Next Article in Journal
Can Quantum Correlations Lead to Violation of the Second Law of Thermodynamics?
Previous Article in Journal
Electrophysiological Properties from Computations at a Single Voltage: Testing Theory with Stochastic Simulations
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Dynamics Analysis of a Wireless Rechargeable Sensor Network for Virus Mutation Spreading

School of Machanical and Electric Engineering, Guangzhou University, Guangzhou 510006, China
*
Authors to whom correspondence should be addressed.
Entropy 2021, 23(5), 572; https://doi.org/10.3390/e23050572
Submission received: 7 April 2021 / Revised: 29 April 2021 / Accepted: 4 May 2021 / Published: 6 May 2021

Abstract

:
Virus spreading problems in wireless rechargeable sensor networks (WSNs) are becoming a hot topic, and the problem has been studied and discussed in recent years. Many epidemic spreading models have been introduced for revealing how a virus spreads and how a virus is suppressed. However, most of them assumed the sensors are not rechargeable sensors. In addition, most of existing works do not consider virus mutation problems. This paper proposes a novel epidemic model, including susceptible, infected, variant, low-energy and dead states, which considers the rechargeable sensors and the virus mutation factor. The stability of the proposed model is first analyzed by adopting the characteristic equation and constructing Lyapunov functions methods. Then, an optimal control problem is formulated to control the virus spread and decrease the cost of the networks by applying Pontryagin’s maximum principle. Finally, all of the theoretical results are confirmed by numerical simulation.

1. Introduction

1.1. Research Background

In recent years, wireless sensor networks (WSNs) have played a crucial role in the internet of things (IoT), and WSNs has been widely developed and applied in many fields, for example: industrial, military and healthcare applications. Benefiting from the recent breakthrough in WSNs, they have attracted increasingly attention [1,2]. WSNs encompass numerous sensor nodes and nodes connect with each other with the radio signal, but it is difficult to create a complex security protective structure. Due to the vulnerability, the network is always destroyed by malware and this leads to information leakage and even network paralysis. Thus, security is an essential problem in WSNs to ensure accuracy and efficiency. Scholars have done a lot of research on the security of WSNs [3,4,5,6,7].
WSNs suffer from the issue of the vulnerability of the network and energy limitation. Wireless rechargeable sensor networks (WRSNs) [8] are considered wireless power transfer (WPT) technology which greatly improve WSNs. The security of WSNs has been pushed to a new level by optimizing the charging scheduling and analyzing the results of denial of charge attacks [9,10]. It is popular to apply epidemic dynamics analysis in WRSNs attacked by malwares. The classical mathematical models have been researched by scholars, including susceptible, infected (SI), susceptible, infected, susceptible (SIS), susceptible, infected, removed (SIR), susceptible, exposed, infected, removed (SEIR), etc. However, the malware can be changed when the malware attacks the network [11], and the same is true for a virus mutation. Once the virus mutation happens in WRSNs, it is devastating, and the system of the security strategy is destroyed. However, it has seldom been researched by scholars before.
Thus, this paper includes virus mutation to establish a new model, which is very effective to reduce the spreading of the virus, reduce the harm of the virus mutation to WRSNs and greatly improve the security of WRSNs.

1.2. Related Work

In order to improve the security in WRSNs, the efficient scheme and energy efficient secured ring routing (E2SR2) protocol was first proposed by Shafie et al. and Bhushan et al. [12,13]. For the problem of physical node capture attacks, a response strategy was proposed by Bonaci et al. [6] to ensure security and stability of the network connectivity when the network is attacked. Considering detection and correction, Sing et al. [3] also proposed a selective forwarding attacks technology which increases the QOS and provides better data transmission.
Applying epidemic dynamics analysis to the study of WSNs, Kephart et al. [14,15] firstly proposed a model to study and predict the spread of the virus. Since then, many new models have been proposed to study the problem. Cao et al. [16] considered the recovered factor to construct the model of WSNs, and the authors patched the dissemination of security and immunized or healed the nodes to use the security strategy; Zheng et al. [17] considered the vaccination strategies with temporary immunity and a quarantined strategy to construct an SEIQR model; Han et al. [18] considered the system of the nonlinear stochastic system to construct an SEIR model. Liu et al. [19] considered the low-energy factor to construct a model of WRSNs, and the stability of the model was proved. According to Liu et al. [19,20,21,22], the system is a good combination of an epidemic dynamic model and wireless sensor network. Thus, the system skillfully blends the information of the WRSNs with biological characteristics. However, the all of above models do not consider the problem of virus mutation. Above, Table 1 lists the recent relevant studies.
As shown in Table 1, based on the virus mutation, scholars have done some studies. However, as we all know, the theories of the epidemic dynamics with virus mutation applied in WRSNs are rarely studied. The infected nodes infect other nodes to cause mutations because of coding errors, decryption problems, etc. [11], hence, the idea of virus mutation of artificial life was introduced, and a new way needs to be proposed to analyze and solve the security of the mutation virus model. Thus, in this paper, a new scheme is put forward of a model combined with virus mutation and is analyzed to solve the WRSN spreading problem of a mutated virus.

1.3. Contributions

In the previous studies, the charging behavior and mutation virus activity of wireless sensor networks has rarely been investigated. In this paper, the main goal is to introduce a model that considers the low-energy states and virus mutation. Combined with a practical application, the system can be applied when the stability of the system is proven and the other conditions are not taken into account, and the cost can be controlled by an optimal strategy. It is divided into five variable states. Our contributions are as follows:
  • An epidemic model suitable for WRSNs is established to describe the propagation process of malwares (the virus and mutated virus).
  • To analyze and calculate the basic reproductive numbers R 1 and R 2 . Then, considering the existence of equilibrium of the system, the local and global asymptotic stability is proved by adopting the characteristic equation and the Lyapunov principle. Numerical simulation is carried out to confirm the results.
  • By constructing the objective function and applying Pontryagin’s maximum principle, we can obtain the optimal control variable which satisfies the optimal control objective of the security problem.
The rest of the paper is as follows: In Section 2, the introduction and analysis of the model is presented; in Section 3, the local and global asymptotic stability is proved; in Section 4, the optimal strategy is presented; in Section 5, the numerical simulation verifies the proposed theoretical results; in Section 6, the relevant conclusion of the model is presented.

2. Epidemic Modeling

2.1. Model Analysis

In this section, the epidemic model of virus mutation in WRSNs is introduced. Sensors are divided into five sensor node states. The five sensor node states include:   S , I 1 , I 2 , L and D . The S state is susceptible to virus attacks.   I 1 is the infected node state,   I 2 is the mutant virus node state, L is the low-energy state of all nodes, D represents death nodes (the sensor nodes cannot work). N stands for the sum of all nodes, and it is a certain number. Thus, N ( t ) = S ( t ) + I 1 ( t ) + I 2 ( t ) + L ( t ) . The state transition diagram is shown in Figure 1.
As shown in Figure 1, A is the number of injected nodes; β 1 is the conversion rate of susceptible to infected; β 2 is the conversion rate of the sensor nodes becoming infected with the virus when the virus mutates; γ 1 is the rate of cleaning I 1 virus; γ 2 is the rate of cleaning I 2 virus; d is the conversion rate when sensors are unable to work; c is the rate of nodes going into a low-energy state; u is the rate of recovery from L energy, and during the low-energy state, I 1 and I 2 have removed the virus; ε is the rate of virus mutation. In this paper, when infected nodes and mutant virus nodes are converted to nodes of the low-energy state, a virus remover is created to eliminate the virus and mutant virus. According to the parameters and nodes of states, the dynamics equation of the model (1) is given as the following system (1):
{ d S ( t ) d t = A ( d + c ) S ( t ) ( β 1 S ( t ) γ 1 ) I 1 ( t ) ( β 2 S ( t ) + γ 2 ) I 2 ( t ) + u L ( t ) d I 1 ( t ) d t = β 1 S ( t ) I 1 ( t ) γ 1 I 1 ( t ) c I 1 ( t ) ε I 1 ( t ) d I 1   ( t )     d I 2 ( t ) d t = β 2 S ( t ) I 2 ( t ) γ 2 I 2 ( t ) c I 2 ( t ) d I 2 ( t ) + ε I 1 ( t )       d L ( t ) d t = c ( I 1 ( t ) + I 2 ( t ) + S ( t ) ) u L ( t ) d L ( t )
Obviously, adding Equation (1), we obtain:
d S ( t ) d t + d I 1 ( t ) d t + d I 2 ( t ) d t + d L ( t ) d t = A d ( S ( t ) + I 1   ( t ) + I 2 ( t ) + L ( t ) )
As N ( t ) = S ( t ) + I 1 ( t ) + I 2 ( t ) + L ( t ) , Equation (2) is given by:
d N ( t ) d t = A d N ( t )
Then, considering the limit of (3), we can obtain N ( t ) A d , so the feasible region for (1) is given by:
Ψ = { ( S , I 1 , I 2 , L ) 4 |   S ( t ) + I 1   ( t ) + I 2 ( t ) + L ( t ) A d }
Above, Ψ is a positively invariant.

2.2. Computing the Equilibrium Points and Basic Reproductive Number

In order to discuss the existence of equilibria, let the left-hand side of Equation (1) be zero. Obviously, there are three solutions that satisfy this situation. The disease-free equilibrium is ( S 0 , 0 , 0 , L 0 ) , the individual plant virus equilibrium is ( S ¯ , 0 , I ¯ 2 , L ¯ ) and the endemic equilibrium is ( S * , I 1 * , I 2 * , L * ) . It is noted that the basic reproductive number determines the existence of different equilibria. In this paper, there are two basic reproductive numbers ( R 1 and R 2 ), where R 1 = S 0 S * , R 2 = S 0 S ¯ . S 0 , S ¯ and S * are given as:
S 0 = A d + c u c u + d
S ¯ = γ 2 + c + d β 2
S * = γ 1 + c + ε + d β 1    
Thus, the basics reproductive numbers are given as:
  R 1 = β 1 S 0 γ 1 + c + ε + d R 2 = β 1 S 0 γ 2 + c + d
According to the existence of the equilibrium point, if R 1 1 , R 2 1 , the system (1) has only a disease-free equilibrium point E 0 = ( S 0 , 0 , 0 , L 0 ) given as:
L 0 = c S 0 u + d = A c c + d u c
If R 2 > 1 , the system has a disease-free point and an individual plant virus equilibrium point, and the individual plant virus equilibrium E ¯ = ( S ¯ , 0 , I ¯ 2 , L ¯ ) is given as:
L ¯ = c ( I ¯ 2 + S ¯ ) u + d      
I ¯ 2 = A ( d + c ) S ¯ + u L ¯ β 2 S ¯ γ 2 = S 0 ( R 2 1 ) R 2
If R 1 > 1 , R 1 > R 2 , the system has a disease-free equilibrium point and an endemic equilibrium point. The endemic equilibrium E * = ( S * , I 1 * , I 2 * , L * ) is given as:
I 1 * = S 0 β 2 ( R 1 1 ) ( R 1 R 2 ) R 1 ( β 2 ( R 1 R 2 ) + ε R 1 R 2 S 0 )
I 2 * = ε R 1 R 2 I 1 * S 0 β 2 ( R 1 1 )
L * = c ( I 1 * + I 2 * + S * ) u + d
Thus, we have the following Theorem 1:
Theorem 1.
If R 1 1 , R 2 1 , there is only one equilibrium E 0 ; if R 2 > 1 , there are two equilibriums including E 0 and E ¯ ; if R 1 > 1 , R 1 > R 2 , there are two equilibriums including E 0 and E * .

3. Dynamic Stability Analysis

In this section, the epidemic model of virus mutation in WRSNs is divided into local and global stability analysis.
System (1) is a nonlinear system, and we must turn it into a linear system so as to prove the local stability of this system. In order to reduce the calculated amount of the system, L in the first equation of the system (1) can be replaced with   N ( t ) ( S ( t ) + I 1 ( t ) + I 2 ( t ) ) . Thus, in system (1), the last equation is independent of the other 3 equations, and the linear equations can be given as the system (15):
{ d S d t = J 11 ( S S + ) + J 12 ( I 1 I 1 + ) + J 13 ( I 2 I 2 + )   d I 1 d t = J 21 ( S S + ) + J 22 ( I 1 I 1 + ) + J 23 ( I 2 I 2 + )   d I 2 d t = J 31 ( S S + ) + J 32 ( I 1 I 1 + ) + J 33 ( I 2 I 2 + )  
Then, the Jacobian matrix of (15) is given by:
J ( E + ) = ( ( d + c + u ) β 1 I 1 β 2 I 2 β 1 S + γ 1 u β 2 S + γ 2 u β 1 I 1 β 1 S ( γ 1 + c + ε + d ) 0 β 2 I 2 ε β 2 S ( γ 2 + c + d ) )

3.1. Local Stability

Theorem 2.
If R 1 1 and R 2 1 , the disease-free equilibrium is locally asymptotically stable.
Proof. 
According to the Lyapunov criterion [31], if all of the characteristic values are negative, the equilibrium is locally asymptotically stable. Thus, the Jacobian matrix is given by:
J ( E 0 ) = ( ( d + c + u ) β 1 S 0 + γ 1 u β 2 S 0 + γ 2 u 0 β 1 S 0 ( γ 1 + c + ε + d ) 0 0 ε β 2 S 0 ( γ 2 + c + d ) )
Hence, we have the following characteristic Equation (18):
f 1 ( λ ) = ( λ + ( d + c + u ) ) ( λ β 1 S 0 + γ 1 + c + ε + d ) ( λ β 2 S 0 + γ 2 + c + d )    
Obviously, if R 1 1 and R 2 1 , we have λ 1 = ( d + c + u ) , λ 2 = β 1 S 0 ( γ 1 + c + ε + d ) and λ 3 = β 2 S 0 ( γ 2 + c + d ) . All of the characteristic values are negative, so the disease-free equilibrium is locally asymptotically stable. □
Theorem 3.
If R 2 > 1 and R 2 > R 1 , the individual plant virus equilibrium is locally asymptotically stable.
Proof. 
The Jacobian matrix is given as:
J ( E ¯ ) = ( ( d + c + u ) β 2 I ¯ 2 β 1 S ¯ + γ 1 u β 2 S ¯ + γ 2 u 0 β 1 S ¯ ( γ 1 + c + ε + d ) 0 β 2 S ¯ 2 ε β 2 S ¯ ( γ 2 + c + d ) )
Hence, the characteristic equation is given by:
f 2 ( λ ) = ( λ + + d + c + u ) ( λ β 1 S ¯ + γ 1 + c + ε + d ) ( λ + β 1 I ¯ 1 )
Then, the characteristic value is λ 1 = ( d + c + u ) , λ 2 = β 1 S ¯ ( γ 1 + c + ε + d ) , λ 3 = β 2 I ¯ 2 . Obviously, if R 2 > R 1 , λ 2 is always a negative number. Hence, the individual plant virus equilibrium is locally asymptotically stable. □
Theorem 4.
If R 1 > 1 and R 1 > R 2 , the endemic equilibrium is locally asymptotically stable.
Proof. 
The Jacobian matrix is given by:
J ( E * ) = ( ( d + c + u ) β 1 I 1 * β 2 I 2 * β 1 S * + γ 1 u β 2 S * + γ 2 u β 1 I 1 * β 1 S * ( γ 1 + c + ε + d ) 0 β 2 I 2 * ε β 2 S * ( γ 2 + c + d ) )    
By the transformation of (21), we obtain
J ( E * ) = ( ( d + c + u ) ( d + c + u ) ( d + c + u ) β 1 I 1 * β 1 S * ( γ 1 + c + ε + d ) 0 β 2 I 2 * ε β 2 S * ( γ 2 + c + d ) )
We have the following characteristic equation:
f 3 ( λ ) = ( λ + d + c + u ) ( λ 2 ( ( β 2 S * ( γ 2 + c + d ) β 1 I 1 * ) λ + β 1 I 1 * ( γ 2 + d + c + ε β 2 S * ) )
Obviously, λ 1 = ( d + c + u ) , and the other characteristic values can be calculated by the following Equation (24):
X ( λ ) = λ 2 ( ( β 2 S * ( γ 2 + c + d ) β 1 I 1 * ) λ + β 1 I 1 * ( γ 2 + d + c + ε β 2 S * ) )
According to Vieta’s formulas [32], the zero solution of (24) is given by λ 2 + λ 3 = β 2 S * ( γ 2 + c + d ) β 1 I 1 * , λ 2 λ 3 = β 1 I 1 * ( γ 2 + c + d + ε β 2 S * ) , thus, if R 1 > 1 and R 1 > R 2 , the value of λ 2 and λ 3 can be proved to be λ 2 + λ 3 < 0 and λ 2 λ 3 > 0 . Hence, the endemic equilibrium is locally asymptotically stable. □

3.2. Global Stability

In this part, three Lyapunov functions are constructed to verify the global stability of the disease-free equilibrium E 0 , individual plant virus equilibrium E ¯ and endemic equilibrium E * .
Theorem 5.
If R 1 1 , R 2 1 and R 1 + ε γ 1 + c + ε + d < 1 , the disease-free equilibrium is globally stable.
Proof. 
The Lyapunov function is constructed as V ( I 1 , I 2 ) = I 1 + I 2 . We obtain
d V d t = d I 1 d t + d I 2 d t = ( β 1 S ( γ 1 + c + ε + d ) ) I 1 + ( β 2 S ( γ 2 + c + d ) ) I 2 + ε I 1 ( β 1 S 0 ( γ 1 + c + ε + d ) ) I 1 + ( β 2 S 0 ( γ 2 + c + d ) ) I 2 + ε I 1 = ( γ 1 + c + ε + d ) ( R 1 1 + ε γ 1 + c + ε + d ) I 1 + ( γ 2 + c + d ) ( R 2 1 ) I 2  
Obviously, if R 1 + ε γ 1 + c + ε + d < 1 and   R 2 < 1 , the disease-free equilibrium is globally stable. □
Theorem 6.
If R 2 > 1 , R 1 < 1 , the individual plant virus equilibrium is globally stable.
Proof. 
According to the second Equation (1), the number of infected nodes is I 0 at t 0 ( t > t 0 ) . We can obtain.
I 1 ( t ) = I 0 e ( β 1 S ( γ 1 + c + ε + d ) ) ( t t 0 )
When t , I 1 ( t ) will be stable at zero. Thus, the limit Equation (27) is given as:
{ d S ( t ) d t = A ( d + c + u ) S ( t ) ( β 2 S ( t ) + γ 2 + u ) I 2 ( t ) + u L ( t ) d I 2 ( t ) d t = β 2 S ( t ) I 2 ( t ) γ 2 I 2 ( t ) c I 2 ( t ) d I 2 ( t )
As I 1 ( t ) converges to a limit value zero, the Lyapunov function can be given as:
V ( S , I 2 ) = 1 2 ( S S ¯ ) 2 + β 2 S ¯ γ 2 + u β 2 ( I 2 I ¯ 2 I ¯ 2 l n I 2 I ¯ 2 )
The derivative of V ( S , I 2 ) of (28) is given by:
d V d t = ( S S ¯ ) d S d t + β 2 S ¯ γ 2 + u β 2 I 2 I ¯ 2 I 2 d I 2 d t = ( d + u + c + β 2 I 2 ) ( S S ¯ ) 2 ( β 2 S ¯ γ 2 + u ) ( I 2 I ¯ 2 ) ( S S ¯ ) + β 2 S ¯ γ 2 + u β 2 ( β 2 ( ( I 2 I ¯ 2 ) ( S S ¯ ) ) = ( d + u + c + β 2 I 2 ) ( S S ¯ ) 2
Obviously, if   R 2 > 1 , R 1 < 1 , the individual plant virus equilibrium is globally stable. □
Theorem 7.
If R 1 > 1 , R 1 > R 2 and ε = 0 , the endemic equilibrium is globally stable.
Proof. 
It is noted that the rate of infection is higher than the rate of virus mutation. If the rate of virus mutation is enough small and is equal to be zero, it is assumed that ε = 0 . The Equation (1) is given as:
d S ( t ) d t = A ( d + c ) S ( t ) ( β 1 S ( t ) γ 1 ) I 1 ( t ) ( β 2 S ( t ) + γ 2 ) I 2 ( t ) + u L ( t ) d I 1 ( t ) d t = β 1 S ( t ) I 1 ( t ) γ 1 I 1 ( t ) c I 1 ( t ) d I 1   ( t ) d I 2 ( t ) d t = β 2 S ( t ) I 2 ( t ) γ 2 I 2 ( t ) c I 2 ( t ) d I 2 ( t )   d L ( t ) d t = c ( I 1 ( t ) + I 2 ( t ) + S ( t ) ) u L ( t ) d L ( t )
The Lyapunov function V ( S , I 1 , I 2 ) is given as follows:
V ( S , I 1 , I 2 ) = 1 2 ( S S * ) 2 + c + d β 1 ( I 1 I 1 * I 1 * l n I 1 I 1 * ) + c + d β 2 ( I 2 I 2 * I 2 * l n I 2 I 2 * )
Obviously, V ( S , I 1 , I 2 ) 0 . Then, the derivative of V ( S , I 1 , I 2 ) of the solution of (31) is given by:
d V d t = ( d + c + u + β 1 I 1 + β 2 I 2 ) ( S S * ) 2 + ( β 1 S * ( γ 1 + c + d ) ) ( I 1 I 1 * ) 2 + ( β 2 S * ( γ 1 + c + d ) ) ( I 2 I 2 * ) 2 = ( d + c + u + β 1 I 1 + β 2 I 2 ) ( S S * ) 2 + ( β 2 S * ( γ 1 + c + d ) ) ( I 2 I 2 * ) 2  
If R 1 > R 2 , the endemic equilibrium is globally stable if ε = 0 . Theorem 6 is proved. □

4. Optimal Strategy

In this subsection, the cost of cleaning the virus and the cost of charging low-energy nodes are considered. For this purpose, the control U ( · ) is introduced as the objective function, γ 1 ( 0 < γ 1 < 1 ) is the rate of cleaning I 1 virus; γ 2 ( 0 < γ 2 < 1 ) is the rate of cleaning I 2 virus and u ( 0 < u < 1 ) is the rate of recovery energy. Q I 1 is the treatment cost coefficient of I 1 , Q I 2 is the treatment cost coefficient of I 2 and Q L is the charging cost coefficient of low-energy nodes. Thus, the optimal control problem is to minimize the objective function as follows:
U ( γ 1 , γ 2 , u ) = m i n { I 1 ( t f ) + I 2 ( t f ) + L ( t f ) + 0 t f ( Q I 1 ( γ 1 I 1 ) 2 + Q I 2 ( γ 2 I 2 ) 2 + Q L ( u L ) 2 ) d t }
It is clear that the feasible region of the control variable set U of the system is [0, 1]. Hence, the optimization goal is to diminish I 1 and I 2 during the time interval [ 0 , t f ] . According to the Pontryagin maximum principle, the Hamiltonian function is constructed as follows:
H ( X , U , α , t ) = Q I 1 γ 1 2 I 1 2 + Q I 2 γ 2 2 I 2 2 + Q L u 2 L 2 + α 1 d S d t + α 2 d I 1 d t + α 3 d I 2 d t + α 4 d L d t
X is the state variable, U is the control variable set, α i ( i = 1 , , 2 , 3 , 4 ) is the adjoint variables. The adjoint variables are determined by solving the following equations.
{ d α 1 d t = H S = α 1 ( t ) ( d + c + β 1 I 1 + β 2 I 2 ) ( α 2 ( t ) β 1 I 1 + α 3 ( t ) β 2 I 2 + α 4 ( t ) c )   d α 2 d t = H I 1 = 2 Q I 1 γ 1 2 I 1 ( α 1 ( t ) ( γ 1 β 1 S ) + α 2 ( t ) ( β 1 S ( γ 1 + c + ε + d ) ) + α 3 ( t ) ε + α 4 ( t ) d α 3 d t = 2 Q I 2 γ 2 2 I 2 ( α 1 ( t ) ( γ 2 β 2 S ) + α 3 ( t ) ( β 2 S ( γ 2 + c + d ) ) + α 4 ( t ) c   d α 4 d t = H L = 2 Q L u 2 L ( α 1 ( t ) u α 4 ( t ) ( u + d ) )
At the moment, the transversality condition of optimal control satisfies the following equation:
α 1 ( t f ) = 0 ;   α 2 ( t f ) = 1 ;   α 3 ( t f ) = 1 ;   α 4 ( t ) = 1
According to differential equations of the covariant variable and transversal condition of optimal control, the optimization condition is given by:
H γ 1 = 2 Q I 1 γ 1 I 1 2 + α 1 ( t ) I 1 α 2 ( t ) I 1 H γ 2 = 2 Q I 2 γ 2 I 2 2 + α 1 ( t ) I 2 α 3 ( t ) I 2 H u = 2 Q L u L 2 + α 1 ( t ) L α 4 ( t ) L    
Finally, Pontryagin’s maximum principle is applied to obtain the optimal control variable set. The result is given as:
{ γ 1 = m i n { ( max ( 0 , α 2 ( t ) α 1 ( t ) 2 Q I 1 γ 1 I 1 ) , 1 ) } γ 2 = m i n { ( max ( 0 , α 3 ( t ) α 1 ( t ) 2 Q I 2 γ 2 I 2 ) , 1 ) } u = m i n { ( max ( 0 , α 4 ( t ) α 1 ( t ) 2 Q L u L ) , 1 ) }

5. Numerical Simulation

In this section, all of the theoretical analyses are proved and the numerical results of the system (1) are presented to support the analytic results. The result of the numerical simulation is given as follows.

5.1. Stability Simulation

The parameters are given so that A = 10 ,   d = 0.1 ,   c = 0.5 ,   u = 0.2 ,   ε = 0.2 . It can be seen that rates of β 1 and γ 1 have significant impacts on the basic reproduction number R 1 , shown in Figure 2a. With the increasing of β 1 , R 1 increases rapidly, and with the increasing of γ 1 , R 1 increases slowly. In the same way, the rates of β 2 and γ 2 also have significant impacts on the basic reproduction number R 2 , shown in Figure 2b. With the increasing of β 2 , R 2 increases rapidly, and with the increasing of γ 2 , R 2 increases slowly.
The relationship between R 1 , R 2 and equilibrium is shown in Figure 3. The parameters of the system (1) are set as A = 10 ,   c = 0.5 ,   u = 0.2 . It is noted that the individual plant virus equilibrium I ¯ 2 is determined by d and the basic reproduction number R 2 . The rate of death d has significant impacts on the I ¯ 2 if d is small enough, as shown in Figure 3a. It can be seen that the relationship between the rate of virus mutation ε and I 2 * is a linear, as shown in Figure 3b. The relationships among R 1 , R 2 and I 1 , I 2 are shown in Figure 3c,d when the system (1) satisfies the conditions of the existence of endemic equilibrium ( R 1 > 1 , R 1 > R 2 ) .
If R1 < 1 and R2 < 1, the parameters are set as β1 = 0.003, β2 = 0.002, γ1 = 0.2, γ2 = 0.4, c = 0.5, u = 0.2, d = 0.1, ε = 0.2 and A = 10. Hence, the basic reproductive numbers are calculated as R1 = 0.1125 < 1 and R2 = 0.075 < 1. N = S + I1 + I2 + L = 100. The disease-free equilibrium E0 (S0, 0, 0, L0) can been calculated as S0 = 37.5, L0 = 62.5, I1 = 0, I2 = 0, as shown in Figure 4.
As shown in Figure 4a–c, according to Theorem 2, the initial values S(0), I1(0), I2(0) and L(0) do not have any influence on system stability and the system (1) will be stable at the disease-free equilibrium E0 eventually.
If the parameters satisfy R2 > 1 and R2 > R1, β1 = 0.003, β2 = 0.04, γ1 = 0.2, γ2 = 0.4, c = 0.5, u = 0.2, d = 0.1, ε = 0.2, A = 10, we have R1 = 0.1125 < 1 and R2 = 1.5 > 1 > R1. The individual plant virus equilibrium is calculated to be E ¯ ( S ¯ , 0 , I ¯ 2 , L ¯ ) , S ¯ = 25 ,   I ¯ 2 = 12 . 5 ,   L ¯ = 62 . 5 , as shown in Figure 5.
According to Theorem 3, it is noted that the system (1) will be stable at the individual plant virus equilibrium eventually. From Figure 5a–c, the initial values do not have any influence on system stability and the system (1) will be stable at the individual plant virus equilibrium E ¯ eventually.
If the parameters satisfy   R 1 > 1 and   R 1 > R 2 , β 1 = 0.03 , β 2 = 0.02 ,   γ 1 = 0.2 ,   γ 2 = 0.4 , c = 0.3 , u = 0.2 ,   d = 0.1 ,   ε = 0.2 ,   A = 10 . With the endemic equilibrium E * ( S * , I 1 * , I 2 * , L * ) , we can obtain S * = 26.7, I 1 * = 13.3 , I 2 * , = 10 , L * = 50 . The simulation diagram is shown in Figure 6.
Obviously, as shown in Figure 6a–c, it is can be seen that   R 1 = 1.125 > 1 and R 1 > R 2 = 0.75 , and the initial values do not have any influence on system stability and the system (1) will be stable at the endemic equilibrium eventually.
Briefly, the relationship between the system and parameters is shown as a simulation diagram. The rate of ε has a great influence on the stable solution of the system, and other parameters have a great influence on the basic reproduction number to affect the equilibrium solution. Thus, a good system can be constructed by setting reasonable parameters.

5.2. Optimal Strategy Simulation

As for the optimal control strategy, the control variable set U ( γ 1 , γ 2 , u ) is calculated by Pontryagin’s maximum principle, and the numerical result is calculated by implementing a fourth order Runge–Kutta method [33]. Firstly, for the system (1), the nodes’ number of each state can be obtained by initializing control variable values, the time interval is [ 0 , t f ] and the transversality condition Equation (35) is satisfied. It is noted that the numerical result of adjoint variables can be calculated by the system (34). Then, by updating U ( γ 1 , γ 2 , u ) iteratively, the control cost converges to a limited value.
The parameter values are given as β 1 = 0.04 , β 2 = 0.03 , c = 0.3 , d = 0.1 , ε = 0.1 , Q I 1 = 1 , Q I 2 = 2 and Q L = 1 . The control variable set U ( γ 1 , γ 2 , u ) is γ 1 = 0.3 ,   γ 2 = 0.3 and u = 0.3 . The simulation diagram of the cost value without optimization control is shown in Figure 7a. At the end of time t f = 200 , the cost J is 52,244, and the diagram of the equilibrium point is shown in Figure 7b.
As shown in Figure 8 considering the optimal control, the rate of cleaning I 1 virus (i.e., γ 1 ) increases to 1 gradually; the rate of cleaning I 2 virus (i.e., γ 2 ) is increased to 0.0226 and the rate of recovery energy (i.e., u ) increases to 0.0067.
It is noted that the cost under the optimal strategy is greatly reduced, as shown in Figure 9, which is equal to 86.86 at the terminal time t f , shown in Figure 9a. As shown in Figure 9b, the values of I 1 and I 2 are smaller than that without optimization control. It is obvious that the performance under the optimal strategy is superior to that without optimization control.

6. Conclusions and Future Work

In this paper, a novel epidemic model in WRSNs is proposed, including susceptible, infected, variant and low-energy states. The model considers rechargeable sensors and the virus mutation factor. By analyzing the basic reproductive number, the existence of equilibriums is first proved, and the local stability and global asymptotic stability are proved by the Lyapunov stability criterion. Meanwhile, the influence of the rate of virus mutation and the number of mutated nodes on the endemic equilibrium is revealed. In addition, an optimal strategy is proposed to minimize the numbers of the infected nodes and the virus mutation nodes, the cost of cleaning the virus and the cost of charging low-energy nodes. Finally, the numerical simulation validates the theoretical results.
Future research will attempt to consider the time delay to move closer to practical application. For WRSNs, it is a key topic of future work to consider the time delay of the virus mutation and the time delay of charging at the same time. Additionally, the model can become closer to reality when the time delay is proposed.

Author Contributions

Conceptualization, G.L., Z.P. and J.L.; methodology, G.L. and Z.P.; software, G.L. and Z.P.; validation, G.L. and Z.P.; formal analysis, G.L. and Z.P.; investigation, G.L., Z.P. and Z.L.; writing—original draft preparation, Z.P.; writing—review and editing, G.L., Z.P. and L.C. All authors have read and agreed to the published version of the manuscript.

Funding

The authors acknowledge funding received from the following science foundations: The National Natural Science Foundation of China (61403089, 51975136, 51575116, U1601204, 52075109), the 2020 Department of Education of Guangdong Province Innovative and Strong School Project (Natural Sciences)—Young Innovators Project (Natural Sciences) under Grant 2020KQNCX054, National Key Research and Development Program of China (2018YFB200501), the Science and Technology Innovative Research Team Program in Higher Educational Universities of Guangdong Province (2017KCXTD025), the Innovative Academic Team Project of Guangdong Education System (1201610013), the Special Research Projects in the Key Fields of Guangdong Higher Educational Universities (2019KZDZX1009), the Science and Technology Research Project of Guangdong Province (2017A010102014,2016A010102022), and the Science and Technology Research Project of Guangzhou (201707010293), and are all appreciated for supporting this work.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lenin, R.B.; Ramaswamy, S. Performance analysis of wireless sensor networks using queuing networks. Ann. Oper. Res. 2015, 233, 237–261. [Google Scholar] [CrossRef]
  2. Rashid, B.; Rehmani, M.H. Applications of wireless sensor networks for urban areas: A survey. J. Netw. Comput. Appl. 2016, 60, 192–219. [Google Scholar] [CrossRef]
  3. Singh, S.; Saini, H.S. Learning-Based Security Technique for Selective Forwarding Attack in Clustered WSN. Wirel. Pers. Commun. 2021, 118, 7789–7814. [Google Scholar] [CrossRef]
  4. Yu, D.; Kang, J.; Dong, J. Service Attack Improvement in Wireless Sensor Network Based on Machine Learning. Microprocess. Microsyst. 2020, 80, 103637. [Google Scholar] [CrossRef]
  5. Shi, L.; Liu, Q.; Shao, J.; Cheng, Y. Distributed Localization in Wireless Sensor Networks under Denial-of-Service Attacks. J. Artic. 2020, 5, 493–498. [Google Scholar]
  6. Bonaci, T.; Bushnell, L.; Poovendran, R. Node capture attacks in wireless sensor networks: A system theoretic approach. In Proceedings of the 49th IEEE Conference on Decision & Control, Atlanta, GA, USA, 15–17 December 2010. [Google Scholar]
  7. Rasheed, A.; Mahapatra, R.N. The three-tier security scheme in wireless sensor networks with mobile sinks. Trans. Parallel Distrib. Syst. IEEE 2012, 23, 958–965. [Google Scholar] [CrossRef]
  8. Yang, Y.Y.; Wang, C. Wireless Rechargeable Sensor Networks; Springer: Berlin/Heidelberg, Germany, 2015. [Google Scholar]
  9. Lin, C.; Shang, Z.; Du, W.; Ren, J.K.; Wang, L.; Wu, G.W. CoDoC: A Novel Attack for Wireless Rechargeable Sensor Networks through Denial of Charge. In Proceedings of the IEEE INFOCOM 2019, Paris, France, 29 April–2 May 2019. [Google Scholar]
  10. He, T.; Chin, K.W.; Soh, S. On using wireless power transfer to increase the max flow of rechargeable wireless sensor networks. In Proceedings of the IEEE ISSNIP, Singapore, 7–9 April 2015; pp. 1–6. [Google Scholar]
  11. Sun, J.; Dong, M.I.; Wang, T.; Li, D.Q. Research on the Mutation of Computer Virus. Sci. Technol. Eng. 2006, 2006, 1926–1928. [Google Scholar]
  12. Shafie, A.E.; Niyato, D.; Al-Dhahir, N. Security of Rechargeable Energy-Harvesting Transmitters in Wireless Networks. IEEE Wireless Commun. Lett. 2016, 5, 384–387. [Google Scholar] [CrossRef] [Green Version]
  13. Bhushan, B.; Sahoo, G. E2SR2: An acknowledgement-based mobile sink routing protocol with rechargeable sensors for wireless sensor networks. Wirel. Netw. 2019, 25, 2697–2721. [Google Scholar] [CrossRef]
  14. Kephart, J.O.; White, S.R. Directed-Graph Epidemiological Models of Computer Viruses. In Proceedings of the IEEE Computer Society Symposium on Research in Security & Privacy, Oakland, CA, USA, 4–6 May 1992; pp. 71–102. [Google Scholar]
  15. Kephart, J.O.; White, S.R. Measuring and Modeling Computer Virus Prevalence. In Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, 23–26 May 1993; pp. 2–15. [Google Scholar]
  16. Cao, Y.L.; Wang, X.M.; He, Z.B. Optimal Security Strategy for Malware Propagation in Mobile Wireless Sensor Networks. Acta Electron. Sin. 2016, 44, 1851. [Google Scholar]
  17. Zheng, Y.; Zhu, J.; Lai, C. A SEIQR Model considering the Effects of Different Quarantined Rates on Worm Propagation in Mobile Internet. Math. Probl. Eng. 2020, 2020, 16. [Google Scholar] [CrossRef]
  18. Han, X.F.; Li, F.; Meng, X. Dynamics Analysis of a Nonlinear Stochastic SEIR Epidemic system with Varying Population Size. Entropy 2018, 20, 376. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  19. Liu, G.; Peng, B.; Zhong, X. Epidemic Analysis of Wireless Rechargeable Sensor Networks Based on an Attack–Defense Game Model. Sensors 2021, 21, 594. [Google Scholar] [CrossRef] [PubMed]
  20. Liu, G.; Peng, B.; Zhong, X. Attack-Defense Game between Malicious Programs and Energy-Harvesting Wireless Sensor Networks Based on Epidemic Modeling. Complexity 2020, 2020, 13. [Google Scholar]
  21. Liu, G.; Peng, B.; Zhong, X. A novel epidemic model for wireless rechargeable sensor network security. Sensors 2020, 21, 123. [Google Scholar] [CrossRef]
  22. Liu, G.; Peng, B.; Zhong, X. Differential Games of Rechargeable Wireless Sensor Networks against Malicious Programs Based on SILRD Propagation Model. Complexity 2020, 2020, 5686413. [Google Scholar] [CrossRef]
  23. Yang, Y.; Li, J. Global Analysis of an Epidemic Model with Virus Auto Variation. J. Biomath. 2008, 23, 101–106. [Google Scholar]
  24. Li, D.M.; Li, C.C.; Xu, Y.J. The Stability of a Class of SEIR Epidemic Model with Virus Mutate. J. Harbin Univ. Sci. Technol. 2014, 19, 106–109. [Google Scholar]
  25. Gao, J.; Zhang, T. Analysis on an SEIR Epidemic Model with Logistic Death Rate of Virus Mutation. J. Math. Res. Appl. 2019, 39, 43–52. [Google Scholar]
  26. Tong, Y.H.; Li, L.P. The Time Delay Epidemic Model with Spontaneous Virus Variation. J. Shanxi Datong Univ. 2013, 29, 1674-0874. [Google Scholar]
  27. Li, D.M.; Fu, Y.L.; Gao, T.Q.; Li, C.C. Stability Analysis of a Class of SIR Epidemic Model with Delayed Spontaneous Variation of Virus. J. Harbin Univ. Sci. Technol. 2020, 25, 170–176. [Google Scholar]
  28. Xu, D.G.; Xu, X.Y.; Yang, C.H.; Gui, W.H. Global Stability of a Variation Epidemic Spreading Model on Complex Networks. Math. Probl. Eng. Theory Methods Appl. 2015, 2015, 365049. [Google Scholar] [CrossRef] [Green Version]
  29. Cai, L.; Xiang, J.; Li, X.; Lashari, A.A. A two-strain epidemic model with mutant strain and vaccination. J. Appl. Math. Comput. 2012, 40, 125–142. [Google Scholar] [CrossRef]
  30. Xu, D.; Xu, X.; Xie, Y.; Yang, C. Optimal control of an SIVRS epidemic spreading model with virus variation based on complex networks. Commun. Nonlinear Sci. Numer. Simul. 2017, 48, 200–210. [Google Scholar] [CrossRef]
  31. Lyapunov, A.M.; Walker, J.A. The General Problem of the Stability of Motion. J. Appl. Mech. 1994, 55, 531–534. [Google Scholar] [CrossRef] [Green Version]
  32. Wu, X. On zeros of polynomial and vector solutions of associated polynomial system from Vieta theorem. Appl. Numer. Math. 2003, 44, 415–423. [Google Scholar] [CrossRef]
  33. Fu, M.H.; Liang, H.L. An improved precise Runge-Kutta integration. Acta Scientiarum Naturalium Universitatis Sunyatseni 2009, 5, 1–5. [Google Scholar]
Figure 1. State transition diagram of the model.
Figure 1. State transition diagram of the model.
Entropy 23 00572 g001
Figure 2. Relation of parameters and the basic reproduction number: (a) Relationship between R 1 and β 1 , γ 1 ; (b) relationship between R 2 and β 2 , γ 2
Figure 2. Relation of parameters and the basic reproduction number: (a) Relationship between R 1 and β 1 , γ 1 ; (b) relationship between R 2 and β 2 , γ 2
Entropy 23 00572 g002
Figure 3. Relationship between I 1 , I 2 , the basic reproductive number: (a) Relationship between I ¯ 2 and d ,   R 2 ; (b) relationship between I 2 * and ε ; (c) relationship between I 1 and R 1 , R 2 ; (d) relationship between I 2 and R 1 , R 2
Figure 3. Relationship between I 1 , I 2 , the basic reproductive number: (a) Relationship between I ¯ 2 and d ,   R 2 ; (b) relationship between I 2 * and ε ; (c) relationship between I 1 and R 1 , R 2 ; (d) relationship between I 2 and R 1 , R 2
Entropy 23 00572 g003
Figure 4. Diagram of the disease-free equilibrium: (a) Stable value of disease-free equilibrium; (b) the stability of changes to the initial value; (c) three-dimensional diagram of stability of changes to the initial value.
Figure 4. Diagram of the disease-free equilibrium: (a) Stable value of disease-free equilibrium; (b) the stability of changes to the initial value; (c) three-dimensional diagram of stability of changes to the initial value.
Entropy 23 00572 g004
Figure 5. The individual plant virus equilibrium: (a) Stable value of individual plant virus equilibrium; (b) the stability of changes to the initial value; (c) three-dimensional diagram of stability of changes to the initial value.
Figure 5. The individual plant virus equilibrium: (a) Stable value of individual plant virus equilibrium; (b) the stability of changes to the initial value; (c) three-dimensional diagram of stability of changes to the initial value.
Entropy 23 00572 g005
Figure 6. Diagram of the endemic equilibrium: (a) Stable value of endemic equilibrium; (b) the stability of changes to the initial value; (c) three-dimensional diagram of stability of changes to the initial value.
Figure 6. Diagram of the endemic equilibrium: (a) Stable value of endemic equilibrium; (b) the stability of changes to the initial value; (c) three-dimensional diagram of stability of changes to the initial value.
Entropy 23 00572 g006
Figure 7. Diagram of cost and node equilibrium without optimal control: (a) Cost of the nodes without optimal control; (b) the state of equilibrium without optimal control.
Figure 7. Diagram of cost and node equilibrium without optimal control: (a) Cost of the nodes without optimal control; (b) the state of equilibrium without optimal control.
Entropy 23 00572 g007
Figure 8. Proportion of control variable set.
Figure 8. Proportion of control variable set.
Entropy 23 00572 g008
Figure 9. Diagram of the result of optimal control: (a) Cost of the nodes of the optimal control; (b) the state of equilibrium of the optimal control.
Figure 9. Diagram of the result of optimal control: (a) Cost of the nodes of the optimal control; (b) the state of equilibrium of the optimal control.
Entropy 23 00572 g009
Table 1. Research on epidemic models which consider virus mutation.
Table 1. Research on epidemic models which consider virus mutation.
AuthorsResearch FieldModelContent
Yang et al. [23]Dynamic analysis of the virus mutation modelSISProof of the local and global stability of the system
Dong-Mei et al. [24]Model analysis of disease viruses mutated in the process of transmissionSEIRProof of the local and global stability of the system that considers the exposed
Gao et al. [25]An SEIR epidemic model analysis with logistic death rate of virus mutationSEIRProof of the local and global stability of the system that considers the logistic death rate of virus mutation
Tong et al. [26]Dynamic model analysis with delay of the virus mutationSISProof of the local and global stability of the system that considers the time delay
Dong-Mei et al. [27]SIR model analysis with delay of the virus mutationSIRProof of the local and global stability of the system that considers recovered factor and the time delay
De-gang et al. [28]A variation epidemic model’s propagation and analysis in complex networksSIVRProof of the local and global stability of the system
Cai et al. [29]Model analysis of spread of the pathogen with mutant strain and vaccinationSIVRProof of the local and global stability and analysis of the Hopf bifurcation of the system
Xu et al. [30]Optimal control of the SIVRS epidemic spreading model with virus mutation in complex networksSIVRSConsiders the optimal strategy and calculates the optimal control results of the system
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Liu, G.; Peng, Z.; Liang, Z.; Li, J.; Cheng, L. Dynamics Analysis of a Wireless Rechargeable Sensor Network for Virus Mutation Spreading. Entropy 2021, 23, 572. https://doi.org/10.3390/e23050572

AMA Style

Liu G, Peng Z, Liang Z, Li J, Cheng L. Dynamics Analysis of a Wireless Rechargeable Sensor Network for Virus Mutation Spreading. Entropy. 2021; 23(5):572. https://doi.org/10.3390/e23050572

Chicago/Turabian Style

Liu, Guiyun, Zhimin Peng, Zhongwei Liang, Junqiang Li, and Lefeng Cheng. 2021. "Dynamics Analysis of a Wireless Rechargeable Sensor Network for Virus Mutation Spreading" Entropy 23, no. 5: 572. https://doi.org/10.3390/e23050572

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop