Next Article in Journal
Secure Grasping Detection of Objects in Stacked Scenes Based on Single-Frame RGB Images
Previous Article in Journal
Various-Order Low-Pass Filter with the Electronic Change of Its Approximation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Game Model for Analyzing Wireless Sensor Networks of 5G Environment Based on Adaptive Equilibrium Optimizer Algorithm

College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(19), 8055; https://doi.org/10.3390/s23198055
Submission received: 25 June 2023 / Revised: 6 September 2023 / Accepted: 22 September 2023 / Published: 24 September 2023
(This article belongs to the Section Sensor Networks)

Abstract

:
Wireless sensors networks (WSNs) play an important role in life. With the development of 5G, its security issues have also raised concerns. Therefore, it is an important topic to study the offense and defense confrontation in WSNs. A complete information static game model is established to analyze the offense and defense confrontation problem of WSNs in 5G. An adaptive equilibrium optimizer algorithm (AEO) based on parameter adaptive strategy is proposed, which can jump out of the local optimal solution better. Experiments show that the optimization ability of AEO outperforms other algorithms on at least 80 % of the 23 classical test functions of CEC. The convergence speed of AEO is better in the early stage of population iteration. The optimal offensive and defensive strategy under different offense and defense resources through simulation experiments is analyzed. The conclusion shows that when the offensive resources are large, the offender takes an indiscriminate attack. When the defense resources are small, the defender should defend the most important elements, and when the defense resources are large, the defender should allocate the same resources to defend each element to obtain the maximum benefit. This paper provides new solution ideas for the security problems under the offense and defense game in WSNs.

1. Introduction

The networks of 5th Generation Mobile Communication Technology (5G) have developed rapidly in recent years. Due to its characteristics, such as high speed, low latency, and large scale [1,2], 5G network technology is widely used in all aspects of life, such as healthcare, agriculture, and communication [3,4,5,6]. Wireless sensor networks (WSNs) are the smallest units of networks, and they can support large-scale deployments, high reliability, and high mobility [7]. WSNs are more broadly applied in the 5G network environment [8,9,10]. WSNs are increasingly important in the field of communication technology [11]. For example, Internet of Things (IoT) applications of WSNs over 5G infrastructure addressed by Martinez successfully reduce the latency of exchanging information between facilities [12]. Dhinakaran creates a hybrid clustering and routing strategy for data aggregation in a 5G WSN. This strategy makes the network lifetime longer [13].
Wireless communication has become an integral part of the mobile network. As the demand for 5G mobile wireless networks grows [14], the number of devices and service types is rising. Therefore, the security threat landscape of WSNs in 5G has also grown significantly [15,16]. Rishita discusses the security issues and challenges in WSNs and elaborates on the attack behaviors that WSNs are vulnerable to at the network layer [17]. Currently, many hackers adopt the Advanced Persistent Threat (APT) offense model [18,19]. Denial-of-service offense mode (DOS) in computer network broadband and connectivity offense [20] attack the target nodes and information transmission paths in the target network. In the face of various offense patterns of hackers, it is particularly important to maintain the security of WSNs.
Many scholars apply the offense and defense game model to network security and some information transmission resource allocation problems [21,22,23,24]. Nowadays, many scholars use game theory to solve a series of security problems in WSNs. Maryam uses a Bayesian game model to make a secure routing protocol, which can improve the detection accuracy of an intrusion detection system (IDS) in WSNs [25]. Sudha combines software-defined networks with Stackelberg games to achieve the optimal data offloading problem in 5G [26]. Zhou analyzes the micro-mechanism of malware propagation in WSNs from the perspective of game theory, which can be of guiding significance for inhibiting the spread of malware [27]. The combination of game theory methods and WSNs can better address a series of security problems existing in WSNs. However, with the development of large-scale and high-performance 5G, the development and extension of WSNs have diversified. The existing attack methods and scale of offense and defense are no longer sufficient for the environment in which they are located. The offense and defense strategies in WSNs under the 5G environment are no longer in a singular form but rather align with the characteristics of large-scale deployments in 5G. Regarding offense and defense of WSNs in 5G, most of the attack methods are to attack the target node while ignoring the attack on the information transmission link. The problem of how to analyze the large-scale offense and defense confrontation behaviors of WSNs in 5G has become an important issue to be studied. Therefore, the main contributions of this paper are as follows.
(1)
A network topology diagram based on WSNs is constructed. The nodes and the transmission links in the WSN are abstracted as nodes and edges in an undirected graph. The scale of the offense and defense confrontation is expanded, and the adversarial game is carried out on the graph structure.
(2)
A complete information static game model is established for the offense and defense problem in WSNs. And the existence of Nash equilibrium in the model is proved. Therefore, offense and defense game behaviors of WSNs in the 5G environment can be analyzed more clearly and intuitively.
(3)
An adaptive strategy is applied to an equilibrium optimizer algorithm (EO), and an adaptive equilibrium optimizer (AEO) algorithm is proposed to improve the optimization ability of EO. And AEO is applied to the problem of solving Nash equilibrium under mixed strategies.
(4)
The behavior process and strategy choices of both offenders and defenders under different attack and defense resources are discussed and analyzed.
The paper is structured as follows. Section 2 discusses the related work in this paper. Section 3 establishes the offense and defense game model with respect to the established network topology graph. Section 4 proposes the AEO to solve the Nash equilibrium under mixed strategies in this game model. Section 5 conducts simulation experiments to derive the mixed strategy adopted by both offenders and defenders under different resources. Section 6 gives conclusions.

2. Related Work

This section introduces the application and development of game theory in network security and the ideas and steps of the EO.

2.1. Application of Game Theory to Network Security

Game theory describes a multi-player decision-making scenario as a game. Each player chooses the action that gives him or her the best payoff while predicting the rational actions of the other players [28]. Regarding the time-series nature of behavior, game theory is subdivided into two categories, namely static games and dynamic games. In terms of whether there is cooperation between participants, games can be divided into cooperative games and non-cooperative games. For the problem of cyberspace security, many scholars have used game theory to solve it and have achieved certain results [29]. Afrand studies the offense and defense game problem in WSN intrusion detection during 2004–2005. He establishes a non-cooperative game model for offenders and defenders and constructs the payoff function and Nash equilibrium in this game. The chance of detecting an intrusion can be significantly improved through the game [30,31,32]. Han applies a non-cooperative static information game model to intrusion modeling in WSNs, which improves prediction accuracy and reduces the energy consumption of IDS [33]. Shamik applies a non-cooperative imperfect information game to the distributed sensor network power control problem. He obtains the maximum payoff of the model by analyzing the Nash equilibrium [34]. Liu combines intelligent computing with Stackelberg game to analyze the attack and defense adversarial behavior under a graph structure network [35]. Yang proposes a WSN offense and defense game model for multiple crimes. The game process of WSN under three modes of external offense, internal offense, and hybrid offense, respectively, gives practical guidance for the design of an intrusion detection system in WSNs [36]. Deyu proposes a novel routing protocol based on evolutionary game theory to improve energy efficiency and longevity of WSNs [37]. Yenumula uses a zero-sum game approach to detection to build a framework and detect malicious nodes of nodes in the forward data path to improve the defense of WSNs [38]. It can be seen that many scholars have applied game theory to WSN security. Game theory is also applied for the offense and defense problem of WSNs in this paper. Intelligent calculation is used to solve and analyze the Nash equilibrium problem in the established game theory model to improve the solution accuracy.

2.2. Equilibrium Optimizer Algorithm

Heuristic algorithms are proposed relative to optimization algorithms. Scholars have proposed heuristic algorithms such as Bat Algorithm (BA) [39], Differential Evolution algorithm (DE) [40], Particle Swarm optimization algorithm (PSO) [41], and Whale Optimization Algorithm (WOA) [42,43]. These algorithms have improved the ability to search for optimal solutions. EO is a physics-based heuristic optimization algorithm for dynamic source and sink models proposed by Afshin in 2020, which has the advantages of good optimization and fast convergence [44]. The heuristic algorithm has also been improved by adding many strategies. Zheng presents a Levy flight black edge regeneration black algorithm (LEBH) to speed up the convergence rate of BH [45]. Zheng applies the compact strategy to the snake optimization algorithm (SO). The compact snake optimization algorithm (cSO) is proposed, which effectively reduces the use of memory resources [46]. Wang proposes the adaptive Bat algorithm (ABA), which can dynamically and adaptively adjust the flight speed and direction, significantly improving the global convergence accuracy of the BA [47]. Zhan applies the adaptive optimization strategy to the PSO (APSO). The problem of slow convergence of PSO and ease of falling into the local optimal land was effectively solved. [48]. Ahmed and Qin also apply adaptive strategy to WOA (ANWOA) and DE (ADE), respectively, and the convergence speed and optimization accuracy of the original algorithm can be effectively improved [49,50]. The adaptive strategy can dynamically adjust the parameters of the algorithm and change the direction and speed of particle motion in the algorithm so that it can easily solve the problem that the algorithm is prone to local optimization and improve the accuracy of the global optimization. Thus, the adaptive strategy is applied to EO to improve the optimization ability and convergence speed of EO.
The main of inspiration for the EO is the simple mixing of well-defined dynamic mass balance phenomena on the control volume. The first-order ordinary differential equation for the mass balance equation is given by Equation (1) [44].
V d C d t = Q C e q Q C + G
V d C d t is the rate of mass change in the control volume, and C is the concentration inside the control volume. When V d C d t is equal to zero, the solution reaches a steady state. Q is the volumetric flow rate into and out of the control volume, and C e q represents the concentration at an equilibrium state. G is the mass generation rate inside the control volume. By solving for Equation (1) [44], through the arrangement and combination of Equation (1) [44], d C d t can be converted into a function of Q V . λ = Q V is introduced into the formula as the flow rate, and C can be expressed in the form of another Equation (2) [44]. F is the coefficient of the exponential term, which can be calculated by Equation (3) [44].
C = C e q + C 0 C e q F + 1 F G λ V
F = e x p λ t t 0
λ is the mobility rate, and C 0 is the initial concentration of the control volume at the initial time t 0 . The three parts of Equation (2) [44] can represent the three update rules in the inspired EO. The first is the equilibrium concentration, and the second is related to the concentration difference and represents the search mechanism. The third represents the part of the optimal solution. Applying Equation (2) [44] to the EO, C represents the solution obtained in the current iteration, and C e q represents the optimal solution in the current generation. Thus, the EO continuously updates the positions of the particles through iterative search and searches for the optimal solution through a combination of local search and global search. The principle and process of the EO are shown below.
The initial concentration is constructed based on the number and dimensional of the particle swarm. The particle swarm is initialized as in Equation (4) [44].
C i 0 = C m i n + r a n d i C m a x C m i n , i = 1 , 2 , , n
C i 0 represents the initial concentration of the ith particle, and it also represents the initial position of the ith particle. C m a x and C m i n denote the minimum and maximum values of the range. n represents the number of particle groups, and r a n d i is a random number in the range of [0, 1].
In each iteration, each particle randomly selects a particle in the equilibrium state pool with the same probability to update its concentration. The equilibrium state pool is defined by the following Equation (5) [44].
C e q , p o o l = C e q 1 , C e q 2 , C e q 3 , C e q 4 , C e q 5 )
C e q 1 , C e q 2 , C e q 3 , and C e q 4 are the best four solutions obtained throughout the current iteration. C e q 5 represents the average position of the four solutions.
To optimize the search ability, two parameters a 1 and a 2 are introduced to improve Equation (3) [44] to better balance the local and global search. The improved equation is given in Equation(6) [44], where t is defined as a function of iteration (Iter) and it decreases as the number of iterations increases, as shown in Equation (7) [44].
F = a 1 s i g n r 0.5 e λ t 1
t = 1 I t e r M a x I t e r a 2 I t e r M a x I t e r
r and λ are random variables in the range of [0, 1]. The  a 1 in Equation (6) [44] represents the control exploration capability. The larger a 1 becomes, the greater the exploration capacity and the weaker the exploitation capacity. The  a 2 in Equation (7) [44] represents the managed exploration capacity. The larger the a 2 , the greater the exploitation capacity and the weaker the exploration capacity. s i g n r 0.5 affects the direction of exploration and development.
Generation rate (G) is one of the most important terms in EO, providing precise solutions by improving the development phase. G is described as a first-order exponential decay process, which is used in many engineering applications, as shown in Equation (8) [44].
G = G 0 e k t t 0
G 0 is the initial value and k is the attenuation constant. To better adapt to the iteration of the algorithm, the exponential term of Equation (8) [44] is adopted. The generation speed control parameter G · G P is defined as Equation (9) [44]. G is the mass generation rate, defined as Equation (10) [44]. Combined with Equation (8) [44], G is defined in EO as shown in Equation (11) [44], which can provide an exact solution by improving the development phase.
G · G P = 0.5 r 1 r 2 G P 0 r 2 G P
G 0 = G · G P C e q λ C
G = G 0 F
G P = 0.5 gives an ideal balance of local and global search capabilities.
In summary, the rules for updating the particle positions in the EO are given in Equation (12) [44].
C = C e q + C C e q . F + G λ V 1 F
Equation (12) [44] is divided into three terms, the first term being the equilibrium concentration. The second and third terms indicate the change in concentration. The second term can use the concentration difference to search globally to find the best solution. The third part can make the solution more precise when the solution is found. This provides better global and local search based on the difference of symbols of the second and third terms.
Algorithm 1 is the pseudo-code for the EO.
Algorithm 1 Equilibrium Optimizer
Require: ParticleNumber, MaxIter, C m a x , C m i n
Ensure: Best Position
1:
Initialize the position of the particle swarm using Equation (4)
2:
Construct the fitness function F i t
3:
Initialization parameters a 1 = 2 , a 2 = 1 , G P = 0.5
4:
for iter = 1: MaxIter do
5:
    Find the location and concentration of the top 4 best adapted particles C e q 1 , C e q 2 , C e q 3 , C e q 4 .
6:
      C e q 5 = C e q 1 + C e q 2 + C e q 3 + C e q 4 / 4
7:
      C e q , p o o l = C e q 1 , C e q 2 , C e q 3 , C e q 4 , C e q 5
8:
      t = 1 I t e r M a x I t e r a 2 I t e r M a x I t e r
9:
     for i = 1: ParticleNumber do
10:
            Randomly select a candidate C e q from C e q , p o o l
11:
            Generate random vectors λ and r
12:
            Use Equations (6)–(11) to calculate F, G · C P , G 0 and G.
13:
            Update C i = C e q + C C e q . F + G λ V 1 F
14:
      end for
15:
      iter = iter+1
16:
end for
17:
Best Position = C e q 1

3. Offense and Defense Game Model

An abstract model of the topology graph of WSNs is presented in this section. The elements under offense and its importance are defined and calculated. In addition, the complete information static game model is presented. And the development of offense and defense strategies and payoff functions to provide rules for the offense and defense game is shown in this section.

3.1. Network Topology Diagram Model

A simple undirected graph G V , E can be seen as an abstraction of a WSN, where V = V 1 , V 2 , , V N v is a set of nodes. N v = V is the total number of nodes. Each V i represents a sensor node in a WSN. E V × V = E 1 , E 2 , , E N e is a set of edges, where N e is the total number of edges. And each E i represents a transmission link through which data can be transmitted between two sensor nodes. The mapping abstraction is shown in the following Figure 1.
A a i j N e × N e is the diagonal matrix of graph G, and a i j represents the presence or absence of link connectivity between node V i and V j . If nodes V i and V j have a message transmission link and assume that the number of packets transmitted, received, and forwarded in the link is S i j , and S i j = S j i , then the link is assigned a weight a i j = a j i = S i j = S j i . Otherwise, a i j = a j i = 0 . Therefore, the definition of diagonal matrix A is defined in this paper as follows in Equation (13).
a i j = a j i = S i j = S j i Node i is connected to node j 0 Node i is unconnected to node j
Since the total number of packets transmitted, received, and forwarded by each node is not equal, the importance of each node in a WSN is different. I V i represents the importance of node V i . The definition is shown in Equation (14).
I V i = a i 1 + a i 2 + + a i N v
Similarly, each edge has a different level of importance. G m a x is the maximum connectivity of the undirected graph G. G E i is the maximum connectivity of the graph after removing an edge E i . Assume that E i connects node V i with node V j . Then I E i is the importance of that E i edge, defined as in Equation (15). The calculation of link importance is divided into two parts. The first part is the proportion of the number of packets transmitted, forwarded, and received by the edge to the total number of packets transmitted, forwarded, and received by the whole network. The second part is the size of the change of the graph connectivity after removing the link. The larger it is, the more important the link is.
I E i = a i j + a j i i = 1 N v j = i N v a i j + G m a x G E i G m a x

3.2. Offensive–Defensive Strategies

According to the model established in this paper, offensive and defensive strategies are formulated, as shown in the following four points.
(1)
Both nodes and edges can be attacked in this model. The costs of attacking and defending each node and edge are the same.
(2)
The game is a complete information static game. Both offenders and defenders have full information about the network topology graph.
(3)
The game is played for one round and there is only one player in each role of the game, and both players act simultaneously.
(4)
In each round of the offense and defense game, each node and edge can only be attacked once. When an offense on a node is successful, both the node and its connected edges are deleted. When an offense on an edge is successful, only that edge is deleted.
Q = N e + N v is the total number of offensive and defensive resources. Q A represents the total number of resources that the offender can use for offense. Q D represents the total number of resources that the defender can use for defense. Q A and Q D are less than or equal to Q.
S A and S D represent the set of strategies for offense and defense, respectively. S A and S D represent the respective number of strategies that are calculated by permuting C Q Q A and C Q Q D . The calculation is shown in Equation (16).
M = S A = C Q Q A N = S D = C Q Q D
Define one of the offensive strategies as s a = [ s a 1 , s a 2 , , s a Q A ] , and one of the defensive strategies as s d = [ s d 1 , s d 2 , , s d Q D ] . Assuming that node V i is attacked, then s a i = 1 ; otherwise, s a i = 0 . Similarly, if node V i is defended, s d i = 1 ; otherwise, s d i = 0 . For this, A V is a set to represent the state of each point being attacked. As shown in Equation (17), A V i = 1 represents that the i-th node is successfully attacked; otherwise, A V i = 0 .
A V i = 1 , s a i = 1 & s d i = 0 A V i = 0 , s a i = 1 & s d i = 1 s a i = 0
Whether the edge is successfully attacked is also the same as the above method of the node. When the game is complete, the network topology diagram at this point is defined as G , and the maximum connectivity of this network topology diagram at this time is G m a x .

3.3. Payoff Function

The payoff function is used to calculate the payoff of players under different strategies. U A and U D are the set of revenue of the offender and the defender under different offense and defense strategies. U A s a , s d denotes the gain under the strategy s a of the offender and the strategy s d of the defender. The equation for calculating U A s a , s d is Equation (18).
U A s a , s d = i = 1 | N e | A V i × I V i i = 1 | N V | I V i + G m a x G m a x G m a x
The gain of the offenders comes from two parts. The first part is the gain from attacking each node. The second part is the change in the maximum connectivity of the graph after completing all offenses. This game model is a zero-sum model of a complete information static game, so the gain of the defender can be calculated by Equation (19). The revenue matrix is shown in Table 1.
U D = U A

3.4. Offense and Defense Game Model

A model of the offense and defense game G M = A , D , S A , S D , U A , U D , which is a complete information zero-sum static game model. The goal of the offender is to maximize his own gain by attacking in the case of Q A resources. It can be shown by Equation (20).
max U A s a , s d s . t s a S A i = 1 | N v | s a i = Q A s a i = 0 , 1
The goal of the defender is to minimize the gain of the offender by protecting Q D resources in the network. It can be shown by Equation (21).
min U A s a , s d s . t s d S D j = 1 | N v | s d j = Q D s d j = 0 , 1
The game is played between the offender and defender, and a strategic equilibrium is reached. Therefore, there is a Nash equilibrium under pure strategy and a Nash equilibrium under mixed strategy in this game model. S A * , S D * are assumed to be optimal offense and defense strategies under the offense and defense game. The Nash equilibrium in this game model must satisfy Equation (22).
U A S A * , S D * U A S A i , S D * i | S A | , S A i S A U D S A * , S D * U A S A * , S D j j | S D | , S D j S D

4. Game Solution

This section solves the Nash equilibrium for the offense and defense game model proposed in this paper. The solution steps are proposed in terms of pure and mixed strategy Nash equilibrium. The EO is improved from three aspects, the AEO is proposed, the effectiveness of the proposed algorithm is verified, and the AEO is used to solve the Nash equilibrium.

4.1. Pure Strategy Nash Equilibrium

The min–max theorem is applied to the solution of Nash equilibrium under pure strategies [51]. Strategies under Nash equilibrium make it unprofitable for any participant to deviate unilaterally from their equilibrium strategy. Assuming that the strategy S A * , S D * satisfies Equation (23), it is a Nash equilibrium under a set of pure strategies in the game.
min 1 i M max 1 j N U A i j = max 1 i M min 1 j N U A i j = U A i * j *
The idea of the theory is to find the optimal strategy when in a bad situation. When one player in the game offers a choice of strategies, the other player will choose the strategy that maximizes their gain. And they give feedback on the strategy to the first player. The first player also compares whether the choice is optimal for this strategy. If the combination of strategies is optimal for both players, a Nash equilibrium is reached.

4.2. Mixed Strategy Nash Equilibrium

A mixed strategy assigns a probability to each pure strategy. P A = P A 1 , P A 2 , , P A M is assumed to the probability to the offender taking each strategy. P D = P D 1 , P D 2 , , P D N is the probability that the defender takes each strategy. For offenders and defenders adopting mixed strategies, the sum of the probabilities of their choosing different strategies satisfies Equation (24).
i = 1 M P A i = j = 1 N P D j = 1
There are two ways to solve the Nash equilibrium for a mixed strategy, the first being that both sides wish to maximize their benefits under the mixed strategy. Equation (25) is the expected value of the benefits that both sides of the offense and defense game wish to achieve. The second way is that the optimal mixed strategies of both sides of the game will give the opponents equal expected benefits under the different strategies they choose, as shown in Equation (26).
U A = m a x i = 1 M j = 1 N P A i · P D j · U A S A i , S D j U D = m a x i = 1 M j = 1 N P A i · P D j · U D S A i , S D j s . t . i = 1 | N v | s a i = Q A j = 1 | N v | s d j = Q D i = 1 M P A i = 1 j = 1 N P D j = 1
i = 1 M p A i · U D S A i , S D 1 = i = 1 M p A i · U D S A i , S D 2 = = i = 1 M p A i · U D S A i , S D N j = 1 N p D j · U A S A 1 , S D j = j = 1 N p D j · U A S A 2 , S D j = = j = 1 N p D j · U A S A M , S D j
If the first approach is taken, changing the strategy of either side of its Nash equilibrium strategy will not increase its profit, so this paper chooses the second approach to solve the Nash equilibrium strategy under the mixed strategy.
Since the probabilities of the adopted strategies are different and the combinations of strategies are varied, the game is consistent with the characteristics of a large scale under a 5G environment. Since the heuristic algorithm has the advantages of fast search and strong merit finding ability [52], intelligent computing is applied to the problem of solving Nash equilibrium under mixed strategy in this game model.
As can be seen from the introduction of Section 2, intelligent computing has the characteristics of high precision and fast speed. It is applied to the model established in this paper. It can solve the mixed strategy Nash equilibrium quickly, accurately, and simply. EO, proposed in 2020, will not quickly converge to an equilibrium state, and it has intermittent balance. Compared with mature algorithms such as PSO, the balance pool used during the period is more easily implemented and more easily jumps out of the local optimum. The calculation is small, and the algorithm effect is good. Therefore, the EO is chosen to solve the problem. To make the result more accurate, applying an adaptive strategy to the algorithm can improve the accuracy and convergence speed, so the AEO is proposed and applied to solve the Nash equilibrium in this section.
The symbols involved in the model and their meanings are listed in Abbreviations.

4.3. The Solution of Nash Equilibrium by AEO

In this paper, the AEO is proposed and implemented by improving the EO from three aspects: state partitioning, parameter adaption, and perturbed particle learning.
In the section on state partitioning, the AEO is explored on 23 functions commonly used in CEC for particle distribution characteristics [48]. Some iterative processes are shown in Figure 2. In Figure 2, each plot axis is the horizontal and vertical coordinate points of the two-dimensional interface where the particles are located. And it makes it more intuitive to see the trend of particle positions. The process of particle exploration is shown in Figure 2a. The process of a particle converging toward the best particle is shown in Figure 2b. The process of forming a local convergence is shown in Figure 2c. The process of the best particle jumping out of the current best region is shown in Figure 2d. And the process of exploiting and guiding the particle to converge to the best region again is shown in Figure 2e,f.
For a better description of the state of the whole particle swarm, the states are divided into four types, namely S 1 (Exploration), S 2 (Exploitation), S 3 (Convergence), and S 4 (Jumping). First, the average distance from each particle to the other particles is calculated by Equation (27).
d i = 1 N P 1 × j = 1 , j i N P k = 1 D X i k X j k 2
where N P is the number of particles and D is the dimension of the problem. Subsequently, the maximum distance is d m a x , and the minimum distance is d m i n . The best distance d b e s t among them is found and the evolution factor e is calculated from Equation (28).
e = d b e s t d m i n d m a x d m i n
Since the motion laws and state distributions of particles in EO and PSO are similar, the fuzzy affiliation degree state distribution in the APSO [48] is used here to classify the population states in AEO. The graph of the particle swarm state distribution with evolution factor is shown in Figure 3.
When e is in the affiliation of two states, the state is influenced by the previous state at this time. When e is in the interval of S 1 and S 2 states, if the previous state is S 1 or S 4 , then the state is S1 at this time; if the previous state is S 2 or S 3 , then the state is S 2 at this time. This change sequence is S 1 S 2 S 3 S 4 S 1 .
In the section of parameter adaption, the EO contains three parameters a 1 , a 2 , and G P . a 1 represents the parameter that controls the exploration capability. a 2 represents the parameter that manages the exploitation capability. G P plays the role of balancing the exploration and exploitation capabilities.
In this algorithm, e is relatively large in the exploitation state and relatively small in the converged state. The variation of GP with e can be calculated by Equation (29). Good robustness of G P in the range of 0.25 , 0.75 is proved in the EO. So the variation range of G P in Equation (29) is restricted to 0.3 , 0.7 .
G P = 1 1 + 7 3 e 1.7 f 0.3 , 0.7 , e 0 , 1
The mechanism of adaptive change with state for the two parameters a 1 and a 2 that control the exploration capacity and the exploitation capacity is shown in Table 2.
1. Increasing a 1 and decreasing a 2 can help the particles explore their best positions individually without clustering around the local optimal particles.
2. Slightly increasing a 1 slightly decreasing a 2 . Increasing a 1 can optimize around the individual optimum, and the optimal solution at this time is likely to be the local optimum rather than the global optimum. Thus, decreasing a 2 can prevent the particle swarm from falling into the premature convergence problem of the local optimum.
3. A slight increase in a 1 and an increase in a 2 allow the particles to converge quickly to the current global optimum position. However, a 1 should be increased slightly to prevent premature convergence to the wrong local optimum position.
4. Decreasing a 1 and increasing a 2 can help particles jump from one optimal position to another global optimal position and lead other particles to move together towards this position.
Figure 4 represents the variation curves of parameters a 1 , a 2 with state.
In order to prevent the current best particle from being in the local optimal solution, a perturbed particle learning strategy is applied to EO. Interference particle learning is designed to act on the global best particle to help it jump out of the local optimum position at convergence.
Add a Gaussian perturbation to some dimension of the current global optimal particle, as shown in Equation (30). If the particle forms a more optimal solution after the disturbance, other particles can be guided to converge towards it.
C e q b e s t d = C e q b e s t d + X m a x d X m i n d · G a u s s i a n μ , σ 2
C e q b e s t d denotes the ith dimension. G a u s s i a n μ , σ 2 denotes a Gaussian-distributed random number with mean μ of 0 and standard deviation of σ . σ is the elite learning rate, which is calculated as shown in Equation (31).
σ = σ m a x σ m a x σ m i n · i t e r M a x I t e r
The steps of AEO are shown in Algorithm 2.
Algorithm 2 Adaptive Equilibrium Optimizer
Require: ParticleNumber, MaxIter, C m a x , C m i n
Ensure: Best Position
1:
Initialize the position of the particle swarm using Equation (4)
2:
Construct the fitness function F i t
3:
Initialization parameters a 1 = 2 , a 2 = 1 , G P = 0.5
4:
for iter = 1: MaxIter do
5:
     Find the location and concentration of the top 4 best adapted particles C e q 1 , C e q 2 , C e q 3 , C e q 4 .
6:
      C e q 5 = C e q 1 + C e q 2 + C e q 3 + C e q 4 / 4
7:
      C e q , p o o l = C e q 1 , C e q 2 , C e q 3 , C e q 4 , C e q 5
8:
      t = 1 I t e r M a x I t e r a 2 I t e r M a x I t e r
9:
     for i = 1: ParticleNumber do
10:
          Random selection of a candidate C e q from C e q , p o o l (state balance pool)
11:
          Generate random vectors of λ , r
12:
          Use Equations (6)–(11) to calculate F, G · C P , G 0 and G.
13:
          if  S t a t u s = S 4  then
14:
              Update C i = C e q 1 + C C e q 1 . F + G λ V 1 F
15:
          else
16:
              Update C i = C e q + C C e q . F + G λ V 1 F
17:
          end if
18:
          Use Equation (27) to calculate the d i of the current particle.
19:
          Use Equation (28) to calculate the evolution factor e.
20:
          Classify the particle swarm evolutionary state according to Figure 3.
21:
          The parameters a 1 , a 2 , G P are adjusted according to Table 2 and the evolutionary state of Equation (29).
22:
          if  S t a t u s = S 3   then
23:
               C e q 1 d = C e q 1 d + X m a x d X m i n d · G a u s s i a n μ , σ 2
24:
            Compare the magnitude of the fitness value of the particle after adding Gaussian perturbation with the current global optimal particle, and update the current global optimal particle position.
25:
          end if
26:
    end for
27:
    iter = iter+1
28:
end for
29:
Best Position = C e q 1

5. Simulation Experiments and Comparative Analysis

In this section, the offense and defense game simulation experiments are conducted on the established resultant topology diagram of the WSN. The AEO is applied to solve the Nash equilibrium under mixed strategies. The results are analyzed regarding offense and defense strategy selection under different offensive and defensive resources.

5.1. Simulation Experiment Model

The abstract method of the WSN topology diagram shown in Figure 1 in Section 3.1 is applied to the simulation experiment. Combined with the actual structure of the WSN, the simulation experiment diagram with eight WSN nodes and eight communication links is constructed. In this section, a simple WSN topology graph is conducted to study the Nash equilibrium solution problem under mixed strategies in the offense and defense game model. Figure 5 shows the network topology of the WSN.
There are eight nodes and eight edges, the offensive elements of this game model are 16. The importance ranking of nodes and the importance ranking of edges are calculated by Equation (14) and Equation (26), respectively. Table 3 and Table 4 show the importance ranking of nodes and edges, respectively. By calculating the importance of nodes and edges, the results are better analyzed. The change of offense and defense probability to important nodes and links can be analyzed, so as to better analyze the changes in offensive and defensive behavior.
When the offensive and defensive resources are assumed to be 3, 6, 7, 11, and 14, the strategies for the offender are C 16 3 = 560 , C 16 7 = 11 , 440 , C 16 6 = 8008 , C 16 11 = 4368 , and C 16 14 = 120 , respectively. Therefore, the scale of the offense and defense games in this simulated network topology diagram can meet the large-scale characteristics of the 5G environment.

5.2. Simulation Experiment Tools and Parameters

The simulation experiment environment is shown in Table 5. According to the network topology that Figure 5 established, the offensive and defensive resources are changed to conduct simulation experiments. The offensive resources represent the number of nodes and edges that can be attacked. The defensive resources represent the number of nodes and edges that can be attacked. The specific experimental parameters and scale are shown in Table 6. (Note: NOR represents the number of offensive resources, and NOS represents the number of offensive strategies. NDR represents the number of defensive resources, and NDS represents the number of defensive strategies. SOD represents the scale of offense and defense.)
As can be seen from Table 6, the control variable method is adopted to control a single variable, such as keeping the offensive resources unchanged and changing the defensive resources, so as to carry out the simulation confrontation of the offensive and defensive game. By solving the Nash equilibrium, the change of the defense and offense behavior of both the offensive and defensive parties to the nodes and edges in the established model is analyzed. And Table 6 shows that the scale of the offensive and defensive game has reached millions or even tens of millions of levels, which can meet the large-scale characteristics of the 5G environment.

5.3. Solving Nash Equilibrium

The performance of AEO is compared with EO, BA, DE, PSO, and WOA among 23 functions commonly used in CEC; these 23 functions are described in the literature [41]. And the comparison results are shown in Table 7. > indicates that the current algorithm outperforms the AEO with this function. < indicates that the AEO outperforms the current algorithm with this function. = indicates that the AEO and the current algorithm have the same performance under this function. The last row of the table counts the number of functions whose performance of AEO is equal or superior to that of other algorithms.
Among the 23 sets of commonly measured functions of CEC, f 1 f 7 are single-peaked functions, f 8 f 13 are multi-peaked functions, and f 14 f 23 are mixed functions. As can be seen from Table 7, the AEO has improved algorithm performance compared with other algorithms, especially compared with the PSO, BA, and WOA.
For functions f 1 f 5 , f 7 , f 9 f 11 , f 13 f 14 , f 16 f 19 , f 21 , the AEO outperforms or equals the other algorithms. For the remaining functions, the AEO may under-perform compared to one or several algorithms, but the difference is not significant. It can be seen from Table 7 that among the 23 test functions, AEO performs well in more than 80 % of the functions compared with the original algorithm and other algorithms.
The convergence speed of these algorithms is compared. The first 50 iterations of particles in some functions are selected for image visualization, as shown in Figure 6. It can be seen from the Figure 6 that the convergence speed of AEO has obvious advantages in the early stage of iteration. It can find the optimal solution more quickly. This is because the Gaussian disturbances and parameter optimization strategy are applied to AEO. This is because the three adaptive strategies help particles quickly jump out of local optimal solutions to find the optimal solution in the global scope. The perturbed particle learning can further optimize the global optimal solution found by the parameter adaptation strategy. Thus, the accuracy of AEO is improved.
Dimension D 1 is the number of strategies that offender A can take and D 2 is the number of strategies that defender D can take. Therefore D 1 = M , D 2 = N . In this model, Equation (26) can be used as f i t n e s s A and f i t n e s s D function set by applying the AEO solution.
It can be seen from Equation (26) that the smaller the values of f i t n e s s A and f i t n e s s D , the more stable the returns. The Nash equilibrium strategy solved by AEO is applied to the offensive and defensive games, the network topology graph is attacked 10 times randomly, and the gain of the defender is calculated. Under the same offensive and defensive resources, the gain of the defender changes with the times of offenses, as shown in Table 8.
The model is a zero-sum game model, and the gain of offenders is consistent with the gain of defenders. Table 8 shows that the gain of the defender is stable under 10 random offenses, and its mean square deviation is 0.005 . Therefore, it is feasible to use AEO to solve the Nash equilibrium under mixed strategies.

5.4. Offensive Strategy Selection under Different Defense Strategies

The offensive resources are set to 6 and the defensive resources are set to 3, 7, 11, and 14 for the offense and defense game. After solving the Nash equilibrium in this game model using the AEO, the results are visualized and mapped to the probabilities of attacking and defending elements, as shown in Figure 7.
As can be seen from Figure 7a, when the defensive resources are small, the offender will attack the communication link with a high probability. The nodes E 4 , E 5 , E 6 , and E 1 with a high probability are attacked, and they are low in terms of link importance. The defender will defend the node part with a high probability, especially the node of higher importance, such as V 2 , V 3 , V 5 . When the defense resources increase slightly, the defense direction of the defender changes to defend the important nodes and edges. The offender starts to attack the important edges and the unimportant nodes, and the probability of attacking the nodes can be seen in Figure 7c,d. When the defensive resources continue to increase, the defender will defend each element with equal probability. For the offender, the probability of attacking the communication link will gradually increase. The probability of attacking an important link, such as E 5 , E 7 , will be increased to achieve the Nash equilibrium of returns.

5.5. Defensive Strategy Selection under Different Offense Strategies

The defensive resources are set as 6, and the offensive resources of the offense and defense game are set to 3, 7, 11, and 14. After solving the Nash equilibrium in this game model with the AEO, the results are visualized and is mapped to the probabilities of attacking and defending elements, as shown in Figure 8.
The defensive resources are fixed and the offensive resources are relatively small; the results can be seen in Figure 8a. The offender mainly attacks the important edges. The defender mainly defends the nodes in the network and defends the important nodes with maximum probability. The results when the offensive resources increase slightly can be seen in Figure 8b. The offense direction of offenders changes to attack the edges and the unimportant nodes, such as V 1 , V 4 , V 6 , V 8 . But the probability of attacking the edges is greater than the probability of attacking the nodes when the defense is still focused on the important node part. The results of Figure 8c,d show that when the attack resources continue to increase, the defender defends important nodes, such as V 2 , V 3 , V 5 , and communication links to win the game. The attack probability of the offender on the unimportant node V 1 and V 4 , V 6 increases and tends to be consistent. Finally, the offender will attack the communication link and the unimportant node with the same probability.

6. Conclusions

A complete information static game model is proposed to solve the offense and defense confrontation problem in 5G WSNs. Due to the large number of combat strategies under the mixed strategy combination, the AEO is proposed to solves the Nash equilibrium in the game. The AEO and other heuristic algorithms are tested in CEC, in 23 test functions, to compare their performances. The experimental results show that AEO has better optimization ability and high precision. Under different offensive and defensive resources, the behavior analysis and strategy selection of the two players in the game are simulated. The experimental results show that the offender will attack the important elements when the offensive resources are small. When the offensive resources are greater, the offender will attack the link indiscriminately. When the defense resources are small, the defender will defend the elements which are of high importance with high probability. When there are more defense resources, the defender should allocate the same resources to defend every element. The research in this paper can provide a certain theoretical research and analysis method for resource allocation and defense behavior in the offense and defense game of 5G WSNs.

Author Contributions

Conceptualization, W.Z. and F.M.; methodology, F.M. and N.L.; software, S.H.; investigation, F.M. and N.L.; writing—original draft preparation, W.Z. and F.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key Project of National Natural Science Foundation of China (No.61932005).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
Gthe topology diagram of WSN
G m a x Maximum connectivity of topology diagram G
Vthe set of nodes
Ethe set of edges
Athe diagonal matrix of graph G
a i j information transfer link situation of nodes V i to V j
S i j the number of packets transmitted, received and forwarded between node V i to V j
I V i the important of the node V i
I E i the important of the edge E i
Qthe total number of offensive and defensive resources
Q A number of resources that the offender can offense
Q D number of resources that the defender can defend
S A the set of strategies for offense
S D the set of strategies for defense
Mthe number of offensive strategies
Nthe number of defensive strategies
A V i the success of attack on node V i
U A the set of revenue of the offender
U D the set of revenue of the defender
S A * the optimal offense strategies under the offense and defense game
S D * the optimal defense strategies under the offense and defense game
P A the probability of the offender taking each strategy
P D the probability of the defender taking each strategy
U A the revenue of the offender under mixed strategy
U D the revenue of the defender under mixed strategy
G the topology diagram of WSN after offense-defense game
G m a x Maximum connectivity of topology diagram G

References

  1. Agiwal, M.; Roy, A.; Saxena, N. Next Generation 5G Wireless Networks: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2016, 18, 1617–1655. [Google Scholar] [CrossRef]
  2. Patcharamaneepakorn, P.; Wang, C.; Fu, Y.; Aggoune, E.H.M.; Alwakeel, M.M.; Tao, X.; Ge, X. Quadrature Space-Frequency Index Modulation for Energy-Efficient 5G Wireless Communication Systems. IEEE Trans. Commun. 2018, 66, 3050–3064. [Google Scholar] [CrossRef]
  3. Akpakwu, G.A.; Silva, B.J.; Hancke, G.P.; Abu-Mahfouz, A.M. A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges. IEEE Access 2018, 6, 3619–3647. [Google Scholar] [CrossRef]
  4. Li, B.; Fei, Z.; Zhang, Y. UAV Communications for 5G and Beyond: Recent Advances and Future Trends. IEEE Internet Things J. 2019, 6, 2241–2263. [Google Scholar] [CrossRef]
  5. Tang, Y.; Dananjayan, S.; Hou, C.; Guo, Q.; Luo, S.; He, Y. A survey on the 5G network and its impact on agriculture: Challenges and opportunities. Comput. Electron. Agric. 2021, 180, 105895. [Google Scholar] [CrossRef]
  6. Ahad, A.; Tahir, M.; Sheikh, M.A.; Ahmed, K.I.; Mughees, A.; Numani, A. Technologies Trend towards 5G Network for Smart Health-Care Using IoT: A Review. Sensors 2020, 20, 4047. [Google Scholar] [CrossRef]
  7. Dash, L.; Khuntia, M. Energy efficient techniques for 5G mobile networks in WSN: A Survey. In Proceedings of the 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), Sydney, Australia, 13–14 March 2020; pp. 1–5. [Google Scholar] [CrossRef]
  8. Windha, M.V.; Iskandar; Hendrawan; Arifianto, M.S. Wireless Sensor Network on 5G Network. In Proceedings of the 2018 4th International Conference on Wireless and Telematics (ICWT), Bali, Indonesia, 12–13 July 2018; pp. 1–5. [Google Scholar] [CrossRef]
  9. Jacob, S.; Menon, V.G.; KS, F.S.; Mahapatra, B.; Mukherjee, M. Intelligent vehicle collision avoidance system using 5G-enabled drone swarms. In Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond 2020, London, UK, 25 September 2020; pp. 91–96. [Google Scholar] [CrossRef]
  10. Wong, A.M.K.; Hsu, C.L.; Le, T.V.; Hsieh, M.C.; Lin, T.W. Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks. Sensors 2020, 20, 2511. [Google Scholar] [CrossRef]
  11. Sun, A.; Zhu, K.; Du, J.; Cao, H. PSO-Based K-means Algorithm for Clustering Routing in 5G WSN Networks. In Proceedings of the 2021 IEEE Globecom Workshops (GC Wkshps), Madrid, Spain, 7–11 December 2021; pp. 1–6. [Google Scholar] [CrossRef]
  12. Martinez, S.H.; Parra, O.J.S.; Daza, B.S.R. IoT application of WSN on 5G infrastructure. In Proceedings of the 2017 International Symposium on Networks, Computers and Communications (ISNCC), Marrakech, Morocco, 16–18 May 2017; pp. 1–6. [Google Scholar] [CrossRef]
  13. Dhinakaran, K.; Elantamilan, D.; Gnanavel, R.; Vinod, D.; Nalini, M.K. A Hybrid Algorithm to Perform Dynamic Node Energy and Link Stability through invoking Data from 5G Wireless Sensor based Network. In Proceedings of the 2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI), Chennai, India, 28–29 January 2022; pp. 1–8. [Google Scholar] [CrossRef]
  14. Sui, T.; Tao, X.; Xia, S.; Chen, H.; Wu, H.; Zhang, X.; Chen, K. A Real-Time Hidden Anomaly Detection of Correlated Data in Wireless Networks. IEEE Access 2020, 8, 60990–60999. [Google Scholar] [CrossRef]
  15. Ahmad, I.; Shahabuddin, S.; Kumar, T.; Okwuibe, J.; Gurtov, A.V.; Ylianttila, M. Security for 5G and Beyond. IEEE Commun. Surv. Tutor. 2019, 21, 3682–3722. [Google Scholar] [CrossRef]
  16. Dash, L.; Khuntia, M. A Survey on Various Security Issues for 5G Mobile Networks in WSN. Intell. Cloud Comput. 2020, 194, 669–679. [Google Scholar] [CrossRef]
  17. Verma, R.; Bharti, S. A Survey of Network Attacks in Wireless Sensor Networks. In Information, Communication and Computing Technology; Badica, C., Liatsis, P., Kharb, L., Chahal, D., Eds.; Springer: Berlin/Heidelberg, Germany, 2020; pp. 50–63. [Google Scholar] [CrossRef]
  18. Singh, S.; Sharma, P.K.; Moon, S.Y.; Moon, D.; Park, J.H. A Comprehensive Study on APT Attack and Counterasures for Future Network and Communications: Challenges and Solutions. J. Supercomput. 2019, 75, 4543–4574. [Google Scholar] [CrossRef]
  19. Li, M.; Huang, W.; Wang, Y.; Fan, W.; Li, J. The study of APT attack stage model. In Proceedings of the 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS), Okayama, Japan, 26–29 June 2016; pp. 1–5. [Google Scholar] [CrossRef]
  20. Peng, T.; Leckie, C.; Ramamohanarao, K. Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Comput. Surv. 2007, 39, 3. [Google Scholar] [CrossRef]
  21. Chunlei, W.; Qing, M.; Yiqi, D. Network Survivability Analysis Based on Stochastic Game Model. In Proceedings of the 2012 Fourth International Conference on Multimedia Information Networking and Security, Nanjing, China, 2–4 November 2012; pp. 99–104. [Google Scholar] [CrossRef]
  22. Leng, Q.; Yang, Y.; Pan, R.; Hu, H. Research of Complete Information Static Game Model for Software Manufacturer, White Hats and Black Hats. Procedia Comput. Sci. 2018, 131, 832–840. [Google Scholar] [CrossRef]
  23. Zhang, H.; Xu, X.; Li, J.; Tao, X.; Zhang, P.; Svensson, T.; Botella, C. Multicell power allocation method based on game theory for inter-cell interference coordination. Sci. China Ser. F Inf. Sci. 2009, 52, 2378–2384. [Google Scholar] [CrossRef]
  24. Shahid, J.; Muhammad, Z.; Iqbal, Z.; Almadhor, A.S.; Javed, A.R. Cellular automata trust-based energy drainage attack detection and prevention in Wireless Sensor Networks. Comput. Commun. 2022, 191, 360–367. [Google Scholar] [CrossRef]
  25. Mohi, M.; Movaghar, A.; Zadeh, P.M. A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks. In Proceedings of the 2009 WRI International Conference on Communications and Mobile Computing, Kunming, China, 6–9 January 2009; Volume 3, pp. 507–511. [Google Scholar] [CrossRef]
  26. Anbalagan, S.; Kumar, D.; Raja, G.; Balaji, A. SDN assisted Stackelberg Game model for LTE-WiFi offloading in 5G networks. Digit. Commun. Netw. 2019, 5, 268–275. [Google Scholar] [CrossRef]
  27. Zhou, H.; Shen, S.; Liu, J. Malware propagation model in wireless sensor networks under attack–defense confrontation. Comput. Commun. 2020, 162, 51–58. [Google Scholar] [CrossRef]
  28. Roy, S.; Ellis, C.; Shiva, S.; Dasgupta, D.; Shandilya, V.; Wu, Q. A Survey of Game Theory as Applied to Network Security. In Proceedings of the 2010 43rd Hawaii International Conference on System Sciences, Honolulu, HI, USA, 5–8 January 2010; pp. 1–10. [Google Scholar] [CrossRef]
  29. Liang, X.; Xiao, Y. Game Theory for Network Security. IEEE Commun. Surv. Tutor. 2013, 15, 472–486. [Google Scholar] [CrossRef]
  30. Agah, A.; Das, S.; Basu, K. A game theory based approach for security in wireless sensor networks. In Proceedings of the IEEE International Conference on Performance, Computing, and Communications, Phoenix, AZ, USA, 15–17 April 2004; pp. 259–263. [Google Scholar] [CrossRef]
  31. Agah, A.; Das, S.; Basu, K. A non-cooperative game approach for intrusion detection in sensor networks. In Proceedings of the IEEE 60th VVehicular Technology Conference 2004 VTC2004-Fall 2004, Los Angeles, CA, USA, 1 July 2004; Volume 4, pp. 2902–2906. [Google Scholar] [CrossRef]
  32. Agah, A.; Basu, K.; Das, S.K. Preventing DoS attack in sensor networks: A game theoretic approach. In Proceedings of the IEEE International Conference on Communications 2005 ICC, Seoul, Republic of Korea, 16–20 May 2005; Volume 5, pp. 3218–3222. [Google Scholar] [CrossRef]
  33. Han, L.; Zhou, M.; Jia, W.; Dalil, Z.; Xu, X. Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model. Inf. Sci. 2019, 476, 491–504. [Google Scholar] [CrossRef]
  34. Sengupta, S.; Chatterjee, M.; Kwiat, K. A Game Theoretic Framework for Power Control in Wireless Sensor Networks. IEEE Trans. Comput. 2010, 59, 231–242. [Google Scholar] [CrossRef]
  35. Liu, N.; Liu, S.; Chai, Q.W.; Zheng, W.M. A method for analyzing Stackelberg attack–defense game model in 5G by tCPSO. Expert Syst. Appl. 2023, 228, 120386. [Google Scholar] [CrossRef]
  36. Yang, Z. Attack and Defense Game Strategy of Wireless Sensor Networks under Multiple Attacks. In Proceedings of the 2019 Chinese Control Conference (CCC), Guangzhou, China, 27–30 July 2019; pp. 6349–6356. [Google Scholar] [CrossRef]
  37. Lin, D.; Wang, Q.; Lin, D.; Deng, Y. An Energy-Efficient Clustering Routing Protocol Based on Evolutionary Game Theory in Wireless Sensor Networks. Int. J. Distrib. Sens. Netw. 2015, 2015, 409503. [Google Scholar] [CrossRef]
  38. Reddy, Y.B. A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks. In Proceedings of the 2009 Third International Conference on Sensor Technologies and Applications, Athens/Glyfada, Greece, 18–23 June 2009; pp. 462–468. [Google Scholar] [CrossRef]
  39. He, X.; Ding, W.; Yang, X.S. Bat algorithm based on simulated annealing and Gaussian perturbations. Neural Comput. Appl. 2013, 25, 459–468. [Google Scholar] [CrossRef]
  40. Storn, R. On the usage of differential evolution for function optimization. In Proceedings of the North American Fuzzy Information Processing 1996, Berkeley, CA, USA, 19–22 June 1996; pp. 519–523. [Google Scholar] [CrossRef]
  41. Shi, Y.; Eberhart, R.C. A modified particle swarm optimizer. In Proceedings of the 1998 IEEE International Conference on Evolutionary Computation Proceedings IEEE World Congress on Computational Intelligence (Cat. No.98TH8360) 1998, Anchorage, AK, USA, 4–9 May 1998; pp. 69–73. [Google Scholar] [CrossRef]
  42. Mirjalili, S.; Lewis, A. The Whale Optimization Algorithm. Adv. Eng. Softw. 2016, 95, 51–67. [Google Scholar] [CrossRef]
  43. Raman, V.S.; Gill, N.S. Review of different heuristic algorithms for solving Travelling Salesman Problem. Int. J. Adv. Res. Comput. Sci. 2017, 8, 423–425. [Google Scholar] [CrossRef]
  44. Faramarzi, A.; Heidarinejad, M.; Stephens, B.E.; Mirjalili, S.M. Equilibrium optimizer: A novel optimization algorithm. Knowl. Based Syst. 2020, 191, 105190. [Google Scholar] [CrossRef]
  45. Zheng, W.M.; Liu, N.; Chai, Q.W.; Liu, Y. Application of improved black hole algorithm in prolonging the lifetime of wireless sensor network. Complex Intell. Syst. 2023, 9, 1–13. [Google Scholar] [CrossRef]
  46. Zheng, W.; Pang, S.; Liu, N.; Chai, Q.; Xu, L. A Compact Snake Optimization Algorithm in the Application of WKNN Fingerprint Localization. Sensors 2023, 23, 6282. [Google Scholar] [CrossRef]
  47. Wang, X.; Wang, W.; Wang, Y. An Adaptive Bat Algorithm. In Proceedings of the Intelligent Computing Theories and Technology 9th International Conference, ICIC 2013, Nanning, China, 28–31 July 2013; pp. 216–223. [Google Scholar] [CrossRef]
  48. Zhan, Z.H.; Zhang, J.; Li, Y.; Chung, H.S.H. Adaptive Particle Swarm Optimization. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 2009, 39, 1362–1381. [Google Scholar] [CrossRef]
  49. Elmogy, A.; Miqrish, H.; Elawady, W.; El-Ghaish, H. ANWOA: An adaptive nonlinear whale optimization algorithm for high-dimensional optimization problems. Neural Comput. Appl. 2023, 35, 22671–22686. [Google Scholar] [CrossRef]
  50. Qin, A.; Suganthan, P. Self-adaptive differential evolution algorithm for numerical optimization. In Proceedings of the 2005 IEEE Congress on Evolutionary Computation, Edinburgh, UK, 2–5 September 2005; Volume 2, pp. 1785–1791. [Google Scholar] [CrossRef]
  51. Lee, C.Y. Mixed-Strategy Nash Equilibrium in Data Envelopment Analysis. Eur. J. Oper. Res. 2017, 266, 1013–1024. [Google Scholar] [CrossRef]
  52. Singh, A.; Kumar, A. Applications of nature-inspired meta-heuristic algorithms: A survey. Int. J. Adv. Intell. Paradig. 2021, 20, 388. [Google Scholar] [CrossRef]
Figure 1. Illustration of the process of abstracting a WSN into an undirected graph.
Figure 1. Illustration of the process of abstracting a WSN into an undirected graph.
Sensors 23 08055 g001
Figure 2. The distribution of the particle population in the EO with the number of iterations.
Figure 2. The distribution of the particle population in the EO with the number of iterations.
Sensors 23 08055 g002
Figure 3. Status segmentation diagram.
Figure 3. Status segmentation diagram.
Sensors 23 08055 g003
Figure 4. State-based evolution diagram for control parameters a 1 , a 2 .
Figure 4. State-based evolution diagram for control parameters a 1 , a 2 .
Sensors 23 08055 g004
Figure 5. Network topology diagram of the simulation experiment.
Figure 5. Network topology diagram of the simulation experiment.
Sensors 23 08055 g005
Figure 6. Comparison of the convergence speed of different algorithms under different functions.
Figure 6. Comparison of the convergence speed of different algorithms under different functions.
Sensors 23 08055 g006
Figure 7. Offense and defense game with 6 offensive resources and different defensive resources.
Figure 7. Offense and defense game with 6 offensive resources and different defensive resources.
Sensors 23 08055 g007
Figure 8. Offense and defense game with 6 defensive resources and different offensive resources.
Figure 8. Offense and defense game with 6 defensive resources and different offensive resources.
Sensors 23 08055 g008
Table 1. Matrix of gains for both offenders and defenders.
Table 1. Matrix of gains for both offenders and defenders.
S D 1 S D 2 S D N
S A 1 U A 11 , U D 11 U A 12 , U D 12 U A 1 N , U D 1 N
S A 2 U A 21 , U D 21 U A 22 , U D 22 U A 2 N , U D 2 N
 ⋮ ⋮ ⋮ ⋮
S A M U A M 1 , U D M 1 U A M 2 , U D M 2 U A M N , U D M N
Table 2. Table of adaptive changes of a 1 and a 2 with state.
Table 2. Table of adaptive changes of a 1 and a 2 with state.
Status a 1 a 2
S 1 IncreaseDecrease
S 2 Increase SlightlyDecrease
S 3 Increase SlightlyIncrease
S 4 DecreaseIncrease
Table 3. The importance of nodes.
Table 3. The importance of nodes.
N V 1 V 2 V 3 V 4 V 5 V 6 V 7 V 8
I429308326307
sort V 5 > V 3 = V 7 > V 2 > V 4 > V 6 > V 8 > V 1
Table 4. The importance of edges.
Table 4. The importance of edges.
N E 1 E 2 E 3 E 4 E 5 E 6 E 7 E 8
I0.2770.2890.3320.1790.3040.2340.3980.318
sort E 7 > E 3 > E 8 > E 5 > E 2 > E 1 > E 6 > E 4
Table 5. Simulation experiment environment.
Table 5. Simulation experiment environment.
Operating SystemWindows 11
ProcessorIntel(R) Core(TM) i5-8500 CPU @ 3.00 GHz
RAM16 GB
Simulation toolMatlab
Matlab version9.11.0.1769968 (R2021b)
Table 6. The parameter of experiment.
Table 6. The parameter of experiment.
NORNOSNDRNDSSOD
6 C 16 6 = 8008 3 C 16 3 = 560 4,484,480
6 C 16 6 = 8008 7 C 16 7 = 11 , 440 91,611,520
6 C 16 6 = 8008 11 C 16 11 = 4368 34,978,944
6 C 16 6 = 8008 14 C 16 14 = 120 960,960
3 C 16 3 = 560 6 C 16 6 = 8008 4,484,480
7 C 16 7 = 11 , 440 6 C 16 6 = 8008 91,611,520
11 C 16 11 = 4368 6 C 16 6 = 8008 34,978,944
14 C 16 14 = 120 6 C 16 6 = 8008 960,960
Table 7. AEO and other intelligent algorithms’ performance comparison.
Table 7. AEO and other intelligent algorithms’ performance comparison.
FAEOBADEEOPSOWOA
f 1 7.11 × 10 129 = 6.48 × 10 0 < 1.45 × 10 4 < 1.17 × 10 48 < 4.00 × 10 4 < 5.20 × 10 86 <
f 2 2.29 × 10 66 = 3.94 × 10 33 < 4.64 × 10 2 < 9.38 × 10 27 < 3.94 × 10 37 < 9.46 × 10 53 <
f 3 1.14 × 10 106 = 5.35 × 10 1 < 2.65 × 10 4 < 3.72 × 10 11 < 7.46 × 10 4 < 2.99 × 10 4 <
f 4 2.36 × 10 60 = 1.07 × 10 1 < 1.03 × 10 1 < 1.79 × 10 12 < 7.04 × 10 1 < 2.78 × 10 1 <
f 5 2.42 × 10 1 = 1.86 × 10 3 < 8.72 × 10 1 < 2.48 × 10 1 < 1.11 × 10 8 < 2.75 × 10 1 <
f 6 1.18 × 10 5 = 6.34 × 10 0 < 1.35 × 10 4 < 1.46 × 10 7 > 4.47 × 10 4 < 7.98 × 10 2 <
f 7 1.36 × 10 4 = 4.28 × 10 1 < 4.97 × 10 2 < 8.15 × 10 4 < 5.00 × 10 1 < 2.17 × 10 3 <
f 8 8.81 × 10 3 = 5.91 × 10 89 > 1.13 × 10 4 > 9.22 × 10 3 > 3.78 × 10 3 < 1.13 × 10 4 >
f 9 0.00 × 10 0 = 2.75 × 10 2 < 9.21 × 10 1 < 0.00 × 10 0 = 3.41 × 10 2 < 5.68 × 10 15 <
f 10 1.48 × 10 15 = 1.02 × 10 1 < 3.43 × 10 3 < 7.88 × 10 15 < 1.94 × 10 1 < 4.20 × 10 15 <
f 11 0.00 × 10 0 = 3.77 × 10 1 < 4.53 × 10 3 < 0.00 × 10 0 = 4.05 × 10 2 < 2.75 × 10 3 <
f 12 5.62 × 10 7 = 2.15 × 10 1 < 2.48 × 10 5 < 4.45 × 10 9 > 2.01 × 10 8 < 1.21 × 10 2 <
f 13 1.27 × 10 5 = 1.03 × 10 0 < 8.46 × 10 5 < 1.52 × 10 2 < 5.44 × 10 8 < 2.12 × 10 1 <
f 14 9.98 × 10 1 = 2.90 × 10 0 < 1.06 × 10 0 < 9.98 × 10 1 = 1.02 × 10 1 < 2.50 × 10 0 <
f 15 2.37 × 10 3 = 1.17 × 10 3 > 2.72 × 10 3 < 1.74 × 10 3 > 3.73 × 10 2 < 6.00 × 10 4 >
f 16 1.03 × 10 0 = 1.03 × 10 0 < 1.03 × 10 0 = 1.03 × 10 0 = 8.69 × 10 1 < 1.03 × 10 0 <
f 17 3.98 × 10 1 = 3.98 × 10 1 < 3.98 × 10 1 = 3.98 × 10 1 = 6.69 × 10 1 < 3.98 × 10 1 <
f 18 3.00 × 10 0 = 3.05 × 10 0 < 3.00 × 10 0 = 3.00 × 10 0 = 1.04 × 10 1 < 3.00 × 10 0 <
f 19 3.86 × 10 0 = 3.82 × 10 0 < 3.86 × 10 0 = 3.86 × 10 0 = 3.76 × 10 0 < 3.86 × 10 0 <
f 20 3.25 × 10 0 = 2.55 × 10 0 < 3.27 × 10 0 > 3.26 × 10 0 > 2.19 × 10 0 < 3.21 × 10 0 <
f 21 9.14 × 10 0 = 5.15 × 10 0 < 8.14 × 10 0 < 8.80 × 10 0 < 1.34 × 10 0 < 8.79 × 10 0 <
f 22 1.04 × 10 1 = 5.57 × 10 0 < 1.05 × 10 1 > 1.05 × 10 1 > 1.56 × 10 0 < 8.65 × 10 0 <
f 23 9.82 × 10 0 = 4.82 × 10 0 < 1.02 × 10 1 > 9.32 × 10 0 < 1.93 × 10 0 < 7.50 × 10 0 <
ine   Comparison of results: : 21 : 19 : 18 : 23 : 21
ine
Table 8. Gain of the defender changes with the times of offenses.
Table 8. Gain of the defender changes with the times of offenses.
time12345
gain of the defender−2.702−2.702−2.705−2.698−2.708
time678910
gain of the defender−2.714−2.698−2.703−2.702−2.700
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zheng, W.; Meng, F.; Liu, N.; Huang, S. A Game Model for Analyzing Wireless Sensor Networks of 5G Environment Based on Adaptive Equilibrium Optimizer Algorithm. Sensors 2023, 23, 8055. https://doi.org/10.3390/s23198055

AMA Style

Zheng W, Meng F, Liu N, Huang S. A Game Model for Analyzing Wireless Sensor Networks of 5G Environment Based on Adaptive Equilibrium Optimizer Algorithm. Sensors. 2023; 23(19):8055. https://doi.org/10.3390/s23198055

Chicago/Turabian Style

Zheng, Weimin, Fanying Meng, Ning Liu, and Shuo Huang. 2023. "A Game Model for Analyzing Wireless Sensor Networks of 5G Environment Based on Adaptive Equilibrium Optimizer Algorithm" Sensors 23, no. 19: 8055. https://doi.org/10.3390/s23198055

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop