2 ↔  3 ), it does not mean that there is necessary direct link from node 1 to node 3 ( 1 ?← →  3 ), as this is based on the radius of coverage, hence only an intermediary node, is able to ensure the communication between two nodes distant by their location that cannot communicate directly, and also in this particular example of the triad, the communication between node  1 and node  3 is only possible, thanks to node  2 .Here the source node acts as an intermediary node of the path, as it is between two players with  1 , as the source node and  3 as the sink.

Game 3 Statement.
The exception rules as listed in Table 3 and results from game 1 and game 2 are highly considered.Also from Table 4 results, we get confirmation of Nash equilibrium's unstable outcomes.Hence we refer to (7) defining each player's energy expense accordingly to their tasks in the path such as the source, receiver, and the intermediary node or forwarder, assuming a secure link between the adjacent players.
Moreover, with full cooperation and collision free objective, the receiver at destination may detect the data prior to collecting it, and because an intermediary node is performing both roles, like receiving (as destination) and transmitting (as source) in the triad, thus its energy consumption is the sum of both tasks.
We know that in each pair, the relation is like a source to sink, where the source node in-degree = 0 and the sink out-degree = 0; and also that ( > 3), the security link, is established once by both source node and destination node, but twice by each intermediary node, because it is communicating in both directions with at least two other ; hence from (10) and (11) it results in the following energy costs: From this we could write ) + (  + Ω) . ( 3.3.The GABs Algorithm.This section provides algorithmic complexity of all the overall system's computations in which, each source node  of a set Λ = {1, 2, 3, . . ., } is assumed directly connected to another (e.g., pairs of sensors), and   = 0 means that ( = V).Our algorithm based on simple mathematical logic is trivial.The role is deterministic of each sensor node's payoff, and the example of an intermediary node receiving a packet in order to forward it over to its neighbour is based on their relationship (e.g., parent to child and vice versa).Hence it is obvious that the forwarding task is what may increase, a given node's payoff, as it decreases the initial value of (  + Ω) each time.Additionally, we could compute one intermediary node payoff in order to get the basic information related to the relationship with its one-hop neighbour; then from the size of the network, we could determine the exact number of intermediary nodes thanks to PWK, in fact the payoff of an intermediary node is the sum of the payoff of the source node (its sending task) and the payoff of the final destination node (its receiving task).Also by multiplying that number of intermediary nodes by the payoff of a given intermediary, we obtain the total payoff of all intermediary nodes in a given Hamiltonian path.Algorithm 1 shows the GABs algorithm's code.

Related Drawbacks
The study [17] proposes the wakeup scattering as a solution to lifetime issues, a model designed to generate low communication overhead with easy implementation in real WSN.
Here the authors focused on the epoch period and the wakeup interval, which is related only to sensor activation time, where based on their relation, it is argued that minimizing the latency could be done with the condition to wake a parent node up in the epoch, right after its child, but not a sibling.Hence, if this solution seems somewhat energy efficient, nevertheless data are exposed to forgery which lack to ensure data privacy and integrity.The AMHED [5] proposes a star topology-based secured data aggregation which implements the elliptic curve cryptography's mathematical hardness, which values securing the data but does not emphasize network lifetime.The same observation is on another work that considers the game theory approach, but only deals with possible attacks faulty node (intruders).Because users are decision makers from a game theoretic perspective [16], they should be synchronized.Also [16] proposed to use a proper time slot to ensure the collision free transmissions, whereas the duty cycling by scattering of wakeup times is introduced in [17].Additionally the trusted data aggregation with low energy model (TDALE) is introduced in [10] considering the energy usage and code size and performance with ECC in a tree-based topology, to satisfy the data privacy, accuracy, integrity, and efficiency discussed in [4].

Simulations
The simulations are opening door to interactions between the experimental observations and the theoretical framework from a simulator or modeler (e.g., OPNET modeler), which is able to interpret a given experiment using specific parameters (e.g., the parameters can be set according to a specific network topology).Also, the simulations are helping to gain the statistic of data collected from a given wireless sensor network experiment using an open source wireless sensor network simulator like OPNET discussed is this section; hence advancing the step of science is this particular field of research.In addition, these network simulators (software) give to the whole scientists community the possibility to collect and analyze qualitative and quantitative data, determining the cause-effect relationship between the network topology, the node types, the technology (e.g., ZigBee 82.15.4 MAC), the throughput, the energy, and so forth.Hence, we could defined our experimental networks adding agents (nodes), and experiment the cooperation between linked nodes aiming at energy saving, with a perfect reception at a given radius range of the sender.

The Simulation Tool.
Due to different assumptions and approximations included in simulations, it is mandatory to test each of these simulations, so that we could demonstrate their respective limitations accordingly and settle their comparison characterize (e.g., we could compare the prior works AMHED and TDALE with our new approach GABs).There exist numerous network simulators (e.g., NS2, TinyOS) but we prefer to use the OPNET Modeler 14.5 (Educational version), which is an open source network simulator that offers a simulation environment for wireless sensors, as we could proceed with these simulation-based studies and do the testing mathematically.For analysis purpose, our study considers one type of node (homogeneous environment), but 3 roles defined of ZigBee devices that make a small difference between there outputs, including the following.
(1) ZigBee Coordinator (ZC).One ZigBee coordinator in needed per network, as it is the root of the network that might bridge to other networks.And by setting up the sensible parameters for establishing a network, it stores information about the network, for example, radio-channel, and repository for security keys.
(2) ZigBee Router (ZR).This device acts as an intermediate router, passing data from other devices and its main purpose is to extend the range of the network by acting as the relays and can act also as ZigBee end device.
(3) ZigBee End Device (ZED).This is the very basic device, requiring very limited resources, and known cheaper than ZR and ZC and its basic functionality is to talk to its parent node (either the coordinator or a router), but it cannot relay data from other devices.
The ZED will be used as leaf nodes while ZR will be the intermediary node and the ZC assimilated to the sink.Our goal is to reduce the energy consumption of our wireless sensor network (WSN) while ensuring its security and our study consists in comparing two different related works including the AMHED, characterized by its centric STAR topology network as illustrated in Figure 6 and the TDALE, which is a default TREE Topology-based as illustrated in Figure 7, with our MESH topology-based GABs approach, shown in Figure 8.

The Simulation Model.
Our study considers the above mentioned networks models including the MESH topologybased (GABs), and the STAR topology-based (AMHED) and the TREE Topology-based (TDALE).And we could be generating their simulations individually, prior to comparing their assessments accordingly.In fact these simulations provide us with insight into the throughput of each node which gives the increasing energy consumption of given nodes.We know that, due to its force-task relationship, reducing each node's battery usage increases the network life time and ensures its readings security.

The Simulation Settings.
We consider deploying 42 nodes in a 100 m × 100 m area, in which the physical location of the center node communicating with outside world is ( = 50,  = 50).And thanks to their wireless capability they can ensure their interconnections.In fact, each node is equipped with a transmitter (Tx) and a receiver (Rx) that are acting as gateways to/from each other as shown in Figure 9, (e.g., we say that it is similar to a "bundle" representing one or more communication channels between given transmitters (Tx) and receivers (Rx) and channels are in the 2.4 GHz ISM band for ZigBee 802.15.4).Also we could observe the proper evolution of the measured values in each network model, where each node unicasts data towards the receiver.In addition, considering a single path where nodes are not revisited and each edge is a part only once in direction to final destination, the network models are configured as in Section 5.3.1 and each node in Figure 9 works like a given cell from discussed in [19].

Configuration of the AMHED, TDALE, and GABs Networks.
Thanks to the options in the OPNET simulator environment, we could run the discrete event simulation (DES) for the Star topology-based network scenario (AMHED), for the tree-topology-based network scenario (TDALE), and for the mesh-topology-based network scenario (GABs), and their details of the reports are given, respectively, in Tables 5, 6, and 7, whereas the simulations progress reports, respectively, an average simulation speed of 969.447 event/sec for the AMHED, an average simulation speed of 751.171 event/sec, for TDALE, and an average simulation speed of 449.159 event/sec.In addition, the simulations' results are related to the configuration of each different topology as given in Table 8.

Simulation Assessments, Results, and Discussion
6.1.The Simulation Assessment and Results.We pay special attention to seven (7) particular assessments and their results collected from our simulations are provided accordingly, with respect to each studied network topology including starbased AMHED [5], tree-based TDALE [10], and mesh-based GABs.We used the open source OPNET modeler 14.5 to simulate all networks topology as detailed earlier, and we exported all the results in spreadsheet excel files, to ease the data analysis, and we could verify and confirm that the diagram output obtained using the OPNET simulator is identical with the diagram output obtain using the plot function in matlab.Hence, the paper presents all result regenerate by MATLAB, using data from spreadsheets excel.

Control Traffic Received (bits/sec
).This statistics represents the control traffic that comprises the ACKs and that is successfully received by the MAC from the physical layer in bits/sec.as shown in Figure 10.In fact, Figure 10 shows that the traffic received (bit/sec) by the ZigBee 82.15.4 MAC coordinator node is higher for the star-based topology of AMHED with average of 145 kbps.Here all nodes are communicating directly only with the center coordinator node (AMHED).This measured value decreases in the tree-based topology TDALE model with 22 kbps, for the communication is gradual from lower leaf node through intermediary nodes up to the coordinator node (TDAL).The lowest records 3.6 kbps are given in the meshbased topology network GABs as shown in Figure 11.We could say that this is because as nodes are interconnected (mesh topology), only the radius coverage could limit the direct exchange between peers.

Data Dropped (Retry Threshold Exceeding) (bits/sec).
This statistic represents the parent node, or higher layer data traffic (in bits/sec), dropped by the 802.15.4 MAC due to consistently failing retransmissions.This statistic reports the number of the higher layer packets that are dropped because the MAC could not receive any ACKs for the (re)transmissions of those packets or their fragments, and the packets' retry counts reached the MAC's retry limit.And its comparison is given in Figure 12.
In this case, Figure 12 shows that the data dropped (retry threshold exceeding) (bit/sec) by the ZigBee 82.15.4 MAC coordinator node is higher in AMHED, but is neglected in both TDALE and GABs and value ( = 0) for both TDALE and GABs as shown in Figure 13.We consider that this is due to the higher load of data from all the nodes of the network to  only the central and single node in star topology, as all nodes communicate directly only with the center coordinator node (AMHED).

Data Traffic Rcvd (bits/sec).
It is essentially the traffic successfully received by the MAC from the physical layer in bits/sec, including retransmissions.The results obtained by running the discrete events simulations (DES) are compared based on each topology as shown in Figure 14 and proper numeric values are shown in Figure 15 that represents the stacked statistics presentation.
Figure 14 shows that the data traffic received (bit/sec) by the ZigBee 82.15.4 MAC coordinator node is higher in AMHED, as all nodes communicate directly only with the center coordinator node (AMHED); then referring to the tree topology-based (TDALE), Figure 15 shows that the data traffic Rcvd (bits/sec) is equal to zero that means that the communication is handled in the Hamiltonian path.But we make a different observation when referring to the mesh topology-based scenario (GABs) as the data traffic Rcvd (bits/sec) has an average value of 105 bits/sec.This is normal, because as nodes are interconnected (mesh topology), only the radius coverage could limit direct exchange between  peers, thus reducing considerably the traffic on the particular coordinator node.The stacked statistics presentation of the results of these simulations as shown in Figure 15 gives the exact value of this rate including 5.000 kbps for AMHED; then it is getting about 1000 kbps in TDALE, which is 10 times higher than in GABs with 100 kbps.

Data Traffic Sent (bits/sec).
Traffic transmitted is by the MAC in bits/sec.While computing the size of the transmitted packets for this statistic, the physical layer and MAC headers of the packet are also included.These statistics include all the traffic that is sent by the MAC via CSMA-CA; it does not include any of the management or the control traffic, or ACKs.The comparative study of this value is given in Figures 16 and 17 representing, respectively, the overlaid statistics presentation and the stacked statistics presentation.
Figure 16 shows that the broadcast rate of packets (bits/sec) by the ZigBee 82.15.4 MAC coordinator node is higher in AMHED and then in TDALE prior to giving a lowest value in GABs.In fact this rate increases considerably in AMHED reaching 175 kbps and then in TDALE with only the average of 59 kbps, which is almost 10 times the rate in GABs but it is far less important than 6 kbps as in Figure 17.This could be explained as the communication is handled  gradually from lower leaf node through intermediary nodes, up to the ZigBee coordinator device.

Delay (sec).
The delay resent the end to end delay of all the packets received by the 802.15.4 MAC of this wireless personal area network (WPAN) node and forwarded to the higher layer.Each network model result is compared to others as shown in Figures 18 and 19.
Figure 18 reveals that the time (sec) is mostly delay by the ZigBee 82.15.4 MAC coordinator node in AMHED model at average of 0.20 s, which is almost 100 times the time delay in GABs, with 0.02 s; but there is less time delay in TDALE, that hardly reaches 0.015 s as shown in Figure 19.
6.1.6.Throughput (bits/sec).The throughput is known as the total data traffic (in bits/sec) successfully received and forwarded to a parent node at higher layer (e.g., traffic received and forward by the 802.15.4 MAC).We consider this task force value to evaluate the energy consumption at a given node.Thanks to OPNET, the discrete event simulator (DES) was run for the Star-based, Tree-based and the Meshbased topology and their details of the reports are given, respectively, in Tables 5, 6, and 7.In fact, Figure 20 shows that the throughput (bit/sec) by the ZigBee 82.15.4 MAC   coordinator node in AMHED is exponentially elevated with a peak at 1.500 kpbs as shown in Figure 21, compared with the ZigBee 82.15.4 MAC coordinator node in the tree-based topology TDALE with a less throughput value of 49 kbps and that represents 10 times the value of the ZigBee 82.15.4 MAC coordinator node in the mesh-based topology GABs of 4.8 kbps.This is due to the fact that, in the MESH topologybased scenario, the in-degree and out-degree of a given node are up to (−1); thus each node could be receiving data from all peers in the network causing a serious collusion.

End to End Delay (Seconds).
The end to end delay as shown in Figure 22 represents the total delay between creation and reception of application packets as data structures generated by the given node using a ZigBee technology in the OPNET modeler environment supporting the messageoriented communications.Each packet exists as a single structure that can be modified if needed (e.g., created, modified, examined, copied, sent, received, and destroyed).
In addition, the end to end delay is higher in AMHED model (min = 0.056 s; max = 0.080 s) but a bit lower in TDALE (0.040 s), and the lowest value is observed in GABs model (min = 0.010 s; max = 0.020 s), as shown by the average output result shown in Figure 23.phase-shift keying (OQPSK) and the direct sequence spread spectrum which spread spectrum [19], consisting of "spreading" the original bandwidth of the signal into a much wider frequency range.In contrary to the multicast (one-to-many or many-to-many distribution) scenario in which data will be received by multiple nodes forming a cluster, this communication in this study is from a single node to another single node, also, our unicast model of two ZigBee players needs to be private to those two, and we represent the interaction between those two players (neighbors) by a bidirectional link  = (, V), where  is the source node and V the destination node with the degree   as the number of neighbor of a given player, say , which privacy is ensured when each player (e.g., a node of pairs), uses a specific key obtained by the pair wise key (PWK); this is used to protect the communication between the source node  and the destination V.In fact, the PKW, or the probability of two players to be directly linked, is the degree of the whole network, which is proportional to the degree (  ), whereas nodes' actions are synchronous as their chosen strategy does not change prior to Λ − 1 players' completion.We assume an alternating-bit-protocol (stop-and-wait ARQ) as the nodes are connected in pairs, and packets sent and received in the correct order are not lost due to being dropped as shown in Figure 12 and this avoids sending the same packets again due to not receiving an acknowledgement (ACK) signal.Despite the particularity of the characteristics in realistic WSNs, we do not consider the so-called Fermi updating rule known to causing strategy mutation, and this is because we do not consider radio interference neither from other players nor from node to node within the system impacting its performance (e.g., abortion, additive noise, attenuation or interference, path loss, reflections, scattering, and shadowing) [20].The game is processed identically as data flows from source to destination, (e.g., the standard evolutionary game), and despite the signal propagation delay as in Figure 15, the packets still can be received by the one-hop relation neighbor immediately and since all users are synchronized, each user listening to the channel (sensing) gets its neighbor details and thus could react collusion-free with respect to time scheduling [16] (but not in this paper's scope); thus game 2 is repeated with strict respect of all the rules 1, 2, and 3, and Table 2 shows the payoff of the game in terms of energy consumption.In addition, thanks to our mathematical game theory model, we could verify the accuracy of the simulation as it does depend on its trustworthiness to mathematical calculations.For conciseness while analyzing the equilibrium equations, with   being the data transmission period, the throughput demand is factor of PWK of nodes in (1).Let us now consider a single path, which consists of a sequence of nodes, each adjacent to the next one as Γ ≤ Λ, (with Λ ≥ 3) where each edge is a part only once in one direction and only once in the opposite direction; thus there are  ≤ Γ − 1 edges and  − 1 intermediary nodes (e.g., node that will forward data to others along the path) where each is connected to 2 nodes (one in each side); thus min  = 2, for each intermediary node on each path from source to destination.For each pair of homogeneous nodes,   Souce security =   Destination security =   Security , and this remains true for homogeneous WSN environment, what is not always the case for heterogeneous WSN scenarios (HWSN), considering that in this particular HWSN, the characteristics or capacity of each type of node are different from one vendor to another (e.g., heterogeneous WSN is not in the scope of this paper).Consider Furthermore, referring to (15) for this symmetrical case, in each path, the distance from node  to node V, each edge is counted once in one single path (e.g., it is a Hamiltonian path [10]), as given in (16) Substituting ( 1) and (15) to this leads to the following PWK probabilistic result: In addition, each node is assumed of low degree but we highly consider hubs (highly linked nodes of high degree), with the average input voltage of 3 V on a ZigBee node (ZC, ZR, and ZED) supplying a current of about 1200 mA-hours, assuming that there is always data to transfer; we can easily verified the energy consumed for transmitting and receiving a size -bit of data ( = 1), in a span time  = 1 s, with known data rate of 250 Kbit/s Considering that each node has the same initial battery value at deployment time, thus in a triad, the ZR forwarding data seams to run short of energy before the ZC receiving data (destination) and the ZED sending node (source).Hence it is obvious that a node at source may still be able to send data as packets, whereas the intermediary node that is supposed to relay data could die, while the node at destination is still expecting data packets, thus ending the communication as shown in Figure 24, as the transmission of data in 10 s simulation.

Conclusion
The study considers the ZigBee known as IEEE 802.15.4 standard, thanks to its high trustworthiness and low power consumption in wireless sensor network.The paper endeavors to provide a secure and energy efficient data aggregation modeled in a two player's game theory (The GABs), and this study analyses, from a context background of various

Figure 1 :
Figure 1: A sample secured data wireless sensor network.

Figure 2 :
Figure 2: Node conveying data to others on a Hamiltonian path from source node to destination final destination node.

3 Figure 5 :
Figure 5: The double links (two-hop) with node 2 as the intermediary node, which aims at conveying data from source node 1 to final destination node 3.
Payoff from Triad Perspective.Because the energy consumption is proportional to work load, one has to

Table 3 : 1 If
List of exception rules for game 2.Number Rules  ,V (, * ) = , then  ,V ( * , ) = 0 and vice versa.(i)There is nothing to collect as none of the players has sent a packet.(ii)This avoids wasting energy.2If ,V (, * ) = , then  ,V ( * , ) = 0 and vice versa.(i) At least one must send a packet first so that the other could collect it.(ii)This avoids wasting energy.3If ,V (, * ) = Ω, then  ,V ( * , ) = 0 and vice versa.(i)Both sensor nodes cannot send data at the same time.(ii)This avoids or reduces channel collusion and wasting too much energy (  + Ω;   + Ω).
) of game 3 for next pair of sensors until reaching final destination, (22) If no value changed in this iteration, then end the algorithm (23) End Game 3; (24) End while; (25) Return   Algorithm 1: GABs algorithm code.

Figure 9 : 4 Figure 10 :
Figure 9: Transmitters (Tx) and receivers (Rx) incorporated in a node, acting as a bundle of one of more communication channels for each node unicast.

Figure 11 :Figure 12 :Figure 13 :Figure 14 :
Figure 11: The stacked view of the control traffic sent (bits/s) between TDALE and GABs.

Figure 17 :
Figure 17: Comparing the data traffic sent (bits/sec) stacked statistics presentation.

Figure 18 :
Figure 18: Comparing the MAC delay (sec) between overlaid statistics presentations.

Table 4 :
Two players' game with forwarding option.

Table 5 :
Discrete event simulator run table report for AMHED model network.

Table 6 :
Discrete event simulator run table report for TDALE model network.

Table 7 :
Discrete event simulator run table report for GABs model network.