Next Article in Journal
Electrochemical Immunosensor for the Early Detection of Rheumatoid Arthritis Biomarker: Anti-Cyclic Citrullinated Peptide Antibody in Human Serum Based on Avidin-Biotin System
Next Article in Special Issue
Integrating Cognitive Radio with Unmanned Aerial Vehicles: An Overview
Previous Article in Journal
AF-SENet: Classification of Cancer in Cervical Tissue Pathological Images Based on Fusing Deep Convolution Features
Previous Article in Special Issue
On the Fidelity of NS-3 Simulations of Wireless Multipath TCP Connections
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Epidemic Model for Wireless Rechargeable Sensor Network Security

1
School of Mechanical and Electric Engineering, Guangzhou University, Guangzhou 510006, China
2
School of Electronics and Communication Engineering, Guangzhou University, Guangzhou 510006, China
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(1), 123; https://doi.org/10.3390/s21010123
Submission received: 9 November 2020 / Revised: 22 December 2020 / Accepted: 23 December 2020 / Published: 27 December 2020
(This article belongs to the Special Issue Wireless Communication in Internet of Things)

Abstract

:
With the development of wireless rechargeable sensor networks (WRSNs ), security issues of WRSNs have attracted more attention from scholars around the world. In this paper, a novel epidemic model, SILS(Susceptible, Infected, Low-energy, Susceptible), considering the removal, charging and reinfection process of WRSNs is proposed. Subsequently, the local and global stabilities of disease-free and epidemic equilibrium points are analyzed and simulated after obtaining the basic reproductive number R 0 . Detailedly, the simulations further reveal the unique characteristics of SILS when it tends to being stable, and the relationship between the charging rate and R 0 . Furthermore, the attack-defense game between malware and WRSNs is constructed and the optimal strategies of both players are obtained. Consequently, in the case of R 0 < 1 and R 0 > 1 , the validity of the optimal strategies is verified by comparing with the non-optimal control group in the evolution of sensor nodes and accumulated cost.

1. Introduction

1.1. Research Background

Wireless sensor networks (WSNs) have attracted researchers’ attention worldwide over the last few years. WSNs consist of sensor nodes that have data storing and data transmitting capacities in the form of multi-hop or single-hop. Sensor nodes are randomly deployed in unattended areas in order to monitor the physical environment in and around their vicinity. WSNs have extremely wide applications that range from people’s daily life to various manufacturing industries, and even military facilities, such as health care services, bridge monitoring, intrusion detection, and security surveillance [1]. However, WSNs suffer from various issues related to security [2] and short life cycle [3], due to the vulnerability of the network structure and battery limitations.
Wireless rechargeable sensor networks (WRSNs), as an emerging technology, lie in the breakthrough in wireless power transfer (WPT) technology. It solves the problems of limited energy storage capacity and inconvenient battery replacement, which greatly develop wireless sensor networks (WSNs). So far, WRSNs have carried out a large number of relevant studies and applied research. In recent years, studies on WRSNs mainly focus on charging scheduling and system performance optimizations [4,5,6] However, security issues in WRSNs are seldom concerned by scholars. Malware, as a self-replicating malicious code, once implanted in the networks can cause information leakage and even network paralysis. Specifically, due to the particularity of rechargeability, rechargeable sensor nodes also suffer from the Denial of Charge (DOC) attacks [7], which will cause catastrophic consequence to real-time and pre-waring application fields [8]. Thus, research on WRSNs’ security is urgent and important.

1.2. Related Work

The security of data transmission links(DTLs), as an essential part of data transmission, is one of the security issues of WSNs. For example, a cloud using multi-sinks (CPSLP) scheme has been proposed to solve the problem of source location privacy [9] in DTLs. Similarly, in WRSNs, Shafie et al. [10] and Bhushan et al. [11] propose a novel efficient scheme and Energy Efficient Secured Ring Routing (E2SR2) protocols, respectively, in order to enhance the security performance of WRSNs. Besides, as the key hub of DTLs, security on a cluster head draws academic attention [12,13].
Meanwhile, intrusion detection systems (IDSs) have been recognized as the most effective means of detecting malicious attack (Blaster, SDBot, Fork bomb, etc. [14]). Specifically, Cui et al. [15] propose a mobile malware detection systems. Jaint et al. [16] and Thaile et al. [17] apply support a vector machine and nodetrust scheme in order to improve the detection efficiency. Once the malware is detected, then a mitigation mechanism, such as dismissing the affected nodes [18] or adopting diverse variants deployments [19], would be activated.
The application of epidemic dynamics to study the propagation of malware (Worms, Botnets, Rabbit, etc. [14]) in WSNs has received extensive attention and in-depth exploration in the academic. When considering the malware carrier, patch injection mechanism, and time delay, more suitable epidemic models have been proposed: SCIRS [20], SIPS [21], SEIAR [22], etc. Furthermore, Table 1 lists some relevant literature from recent years.
Differential games are also widely used in WSNs as a method for studying optimal dynamic strategies. For example, by using the differential game framework, Al-Tous et al. [29] propose an efficient scheme for power control and data scheduling of energy-harvesting WSNs and Huang et al. [30] develop a virus-resistant weight adaption scheme for mitigating the spread of malware in the large-scale complex networks. Similarly, Table 2 summarizes a few related literatures.
However, as far as we know, the theories of epidemic dynamics and differential game that are applied in WRSNs’ security are rarely studied. Therefore, this paper applies these two theories to study the security of WRSNs to provide a novel perspective of solution.

1.3. Contributions

The main goal of this paper is to introduce a novel epidemic model when considering the residual energy of sensor nodes and classify sensor nodes into five various states. Moreover, charging process and removing process are taken into account. Furthermore, the stability theory and differential game theory have both been applied in order to analyze the characteristics of the evolution of sensor nodes in various states. Our contributions are stated, as follows:
  • An epidemic model suitable for WRSNs is designed.
  • Based on the next-generation matrix method, the basic reproductive number R 0 of the system is obtained.Subsequently, by applying the Routh Criterion, Lyapunov function, and the other analytical methods, the local and global stabilities of the disease-free equilibrium solution and the epidemic equilibrium solution are proved and simulated. Moreover, the linear relationship between the state variables when the system tends to be stabilized, and the positive relationship between R 0 and the charging rate is disclosed in the simulation section.
  • Applying the Protryagin Maximum Principle, the optimal game strategy between malware and WRSNs is given. Moreover, by comparing the evolution of sensor nodes in various states and overall cost with the control group, the validity of the strategies is verified in the case of R 0 < 1 and R 0 > 1 .
The rest of the paper is organized, as follows: the main characteristics of the model are present in Section 2; theorems of the local and global stability, and the optimal strategies are proved in Section 3; the simulation results are showed in Section 4; and the conclusions are presented in Section 5.

2. Modeling

2.1. Epidemic Modeling on WRSNs

The model presented in this manuscript is global and deterministic such that sensor nodes are classified into five compartments: Susceptible (S), Infected (I), Susceptible in Low-energy ( L S ), Infected in Low-energy ( L I ), and Dysfunctional (D), as shown in Figure 1. Sensor nodes in S are vulnerable to malware; sensor nodes in I are compromised with malware and perform malicious action; sensor nodes in L S and L I state are both in dormant-like state; and, the sensor nodes in D state are completely incapacitated, owing to irreparable hardware damage. Specifically, the dormant-like state indicates the sensor nodes are forced to stop some running modules due to the low remaining energy, including data transmission. Thus, sensor nodes in L I state do not have the risk of spreading malware.
Sensor nodes in S transform to I once the attached malware starts running. New infectious sensor nodes are generated with α 2 I ( t ) S ( t ) and α 2 represents the transmission coefficient. In addition to the new sensor nodes, which are governed by Λ , some of the sensor nodes in I are repaired and converted to S at rate α 1 . Owing to electricity consumption, sensor nodes in both S and I drop to low-energy at rate μ . Meanwhile, when considering rechargeable battery equipped in sensor nodes and charging sensor nodes by multiple wireless charging vehicles [41], low-energy sensor nodes rise back to their previous states, since their batteries are full of electricity again. Detailedly, in order to simplify the model, assuming that the charging rate C is a constant. The model is simplified by assuming the same mortality μ in each compartment. In the Abbreviation Section, a brief description of the parameters is shown.
As a consequence, the dynamics of the system is governed by (1)–(5):
S ( t ) ˙ = Λ [ α 2 I ( t ) + μ + γ ] S ( t ) + α 1 I ( t ) + C L S ( t ) ,
I ( t ) ˙ = [ α 1 μ γ + α 2 S ( t ) ] I ( t ) + C L I ( t ) ,
L I ( t ) ˙ = ( C + γ ) L I ( t ) + μ I ( t ) ,
and
L S ( t ) ˙ = ( C + γ ) L S ( t ) + μ S ( t ) ,
D ( t ) ˙ = γ [ S ( t ) + I ( t ) + L S ( t ) + L I ( t ) ] .
Moreover, N ( t ) = S ( t ) + I ( t ) + L S ( t ) + L I ( t ) and constrained by:
N ( t ) ˙ = Λ γ N ( t ) .
As t tends to infinity, considering L S ( t ) = N ( t ) S ( t ) I ( t ) L I ( t ) , the feasible region obtained is
Ω = { ( S , I , L I ) R 3 | 0 S , I , L I Λ γ } .
Then, we use the following (7)–(10) to define its boundary:
F 1 = { ( S , I , L I ) R 3 | S + I + L I = Λ μ , 0 S , I , L I Λ γ } ,
F 2 = { ( S , I , L I ) R 3 | S = 0 , 0 I , L I Λ γ } ,
F 3 = { ( S , I , L I ) R 3 | I = 0 , 0 S , L I Λ γ } ,
and
F 4 = { ( S , I , L I ) R 3 | L I = 0 , 0 S , I Λ γ } .
Considering the following equations:
( S ˙ ( t ) , I ˙ ( t ) , L I ˙ ( t ) ) F 1 · ( 1 , 1 , 1 ) = μ S ( t ) 0 ,
( S ˙ ( t ) , I ˙ ( t ) , L I ˙ ( t ) ) F 2 · ( 1 , 0 , 0 ) = Λ C [ N I ( t ) L I ( t ) ] 0 ,
( S ˙ ( t ) , I ˙ ( t ) , L I ˙ ( t ) ) F 3 · ( 0 , 1 , 0 ) = C L I ( t ) 0 ,
and
( S ˙ ( t ) , I ˙ ( t ) , L I ˙ ( t ) ) F 4 · ( 0 , 0 , 1 ) = μ I ( t ) 0 .
Consequently, Ω is compact and invariant [42], and the solutions of Ω exist and are unique [43].

2.2. Computation of the Steady States and the Basic Reproductive Number R 0

Considering the limit system, we obtain:
S ( t ) ˙ = Λ [ α 2 I ( t ) + μ + γ ] S ( t ) + α 1 I ( t ) + C [ N S ( t ) I ( t ) L I ( t ) ] ,
I ( t ) ˙ = [ α 1 μ γ + α 2 S ( t ) ] I ( t ) + C L I ( t ) ,
and
L I ( t ) ˙ = ( C + γ ) L I ( t ) + μ I ( t ) ,
where N = lim t N ( t ) = Λ γ .
The solutions of the above system are the steady states of (1)–(5). This system has two solutions:
  • The disease-free steady states E 0 = ( S 0 , 0 , 0 ) , where
    S 0 = C Λ + γ Λ C γ + γ μ + γ 2 .
  • The endemic steady state E = ( S , I , L I ) , where
    S = ( α 1 + μ + γ ) ( C + γ ) C μ α 2 ( C + γ ) ,
    I = [ ( μ + γ ) ( C + γ ) C μ ] [ ( α 1 + μ + γ ) ( C + γ ) C μ ] Λ α 2 ( C + γ ) 2 α 2 ( C + γ ) [ ( α 1 + μ + γ ) ( C + γ ) C μ ] + α 1 α 2 ( C + γ ) 2 ,
    and
    L I = μ [ ( μ + γ ) ( C + γ ) C μ ] [ ( α 1 + μ + γ ) ( C + γ ) C μ ] Λ μ α 2 ( C + γ ) 2 α 2 ( C + γ ) 2 [ ( α 1 + μ + γ ) ( C + γ ) C μ ] + α 1 α 2 ( C + γ ) 3 .
Furthermore, the basic reproductive number R 0 can be obtained by the next generation matrix method [44].
Set
F = α 2 S ( t ) 0 0 0
and
V = α 1 + μ + γ C μ C + γ .
Thus
R 0 = F · V 1 = α 2 S 0 ( C + γ ) ( α 1 + μ + γ ) ( C + γ ) C μ = α 2 Λ ( C + γ ) 2 [ ( C + γ ) ( μ + γ ) C μ ] [ ( α 1 + μ + γ ) ( C + γ ) C μ ] .

3. Dynamic Analysis

In this section, the local and global stabilities of both the disease-free point E 0 and the epidemic equilibrium point E were fully proved. Moreover, an attack-defense game was built to analyze the confrontation between malware and WRSNs.

3.1. Local Stability Analysis

Theorem 1.
The disease-free equilibrium point, E 0 , is locally asymptotically stable if R 0 < 1 .
Proof. 
The eigenvalues of the following matrix
F V = α 2 S 0 ( α 1 + μ + γ ) C μ ( C + γ )
are
λ 1 = 0.5 ( b + b 2 4 c ) ,
and
λ 2 = 0.5 ( b b 2 4 c ) ,
where b = ( C + γ ) [ α 2 S 0 ( α 1 + μ + γ ) ] and c = [ ( C + γ ) ( α 2 S 0 α 1 μ γ ) + C μ ] . The real parts of the two eigenvalues are both negative if R 0 < 1 . Besides,
[ μ S ( t ) γ S ( t ) + C ( N S ) + Λ ] S = μ γ C < 0 .
Thus E 0 is locally asymptotically stable [45]. On the contrary, E 0 is unstable if R 0 > 1 . □
Theorem 2.
The epidemic equilibrium point, E , is locally asymptotically stable if R 0 > 1 .
Proof. 
First of all, the truth E exists if and only if R 0 > 1 is simple to prove.
Subsequently, the characteristic polynomial of the Jacobian matrix of the state functions (1)–(4) in E , when R 0 > 1 is
P ( λ ) = P 1 λ 3 + P 2 λ 2 + P 3 λ 1 + P 4 λ 0 ,
where
P 1 = 1 > 0 ,
P 2 = μ + 2 γ + 2 C + α 2 2 ( C + γ ) ( C γ + γ μ + γ 2 ) ( R 0 1 ) ( C γ + γ 2 + μ γ ) ( C α 1 + α 1 γ + μ γ + C γ + γ 2 ) + C μ C + γ > 0 ,
P 3 = γ ( μ + γ ) + α 2 2 ( C + γ ) 2 ( C γ + γ μ + γ 2 ) ( R 0 1 ) ( C γ + γ 2 + μ γ ) ( C α 1 + α 1 γ + μ γ + C γ + γ 2 ) + C μ C ( C + 2 γ + μ ) > 0 ,
and
P 4 = μ C α 2 2 ( C + γ ) ( C γ + γ μ + γ 2 ) ( R 0 1 ) ( C γ + γ 2 + μ γ ) ( C α 1 + α 1 γ + μ γ + C γ + γ 2 ) > 0 .
Moreover, a simple calculus shows P 2 P 3 P 1 P 4 > 0 . Thus, if R 0 > 1 , applying the Routh criterion [46], the local asymptotically stability of E follows. □

3.2. Global Stability Analysis

Theorem 3.
The disease-free equilibrium point, E 0 , is globally asymptotically stable if R 0 < 1 .
Proof. 
In this proof, the method of Lyapunov function is considered. In general, in the Lyapunov stability analysis [47], the Lyapunov function needs to be positive definite, except for the stable point, and its first derivative needs to be negative definite.
When considering the Lyapunov function V = ( C + γ ) I ( t ) + C L I ( t ) , we obtain:
V ( t ) ˙ = ( C + γ ) I ( t ) ˙ + C L I ( t ) ˙ = ( C + γ ) { I ( t ) [ α 2 S ( t ) ( α 1 + γ + μ ) ] + C L I ( t ) } C ( C + γ ) L I ( t ) + C μ I ( t ) ( C + γ ) I ( t ) [ α 2 S 0 ( α 1 + γ + μ ) ] + C μ I ( t ) = I ( t ) [ ( C + γ ) α 2 S 0 ( C + γ ) ( α 1 + γ + μ ) + C μ ] = I ( t ) ( R 0 1 )
In addition, d V d t = 0 if and only if R 0 = 1 and I ( t ) = 0 . Moreover, (S, I, L I ) tends to E 0 when t tends to infinity, and the maximum invariant set in { ( S , I , L I ) Ω : d V d t = 0 } is E 0 . Thus, Theorem 3 has been proved, after considering the La-Salle Invariance Principle [48]. □
Theorem 4.
The epidemic equilibrium point, E , is globally asymptotically stable if R 0 > 1 .
Proof. 
First of all, by referencing [49], the system is uniformly persistent. According to [50], there exists an absorbent compact. Besides, according to Theorem 2, E is the unique equilibrium point if R 0 > 1 .
The second additive compound matrix of Jacobian matrix is given, as follows:
J [ 2 ] = θ 1 ( t ) C C μ θ 2 ( t ) θ 3 ( t ) 0 α 2 I ( t ) θ 4 ( t ) .
where
θ 1 ( t ) = α 2 I ( t ) 2 μ 2 γ C α 1 a + α 2 S ( t ) ,
θ 2 ( t ) = α 2 I ( t ) μ 2 γ 2 C ,
θ 3 ( t ) = α 2 S ( t ) + α 1 C ,
and
θ 4 ( t ) = α 1 μ 2 γ a C + α 2 S ( t ) .
Set P f as the directional derivative of the diagonal matrix P = d i a g ( 1 , I L I , I L I ) , then:
P f P 1 = d i a g ( 0 , I ˙ I L I ˙ L I , I ˙ I L I ˙ L I ) .
Set the matrix B = P f P 1 + P J [ 2 ] P 1 =
θ 1 ( t ) C C μ θ 2 ( t ) + I ˙ I L I ˙ L I θ 3 ( t ) 0 α 2 I ( t ) θ 4 ( t ) + I ˙ I L I ˙ L I .
Set
B 11 = θ 1 ( t ) ,
B 12 = C C ,
B 21 = μ 0 ,
and
B 22 = θ 2 ( t ) + I ˙ I L I ˙ L I θ 3 ( t ) α 2 I ( t ) θ 4 ( t ) + I ˙ I L I ˙ L I .
Supposing that ( S , I , L I ) is a vector in R 3 , then the norm of vector that is defined in R 3 is
| ( S , I , L I ) | = m a x { | S | , | I | + | L I | } .
Note that the Lozinskii measure of B is given by the following expression:
μ ( B ) m a x { g 1 , g 2 } .
where g 1 = μ ( B 11 ) + | B 12 | , g 2 = | B 21 | + μ ( B 22 )
According to [51],
g 1 = α 2 I ( t ) 2 μ 2 γ 2 C α 1 + α 2 S ( t ) ,
g 2 = 3 μ 2 γ C α 1 + α 2 S ( t ) .
Supposing that C > μ , then g 1 < g 2 . Thus, μ ( B ) g 2 .
Subsequently,
q = lim t s u p s u p ( S ( 0 ) , I ( 0 ) , L I ( 0 ) ) i n t ( Ω ) 1 t 0 t μ ( B ) d s 3 μ 2 γ C α 1 < 0 .
Consequently, applying the theorem in [52], the statement is proved. □

3.3. Optimal Control Strategies

According to differential game theory [53], let us impose a set of hypotheses as follows.
(a)
The game in this paper consists of two parties, i.e., malware and WRSN.
(b)
Both of the parties have controllable means. Among them, ν ( t ) = { A S I ( t ) , A L I I ( t ) } represents the strength of spreading malware, i.e., A S I ( t ) , and the controls from L I to I, i.e., A L I I ( t ) . μ ( t ) = { D I S ( t ) , D L S S ( t ) } describes the strength of removing malware, i.e., D I S ( t ) , and the controls from L S and S, i.e., D L S S ( t ) . Thus, (1)–(3) are replaced as:
S ( t ) ˙ = Λ [ α 2 A S I ( t ) I ( t ) + μ + γ ] S ( t ) + α 1 D I S ( t ) I ( t ) + C D L S S ( t ) L S ( t ) ,
I ( t ) ˙ = [ α 1 D I S ( t ) μ γ + α 2 A S I ( t ) S ( t ) ] I ( t ) + C A L I I ( t ) L I ( t ) ,
L S ( t ) ˙ = ( C D L S S ( t ) + γ ) L S ( t ) + μ S ( t ) ,
and
L I ( t ) ˙ = ( C A L I I ( t ) + γ ) L I ( t ) + μ I ( t ) .
(c)
Define X ( t ) = { S ( t ) , I ( t ) , L S ( t ) , L I ( t ) , D ( t ) } as a set of state variables.
(d)
The attacker (i.e., malware) aims at maximizing J ( · ) and the defender (i.e., WRSNs) aims at minimizing J ( · ) , and
J ( t , X ( t ) , μ ( t ) , ν ( t ) ) = t 0 t f [ C I I ( t ) ] d t + i X ( t ) C i ( t f ) i ( t f ) ,
where C I indicates the cost incurred by I nodes at time t, C i ( t f ) indicates the terminal cost of corresponding state, and i ( t f ) indicates the number of corresponding state at the terminal moment.
Theorem 5.
There is an optimal control set ( μ ( t ) , ν ( t ) ) = ( { D I S ( t ) , D L S S ( t ) } , { A S I ( t ) , A L I I ( t ) } ) such that
J ( t , X ( t ) , μ ( t ) , ν ( t ) ) = m a x ν m i n μ J ( t , X ( t ) , μ ( t ) , ν ( t ) ) = m i n μ m a x ν J ( t , X ( t ) , μ ( t ) , ν ( t ) )
and the values of A S I and D I S follow (57)–(60)
A S I ( t ) = m a x A S I ( t ) Δ 1 > 0 m i n A S I ( t ) Δ 1 < 0
A L I I ( t ) = m a x A L I I ( t ) Δ 2 < 0 m i n A L I I ( t ) Δ 2 > 0
D I S ( t ) = m a x D I S ( t ) Δ 3 < 0 m i n D I S ( t ) Δ 3 > 0
D L S S ( t ) = m a x D L S S ( t ) Δ 4 < 0 m i n D L S S ( t ) Δ 4 > 0
where Δ 1 = [ λ I ( t ) λ S ( t ) ] α 2 S ( t ) I ( t ) , Δ 2 = [ λ I ( t ) λ L I ( t ) ] C L I ( t ) , Δ 3 = [ λ S ( t ) λ I ( t ) ] α 1 I ( t ) and Δ 4 = [ λ S ( t ) λ L S ( t ) ] C L S ( t ) .
Proof. 
The saddle point in the game exists and it is unique [53]. Subsequently, referencing [54], the game has a value V, such that
V = m a x ν m i n μ J ( t , X ( t ) , μ ( t ) , ν ( t ) ) = m i n μ m a x ν J ( t , X ( t ) , μ ( t ) , ν ( t ) ) = J ( t , X ( t ) , μ ( t ) , ν ( t ) ) .
In view of (1)–(5) and (55), the Hamiltonian function is constructed as:
H ( t , X ( t ) , λ ( t ) , μ ( t ) , ν ( t ) ) = λ S ( t ) S ( t ) ˙ + λ I ( t ) I ( t ) ˙ + λ L S ( t ) L S ( t ) ˙ + λ L I ( t ) L I ( t ) ˙ + λ D ( t ) D ( t ) ˙ + C I I ( t )
where λ ( t ) = { λ S ( t ) , λ I ( t ) , λ L S ( t ) , λ L I ( t ) , λ D ( t ) } is a set of co-state variables.
By applying the Pontryagin Maximum Principle [55], the constraints of the co-state variables are formulated, as follows.
λ S ( t ) ˙ = [ λ S ( t ) λ I ( t ) ] α 2 A S I ( t ) I ( t ) + [ λ S ( t ) λ L S ( t ) ] μ + [ λ S ( t ) λ D ( t ) ] γ
λ I ( t ) ˙ = [ λ S ( t ) λ I ( t ) ] α 2 A S I ( t ) S ( t ) + [ λ I ( t ) λ S ( t ) ] α 1 D I S ( t ) + [ λ I ( t ) λ L I ( t ) ] μ C I
λ L S ( t ) ˙ = [ λ L S ( t ) λ S ( t ) ] C D L S ( t ) + [ λ L S ( t ) λ D ( t ) ] γ
λ L I ( t ) ˙ = [ λ L I ( t ) λ I ( t ) ] C A L I ( t ) + [ λ L I ( t ) λ D ( t ) ] γ
λ D ( t ) ˙ = 0
Besides, the terminal constraints of the co-state variables are formulated as:
λ i ( t f ) = C i ( t f )
where i X ( t ) .
Consequently, the optimal strategies are obtained by
H ( t , X ( t ) , λ ( t ) , μ ( t ) , ν ( t ) ) H ( t , X ( t ) , λ ( t ) , μ ( t ) , ν ( t ) ) H ( t , X ( t ) , λ ( t ) , μ ( t ) , ν ( t ) ) .
As a consequence, in the optimal case, when [ λ I ( t ) λ S ( t ) ] α 2 S ( t ) I ( t ) > 0 , the malware exerts maximum effort to infect vulnerable sensor nodes; otherwise, it does not propagate. When [ λ I ( t ) λ L I ( t ) ] C L I ( t ) < 0 , the malware exerts the minimum effort to influence the charging process to L I nodes; otherwise, the L I nodes accept the charging requests. Moreover, when [ λ S ( t ) λ I ( t ) ] α 1 I ( t ) < 0 , WRSNs exert the maximum effort to clear the malware; otherwise, the networks does nothing in removing malware. When [ λ S ( t ) λ L S ( t ) ] C L S ( t ) < 0 , WRSNs exert the maximum effort to charge the L S nodes; otherwise, L S nodes do not charge.

4. Simulation

Theorem 1 to Theorem 5 have been further verified here. In Section 4.1, the stable solutions of the system (1)–(5) are obtained and proved, while the impact of charging is analyzed by observing the variation of I nodes. In Section 4.2, the optimal solutions are displayed by comparing with the groups without optimal controls. All of the simulations are based on MacOS Catalina (Intel Core i5, 8 GB, 1.8 GHz) and MATLAB 2017b.

4.1. Stability Analysis

This part aims to test Theorem 1 to Theorem 4. Firstly, eight two-dimensional feasible regions are constructed through the combinations of various state variables to analyze their relationships. Subsequently, suppose that Λ = 0.1 , γ = 0.005 , μ = 0.05 , α 2 = 0.001 , α 1 = 0.01 , and C = 0.05 . Therefore, whether R 0 < 1 or R 0 > 1 , the total number of sensor nodes is constant at 20 (i.e., S ( t ) + I ( t ) + L S ( t ) + L I ( t ) 20 ), including the initial value (i.e., S ( 0 ) + I ( 0 ) + L I ( 0 ) + L S ( 0 ) = 20 ).

4.1.1. Disease-Free Equilibrium Stability

Here, four different state combinations (i.e., ( S ( t ) , I ( t ) ) , ( L S ( t ) , L I ( t ) ) , ( S ( t ) , L S ( t ) ) , and ( I ( t ) , L I ( t ) ) ) are given in order to testify the disease-free equilibrium point, as shown in Figure 2. At this moment, R 0 = 0.5360 < 1 . Theoretically, S ( ) = 10.47 , I ( ) = L I ( ) = 0 , and L S ( ) = 9.52 , according to (18). Practically, the simulation results that are shown in Figure 2 conform to Theorems 1 and 3.
The evolution in ( S ( t ) , I ( t ) ) and ( L S ( t ) , L I ( t ) ) are similar and so do ( S ( t ) , L S ( t ) ) and ( I ( t ) , L I ( t ) ) , as depicted in Figure 2. In Figure 2a,b, the curve starts from the boundary and finally converges to (10.47, 0)((9.52, 0)). Specifically, as illustrated in Figure 2a,b, the curve in the feasible region is attracted by I = 1.0028 S + 10.5 ( L I = 0.9979 L S + 9.5 ). When malware only exists on L I nodes, a peak in the number of I nodes appears after a period of time. The peak decreases as the initial number of S nodes increases, and it eventually stays around at 3. At the same time, the number of I nodes always shows a downward trend, and it is cleared when t . In Figure 2c,d, the curve is attracted by L S = 1.1240 S 2.2479 ( L I = I ), and finally converges to (10.47, 9.52)(0, 0). From the beginning, an increase in the number of S( L S ) or I( L I ) nodes must lead to a decrease in the number of L S (S) or L I (I) nodes, as shown in Figure 2c,d. Subsequently, the number of S and L S nodes increase simultaneously, while the number of I and L I decrease simultaneously. Consequently, in WRSNs, only S and L S nodes exist.
Figure 3 illustrates a three-dimensional diagram of the system(15)–(17), where the feasible region is in the triangular pyramid area. Note that Figure 2a,d are two feasible region planes in Figure 3. Similarly, the curve gathers together, and then finally converges to (10.47, 0, 0). In summary, a smooth transitional period exists before the system reaches equilibrium. During the period, malware is eliminated from the network gradually and the numbers of S and L S nodes maintain a steady growth. In the end, the malware is totally cleared in the WRSNs, and the numbers of S and L S nodes remain unchanged under constant charging power.

4.1.2. Epidemic Equilibrium Stability

Similarly, the same four combinations are applied here, as depicted in Figure 4. Suppose that the values of coefficients, except for α 2 = 0.005 , remain constant, as stated in Section 4.1.1. At this time, R 0 = 2.6799 > 1 . Substitute the coefficients into (19)–(21), we obtained S = 3.91 , I = 6.57 and L I = 5.97 . Moreover, the results that are presented in Figure 5 confirm Theorem 2 and Theorem 4.
When compared with Figure 2, when R 0 > 1 , the equilibrium points appear inside the region, but not the boundary. In terms of evolution trends, Figure 4a,c and Figure 4b,d are close. It is worth noting that the prerequisite for the existence of the epidemic equilibrium point is that at least one I node exists. When compared with the case R 0 < 1 , at this time, the number of I( L I ) nodes is no longer reduced. The curve that is shown in Figure 4a,b eventually converges to (3.91, 6.57) (3.55, 5.97). In particular, when the initial number of I( L I ) nodes is less than 6.57(5.97), the number of I( L I ) nodes will increase significantly after a gentle decline, as shown in Figure 4a,b. The curve that is presented in Figure 4a,b is attracted by S = 1.1330 L S + 11 ( L S = 1.1352 L I + 10 ), and it finally converges to the equilibrium point along it.
When compared with the case R 0 < 1 , the evolution curves of ( S ( t ) , L S ( t ) ) ( ( I ( t ) , L I ( t ) ) ) are similar at first. However, when the curves gather, they do not just show a single evolution trend, but the increase and decrease appear at the same time, as shown in Figure 4c,d. In Figure 4c,d, the curve begins from the boundary and it converges to (3.91, 3.55) (6.56, 5.97), when t .
Figure 5 illustrates the limit system (15)–(17) in three-dimensional way. Similarly, Figure 4a,d are the planes into the triangular pyramid region. Similar to the case R 0 < 1 , the evolution of S, I, and L I nodes has a smooth transitional period before reaching the equilibrium point. During the transitional period, when the number of S > 3.91 , the trend drops to (3.91, 6.57, 5.97); when the number of S < 3.91 , the trend rises to (3.91, 6.57, 5.97). In summary, in the case R 0 > 1 , if malware propagates on a large scale in WRSNs, after a period of time, the numbers of I and L I nodes will decrease along a specific trajectory. Meanwhile, the numbers of S and L S nodes increase along a specific trajectory, and finally converge to (3.91, 6.57, 5.97). Conversely, when few malware exists in WRSNs, over a period of evolution, the numbers of S and L S nodes decrease along the specific trajectory, and the numbers of I and L I increase along the specific trajectory, and finally converge to (3.91, 6.57, 5.97).

4.1.3. Influence of the Charging Rate C

The influence of charging rate is discussed detailedly by comparing the quantity of I nodes with various C, as shown in Figure 6. Based on (55), C directly affects R 0 , thereby affecting the prevalence of malware. As C increases, the peak of the quantity of I nodes keeps growing and gradually saturates, as shown in Figure 6a. Under ten sets of C, only C = 0.05 and C = 0.15 clear the malware. After simple calculation, we find, as C increases, that R 0 grows likewise, as illustrated in Figure 6b. Specifically, R 0 = 1.000 , when C = 0.207 , which indicates, when t , that the malware is eliminated if C < 0.207 and prevalent if C > 0.207 .
Such results reveal that, in WRSNs, in the confrontation with malware, the higher charging power, the higher peak of malware propagation. This inspires us to properly control the charging rate in order to prevent the prevalence of malware.

4.2. Optimal Control

In this section, we further classify Theorem 5 into three aspects: evolution of state variables, overall cost and variation of control variables. The coefficients remain constant as set in Section 4.1. Moreover, set C I = 0.05 , S ( 0 ) = 19 , I ( 0 ) = 1 , L S ( 0 ) = 0 , L I ( 0 ) = 0 , A S I ( 0 ) = 1 , A L I I ( t ) = 0 , D I S ( 0 ) = 1 , and D L S S ( 0 ) = 0 . In particular, this section analyzes the two cases of R 0 (i.e., R 0 < 1 and R 0 > 1 ). Furthermore, the optimality of the strategies (57)–(60) is highlighted by comparison with the non-optimal control groups.

Evolution of State Variables

In this part, the evolution of state variables under four cases is discussed, as shown in Figure 7.
Case 1:
R 0 < 1 with optimal control, as shown in Figure 7a;
Case 2:
R 0 < 1 without optimal control, as shown in Figure 7b;
Case 3:
R 0 > 1 with optimal control, as shown in Figure 7c; and,
Case 4:
R 0 > 1 without optimal control, as shown in Figure 7d.
The evolution trends of S and L S nodes are very close in the four cases. Specifically, when t = 30 , in Case 1, S = 10.45 and L S = 8.6469 ; in Case 2, S = 10.4412 and L S = 8.6379 ; in Case 3, S = 9.2643 and L S = 8.5908 ; and, in Case 4, S = 9.3334 and L S = 8.0666 . When R 0 < 1 (i.e., Case 1 and Case 2), the number of I nodes always keeps decreasing. However, when R 0 > 1 (i.e., Case 3 and Case 4), the number of L I nodes shows increasing signs. As for L I nodes, the number keeps rising in all four cases. Detailedly, when t = 30 , in Case 1, I = 0.2328 and L I = 0.6702 ; in Case 2, I = 0.4883 and L I = 0.4326 ; in Case 3, I = 0.9919 and L I = 1.1530 ; and, in Case 4, I = 1.5960 and L I = 1.0039 .
The results indicate, in the consecutive attack-defense confrontation game, that the number of I nodes decays faster than that of the control groups. Therefore, the Susceptible, Infected, Low-energy, Susceptible (SILS) model under dynamic optimal controls is more conducive to the clearance of malware in WRSNs.

4.3. Overall Cost and Optimal Controls

In this part, the four cases stated above are explained further in two aspects, including accumulative costs and variation on control variables.
Figure 8 illustrates the cost under the four cases. From Figure 8, it can be seen that the cost with optimal control is lower than that of the control group all of the time, which indicates the validity. Specifically, in Case 1, the cost finally reaches 81.9044; in Case 2, the cost finally reaches 98.4576; in Case 3, the cost finally reaches 162.8256; and, in Case 4, the cost finally reaches 196.9237. The cost depends on the number of I nodes based on (55). Thus, the cumulative cost is another embodiment of variation on the number of I nodes. It can be seen, even under optimal control, that the number of I nodes when R 0 > 1 is still greater than that when R 0 < 1 .
Figure 9 depicts the variations of the control variables when R 0 < 1 and R 0 > 1 obtained from (57)–(60). Among them, Figure 9a shows the variation of D I A ( t ) , Figure 9b shows the variation of D L S S ( t ) , Figure 9c shows the variation of A S I ( t ) , and Figure 9d shows the variation of A L I I ( t ) .
For WRSNs, its purpose is to minimize the cost. Therefore, whether R 0 < 1 or R 0 > 1 , WRSNs are sparing no effort to remove malware, as depicted in Figure 9a. However, the charging process is not always performed. After charging started, in the case of R 0 > 1 , owing to the excessive growth of malware, the charging of L S nodes stops immediately, as shown in Figure 9b.
Regarding malware, its aim is to maximize the cost. Thus, in both cases, malware is being copied and propagated almost all of the time, as depicted in Figure 9c. Similarly, L I nodes do not always receive charging requests. If the sharp decline in the number of I nodes appears (i.e., t = 3 when R 0 < 1 and t = 19 when R 0 > 1 ), charging L I nodes will cause more malware to be removed, which is unconducive to the spread of the malware.

5. Conclusions

A novel model, namely SILS, has been proposed when considering the remaining energy of WRSNs in this paper. In SILS, sensor nodes are divided into five states: susceptible, infected, susceptible in low-energy, infected in low-energy, and dysfunctional. After theoretically proposing local and global stability, we further verify them by simulations. The simulation results indicate some characteristics of the SILS model: before reaching the equilibrium point ( E 0 or E ), there exists a phenomenon that the number of S(I) and L S ( L I ) nodes increases or decreases linearly simultaneously. Besides, the positive relationship between charging rate C and basic reproductive number R 0 is revealed, which enlightens us to adjust the charging rate C reasonably. Meanwhile, the threshold of C is obtained, which is, if C is higher than the threshold, malware will be prevalent, and below the threshold, malware will be eliminated. In addition to analyzing the stability, by constructing a game model, we further analyze the attack-defense methods of malware and WRSNs, and derive the optimal strategies for both players. At the same time, by comparing the cases R 0 > 1 and R 0 < 1 , the simulation results show that the optimal controls can effectively inhibit the growth of I nodes and reduce the overall costs.
This paper discusses a static, homogeneous network. However, with the continuous development of the Internet of Things industry and the integration of various terminal devices, heterogeneous network technology has become mainstream and it is one of our future research areas. At the same time, the convenience that is brought by the mobile technology has became increasingly prominent, such as mobile base stations and mobile chargers. However, the potential safety hazards that are caused by the mobile devices cannot be ignored. Moreover, with the investigation of the actual situation and the deepening of the mathematical model, various random model problems will be raised, which are also the trends in our future research.

Author Contributions

Conceptualization, G.L. and B.P.; methodology, G.L., B.P. and X.Z.; software, B.P.; validation, G.L., B.P. and X.Z.; formal analysis, B.P.; investigation, G.L. and B.P.; writing–original draft preparation, B.P.; writing–review and editing, G.L., B.P. and X.Z.; project administration, G.L.; funding acquisition, G.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was partially supported by the National Natural Science Foundation of China (No. 61403089).

Data Availability Statement

The data presented in this study are available on request from the corresponding author. The data are no publicly available as they involve the subsequent application of patent for invention and the publication of project deliverables.

Conflicts of Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Abbreviations

The following abbreviations are used in this manuscript:
SymbolDescription
Λ Birth rate
γ Death rate
μ Depletion rate
α 1 Removal rate
CCharging rate
α 2 Transmission rate

References

  1. Rashid, B.; Rehmani, M.H. Applications of wireless sensor networks for urban areas: A survey. J. Netw. Comput. Appl. 2016, 60. [Google Scholar] [CrossRef]
  2. Yetgin, H.; Cheung, K.T.K.; El-Hajjar, M.; Hanzo, L. A Survey of Network Lifetime Maximization Techniques in Wireless Sensor Networks. IEEE Commun. Surv. Tutor. 2017, 19, 828–854. [Google Scholar] [CrossRef] [Green Version]
  3. Zhang, F.; Zhang, J.; Qian, Y.J. A Survey on Wireless Power Transfer based Charging Scheduling Schemes in Wireless Rechargeable Sensor Networks. In Proceedings of the ICCSSE 2018, Wuhan, China, 21–23 August 2018. [Google Scholar]
  4. Shu, Y.C.; Yousefi, H.; Cheng, P.; Chen, J.M.; Gu, Y.; He, T.; Shin, K.G. Near-Optimal Velocity Control for Mobile Charging in Wireless Rechargeable Sensor Networks. IEEE. Trans. Mob. Comput. 2016, 15, 1699–1713. [Google Scholar] [CrossRef] [Green Version]
  5. Wu, P.F.; Xiao, F.; Sha, C.; Huang, H.P.; Sun, L.J. Trajectory Optimization for UAVs’ Efficient Charging in Wireless Rechargeable Sensor Networks. IEEE Trans. Veh. Technol. 2020, 69, 4207–4220. [Google Scholar] [CrossRef]
  6. Mo, L.; Kritikakou, A.; He, S.B. Energy-Aware Multiple Mobile Chargers Coordination for Wireless Rechargeable Sensor Networks. IEEE Internet Things J. 2019, 6, 8202–8214. [Google Scholar] [CrossRef] [Green Version]
  7. Lin, C.; Shang, Z.; Du, W.; Ren, J.K.; Wang, L.; Wu, G.W. CoDoC: A Novel Attack for Wireless Rechargeable Sensor Networks through Denial of Charge. In Proceedings of the IEEE INFOCOM 2019, Paris, France, 29 April–2 May 2019. [Google Scholar]
  8. Lin, C.; Zhou, J.Z.; Guo, C.Y.; Song, H.B.; Wu, G.W.; Mohammad, S.O. TSCA: A temporal-spatial real-time charging scheduling algorithm for on-demand architecture in wireless rechargeable sensor networks. IEEE. Trans. Mob. Comput. 2018, 17, 211–224. [Google Scholar] [CrossRef]
  9. Han, G.J.; Miao, X.; Wang, H.; Guizani, M.; Zhang, W.B. CPSLP: A Cloud-Based Scheme for Protecting Source Location Privacy in Wireless Sensor Networks Using Multi-Sinks. IEEE Trans. Veh. Technol. 2019, 68, 2739–2750. [Google Scholar] [CrossRef]
  10. EI Shafie, A.; Niyato, D.; AI-Dhahir, N. Security of Rechargeable Energy-Harvesting Transmitters in Wireless Networks. IEEE Wirel. Commun. Lett. 2016, 5, 384–387. [Google Scholar] [CrossRef] [Green Version]
  11. Bhushan, B.; Sahoo, G. E2SR2: An acknowledgement-based mobile sink routing protocol with rechargeable sensors for wireless sensor networks. Wirel. Netw 2019, 25, 2697–2721. [Google Scholar] [CrossRef]
  12. Saidi, A.; Benahmed, K.; Seddiki, N. Secure cluster head election algorithm and misbehavior detection approach based on trust management technique for clustered wireless sensor networks. Ad Hoc Netw. 2020, 106, 102215. [Google Scholar] [CrossRef]
  13. Wang, G.; Lee, B.; Ahn, J.; Cho, G. A UAV-assisted CH election framework for secure data collection in wireless sensor networks. Futur. Gener. Comp. Syst. 2020, 102, 152–162. [Google Scholar] [CrossRef]
  14. Karyotis, V.; Khouzani, M.H.R. Malware Diffusion Models for Modern Complex Networks: Theory and Applications; Morgan Kaufmann: Burlington, MA, USA, 2016. [Google Scholar]
  15. Cui, B.J.; Jin, H.F.; Carullo, G.; Liu, Z.L. Service-oriented mobile malware detection system based on mining strategies. Pervasive Mob. Comput. 2015, 2015, 101–116. [Google Scholar] [CrossRef]
  16. Jaint, B.; Indu, S.; Pandey, N.; Pahwa, K. Malicious Node Detection in Wireless Sensor Networks Using Support Vector Machine. In Proceedings of the International Conference on Recent Developments in Control, Automation & Power Engineering, Noida, India, 10–11 October 2019; pp. 247–252. [Google Scholar]
  17. Thaile, M.; Ramanaiah, O.B.V. Node Compromise Detection Based on NodeTrust in Wireless Sensor Networks. In Proceedings of the International Conference on Computer Communication and Informatics, Coimbatore, India, 7–9 January 2016. [Google Scholar]
  18. Butun, I.; Osterberg, P.; Song, H.B. Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures. IEEE Commun. Sur. Tutor. 2020, 22, 616–644. [Google Scholar] [CrossRef] [Green Version]
  19. Ai, J.J.; Chen, H.C.; Guo, Z.H.; Cheng, G.Z.; Baker, T. Mitigating malicious packets attack via vulnerability-aware heterogeneous network devices assignment. Futur. Gener. Comp. Syst. 2020, 111, 841–852. [Google Scholar] [CrossRef]
  20. Hernández Guillén, J.D.; Martín del Rey, A. A mathematical model for malware spread on WSNs with population dynamics. Phys. A 2020, 545, 123609. [Google Scholar]
  21. Huang, D.W.; Yang, L.X.; Yang, X.F.; Wu, Y.B.; Tang, Y.Y. Towards understanding the effectiveness of patch injection. Phys. A 2019, 526, 120956. [Google Scholar] [CrossRef]
  22. Zhu, L.H.; Zhou, M.T.; Zhang, Z.D. Dynamical Analysis and Control Strategies of Rumor Spreading Models in Both Homogeneous and Heterogeneous Networks. J. Nonlinear Sci. 2020, 30, 2545–2576. [Google Scholar] [CrossRef]
  23. Shen, S.G.; Zhou, H.P.; Feng, S.; Liu, J.H.; Zhang, H.; Cao, Q.Y. An Epidemiology-Based Model for Disclosing Dynamics of Malware Propagation in Heterogeneous and Mobile WSNs. IEEE Access 2020, 8, 43876–43887. [Google Scholar] [CrossRef]
  24. Zhu, L.H.; Guan, G. Dynamical analysis of a rumor spreading model with self-discrimination and time delay in complex networks. Phys. A 2019, 533, 121953. [Google Scholar] [CrossRef]
  25. Srivastava, P.K.; Pandey, S.P.; Gupta, N.; Singh, S.P.; Ojha, R.P. Modeling and Analysis of Antimalware Effect on Wireless Sensor Network. In Proceedings of the ICCCS 2019, Singapore, 23–25 February 2019. [Google Scholar]
  26. Hosseini, S.; Azgomi, M.A. The dynamics of an SEIRS-QV malware propagation model in heterogeneous networks. Phys. A 2018, 512, 803–817. [Google Scholar] [CrossRef]
  27. Ojha, R.P.; Srivastava, P.K.; Sanyal, G.; Gupta, N. Improved Model for the Stability Analysis of Wireless Sensor Network Against Malware Attacks. Wirel. Pers. Commun. 2020. [Google Scholar] [CrossRef]
  28. Biswal, S.R.; Swain, S.K. Model for Study of Malware Propagation Dynamics in Wireless Sensor Network. In Proceedings of the ICOEI 2019, Tirunelveli, India, 23–25 April 2019. [Google Scholar]
  29. Al-Tous, H.; Barhumi, I. Differential Game for Resource Allocation in Energy Harvesting Sensor Networks. In Proceedings of the IEEE ICC 2018, Kansas City, MO, USA, 20–24 May 2018. [Google Scholar]
  30. Huang, Y.H.; Zhu, Q.Y. A Differential Game Approach to Decentralized Virus-Resistant Weight Adaptation Policy Over Complex Networks. IEEE Trans. Control Netw. Syst. 2020, 7, 944–955. [Google Scholar] [CrossRef] [Green Version]
  31. Zhang, L.T.; Xu, J. Differential Security Game in Heterogeneous Device-to-Device Offloading Network Under Epidemic Risks. IEEE Trans. Netw. Sci. Eng. 2020, 7, 1852–1861. [Google Scholar] [CrossRef]
  32. Shen, S.G.; Li, H.J.; Han, R.S.; Vasilakos, A.V.; Wang, Y.H.; Cao, Q.Y. Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1962–1973. [Google Scholar] [CrossRef]
  33. Liu, G.Y.; Peng, B.H.; Zhong, X.J.; Cheng, L.F.; Li, Z.F. Attack-Defense Game between Malicious Programs and Energy-Harvesting Wireless Sensor Networks Based on Epidemic Modeling. Complexity 2020, 2020, 3680518. [Google Scholar] [CrossRef]
  34. Miao, L.; Li, S. A Differential Game-Theoretic Approach for the Intrusion Prevention Systems and Attackers in Wireless Networks. Wirel. Pers. Commun. 2018, 103, 1993–2003. [Google Scholar] [CrossRef]
  35. Zhang, H.W.; Jiang, L.; Huang, S.R.; Wang, J.D.; Zhang, Y.C. Attack-Defense Differential Game Model for Network Defense Strategy Selection. IEEE Access 2019, 7, 50618–50629. [Google Scholar] [CrossRef]
  36. Hu, J.H.; Qian, Q.; Fang, A.; Fang, S.Z.; Xie, Y. Optimal Data Transmission Strategy for Healthcare- Based Wireless Sensor Networks: A Stochastic Differential Game Approach. Wirel. Pers. Commun. 2016, 89, 1295–1313. [Google Scholar] [CrossRef]
  37. Sun, Y.; Li, Y.B.; Chen, X.H.; Li, J. Optimal defense strategy model based on differential game in edge computing. J. Intell. Fuzzy Syst. 2020, 39, 1449–1459. [Google Scholar] [CrossRef]
  38. Eshghi, S.; Khouzani, M.H.R.; Sarkar, S. Optimal Patching in Clustered Malware Epidemics. IEEE-ACM Trans. Netw. 2016, 24, 283–298. [Google Scholar] [CrossRef] [Green Version]
  39. Khouzani, M.H.R.; Sarkar, S.; Altman, E. Optimal Dissemination of Security Patches in Mobile Wireless Networks. IEEE Trans. Inf. Theory 2012, 58, 4714–4732. [Google Scholar] [CrossRef]
  40. Sarkar, S.; Khouzani, M.H.R.; Kar, K. Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks. IEEE Trans. Autom. Control 2013, 58. [Google Scholar] [CrossRef] [Green Version]
  41. Wang, K.; Wang, L.; Lin, C.; Obaidat, M.S.; Alam, M. Prolonging lifetime for wireless rechargeable sensor networks through sleeping and charging scheduling. Int. J. Commun. Syst. 2020, 33, e4355. [Google Scholar] [CrossRef]
  42. Yorke, J.A. Invariance for ordinary differential equations. Math. Syst. Theory 1967, 1, 353–372. [Google Scholar] [CrossRef]
  43. Wiggins, S. Introduction to Applied Nonlinear Dynamical Systems and Chaos; Springer: New York, NY, USA, 2003; Volume 2. [Google Scholar]
  44. Diekmann, O.; Heesterbeek, H.; Britton, T. Mathematical Tools for Understanding Infectious Disease Dynamics; Princeton University Press: Princeton, NJ, USA, 2013. [Google Scholar]
  45. van den Diressche, P.; Watmough, J. Further notes on the basic reproduction number. In Mathematical Epidemiology; Brauer, F., van den Driessche, P., Wu, J., Eds.; Springer: Berlin/Heisenberg, Germany, 2008; pp. 159–178. [Google Scholar]
  46. Merkin, D.R. Introduction to the Theory of the Stability; Springer: New York, NY, USA, 2012; Volume 24. [Google Scholar]
  47. Lyapunov, A.M. The general problem of the stability of motion. Int. J. Control 1992, 55, 531–534. [Google Scholar] [CrossRef]
  48. Lasalle, J.P. The Stability of Dynamical Systems; SIAM: Philadelphia, PA, USA, 1976. [Google Scholar]
  49. Freedman, H.; Ruan, S.; Tang, M. Uniform persistence and flows near a closed positively invariant set. J. Dyn. Differ. Equ. 1994, 6, 583–600. [Google Scholar] [CrossRef] [Green Version]
  50. Hutson, V.; Schmitt, K. Permanence and the dynamics of biological systems. Math. Biosci. 1992, 111, 1–71. [Google Scholar] [CrossRef]
  51. Li, M.L.; Muldowney, J.S. A geometric approach to the global-stability problems. J. Math. Anal. 1996, 27, 1070–1083. [Google Scholar] [CrossRef]
  52. Cushing, J.M. Nonlinear matrix models and population dynamics. Nat. Resour. Model. 1988, 2, 539–580. [Google Scholar] [CrossRef]
  53. Avner, F. Differential games. In Handbook of Game Theory; Aumann, R.J., Hart, S., Eds.; Elsevier: Amsterdam, The Netherlands, 1994; Volume 2. [Google Scholar]
  54. Bressan, A. Noncooperative differential games. Milan J. Math. 2011, 79, 357–427. [Google Scholar] [CrossRef]
  55. Isaacs, R. Differential Game; Wiley: New York, NY, USA, 1965. [Google Scholar]
Figure 1. Flow diagram of the Susceptible, Infected, Low-energy, Susceptible (SILS) Model.
Figure 1. Flow diagram of the Susceptible, Infected, Low-energy, Susceptible (SILS) Model.
Sensors 21 00123 g001
Figure 2. Evolution of sensor nodes when R 0 < 1 . Different colors indicate that the curves start at different boundaries. So do Figure 3, Figure 4 and Figure 5.
Figure 2. Evolution of sensor nodes when R 0 < 1 . Different colors indicate that the curves start at different boundaries. So do Figure 3, Figure 4 and Figure 5.
Sensors 21 00123 g002
Figure 3. Variation of S, I and LI nodes when R 0 < 1 .
Figure 3. Variation of S, I and LI nodes when R 0 < 1 .
Sensors 21 00123 g003
Figure 4. Evolution of sensor nodes when R 0 > 1 .
Figure 4. Evolution of sensor nodes when R 0 > 1 .
Sensors 21 00123 g004
Figure 5. Variation of S, I and LI nodes when R 0 > 1 .
Figure 5. Variation of S, I and LI nodes when R 0 > 1 .
Sensors 21 00123 g005
Figure 6. The influence of C.
Figure 6. The influence of C.
Sensors 21 00123 g006
Figure 7. Evolution of sensor nodes under four different cases.
Figure 7. Evolution of sensor nodes under four different cases.
Sensors 21 00123 g007
Figure 8. Overall cost.
Figure 8. Overall cost.
Sensors 21 00123 g008
Figure 9. Variation of control variables.
Figure 9. Variation of control variables.
Sensors 21 00123 g009
Table 1. Researches on stability of epidemic model in Wireless sensor networks (WSNs).
Table 1. Researches on stability of epidemic model in Wireless sensor networks (WSNs).
AuthorsModelCharacteristicsStability
J.D. HernándezGuillén et al. [20]SCIRSConsidering the carrier state, population dynamics, and vaccination and reinfection processesLocal and global stability in malware-free and epidemic points
S.G. Shen et al. [23]VCQPSConsidering both the heterogeneity and mobility of heterogeneous and mobile sensor nodesLocal and global stability in malware-free point
Linhe Zhu et al. [24]SBDConsidering the nonlinear incidence rate and time delay in complex networksLocal and global stability in rumor-free point
P.K. Srivastava et al. [25]SEIARConsidering the anti-malware processLocal and global stability in worm-free point
S. Hosseini et al. [26]SEIRS-QVConsidering the impacts of user awareness, network delay and diverse configuration of nodesLocal and global stability in malware-free point
D.W. Huang et al. [21]SIPSConsidering the patch injection mechanismLocal and global stability in epidemic point
L.H. Zhu et al. [22]I2S2RConsidering the effect of time delay both in homogeneous networks and heterogeneous networksLocal and global stability in malware-free and epidemic points
R.P. Ojha et al. [27]SEIQRVConsidering both quarantine and vaccination techniquesLocal and global stability in worm-free point
S.R. Biswal et al. [28]SEIRDConsidering the early detection and removal processLocal and global stability in worm-free point
Table 2. Researches on differential game applied in WSNs.
Table 2. Researches on differential game applied in WSNs.
AuthorsParticipantsGoal
H. Al-Tous et al. [29]An energy-harvesting (EH) multi-hop wireless sensor network (WSN)Adaptively changing the transmitted data and power, efficiently utilizing the available harvested energy and balancing the buffer of all sensor nodes.
Y.H. Huang et al. [30]Virus and nodes with various weightsMinimizing the total cost of the whole network
L.T. Zhang, et al. [31]Device to Device (D2D) offloading enabled mobile network and malwareD2D offloading enabled mobile network aims to maximize the cost
S.G. Shen et al. [32]WSNs and malwareThe systems aims to minimize the cost; the malware aims to maximize the cost (the same cost function)
G.Y. Liu et al. [33]WRSNs and malwareWRSNs aims to minimize the cost; malware aims to maximize the cost (the same cost)
L. Miao et al. [34]Intrusion prevention systems(IPS) and the malicious attackersIPS aims to minimize the cost A; attacker aims to maximize the cost B (two different cost functions )
H.W. Zhang et al. [35]Attacker and defenderAttacker aims to maximize the cost A; Defender aims to minimize the cost B (two different cost functions)
J.H. Hu et al. [36]Healthcare-based wireless sensor network (HWSN)HWSN aims to minimizing the transmission cost
Y. Sun et al. [37]Edge nodes (ENs)ENs aims to minimize the resource consumption
S. Eshghi et al. [38]Mobile WSNs and malwareMobile WNSs aims to minimize the cost by using optimal patching policies
M.H.R. Khouzani et al. [39]Mobile WSNs and malwareBy obtaining the optimal dissemination of patches, the tradeoff between security risks and bandwidth is minimized
S. Sarkar et al. [40]Multi-hop wireless networksBy using the optimal routing and scheduling, the throughput of the networks is optimized
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Liu, G.; Peng, B.; Zhong, X. A Novel Epidemic Model for Wireless Rechargeable Sensor Network Security. Sensors 2021, 21, 123. https://doi.org/10.3390/s21010123

AMA Style

Liu G, Peng B, Zhong X. A Novel Epidemic Model for Wireless Rechargeable Sensor Network Security. Sensors. 2021; 21(1):123. https://doi.org/10.3390/s21010123

Chicago/Turabian Style

Liu, Guiyun, Baihao Peng, and Xiaojing Zhong. 2021. "A Novel Epidemic Model for Wireless Rechargeable Sensor Network Security" Sensors 21, no. 1: 123. https://doi.org/10.3390/s21010123

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop