Mean-Field Stackelberg Game-Based Security Defense and Resource Optimization in Edge Computing

: Edge computing brings computation and storage resources to the edge of the mobile network to solve the problems of low latency and high real-time demand. However, edge computing is more vulnerable to malicious attacks due to its open and dynamic environments. In this article, we investigate security defense strategies in edge computing systems, focusing on scenarios with one attacker and multiple defenders to determine optimal defense strategies with minimal resource allocation. Firstly, we formulate the interactions between the defenders and the attackers as the mean-field Stackelberg game model, where the state and the objective functions of the defenders are coupled through the mean-field term, and are strongly influenced by the strategy of the attacker. Then, we analyze the local optimal strategies of the defenders given an arbitrary strategy of the attackers. We demonstrate the Nash equilibrium and the mean-field equilibrium for both the defenders and the attackers. Finally, simulation analysis will illustrate the dynamic evolution of the defense strategy of the defenders and the trajectory of the attackers based on the proposed Stackelberg game model.


Introduction
With the rapid development of Internet of Things (IoT) technology, intelligent algorithms, and 5G communication technology, the number of mobile terminals and IoT devices is growing exponentially, generating a series of applications with latency-sensitive, compute-intensive, and continuous service characteristics such as smart healthcare, intelligent transportation, and virtual reality [1].Cloud computing remains the finest approach for processing huge amounts of data.Nevertheless, the cloud is limited by the high load and high latency of the backbone network, making it difficult to provide low latency for the above intelligent applications [2,3].
Edge computing architecture eliminates the bottleneck of cloud computing as it processes and storages the resources at the network edge [4].As a new distributed computing paradigm, edge computing has brought some new research topics such as computation offloading, edge caching, etc. [5,6].Due to the highly open and dynamic environment, resource-limited terminal devices, and multi-source heterogeneous data, edge computing is susceptible to targeted attacks [7].For example, a malware called "Mirai" took control of up to four hundred thousand damaged smart devices and launched DDoS attacks on edge servers [8].Moreover, secure communication for edge devices usually relies heavily on traditional cloud-based security mechanisms such as detection, identity authentication, etc., which need more computation resources and energy [9].Therefore, how to achieve efficient defense strategies while considering the consumption of the limited resources of mobile devices is a challenge.This study concentrates on addressing security defense challenges in edge computing environments to identify and implement optimal defense strategies.We examine the interaction behavior between defenders and attackers by using the mean-field Stackelberg game theory [10][11][12], which can solve complex and dynamic problems with large players.In the mean-field game model, the interaction behavior of individuals can be coupled through the mean-field term, and then the global problem can be converted into individual subproblems that greatly reduce the computing complexity of large-scale networks.The mean-field game (MFG) model has been applied to the security defense problem in [13,14].For large-scale edge devices, the authors in [13] designed an anti-attack model based on the mean-field game and obtained the equilibrium through a self-organizing neural network.In [14], the authors proposed a finite-horizon indefinite mean-field stochastic cooperative linear-quadratic difference game and analyzed the balance between the minimization of investments and the security level.In this paper, we consider the number of attackers as one player, which is modeled as the leader, while the defenders are the followers.In this case, the leader first chooses and then announces the optimal strategy to the defenders.Each defender will choose its optimal defense strategy to minimize the loss based on the leader's observed strategy.We aim to obtain the optimal defense strategies based on the minimization of resource consumption and the strategy of the attacker.Meanwhile, the objective is to balance the profits and the resource consumption for both the defenders and the attackers.The contributions of this article can be summarized as follows.
(1) Firstly, we analyze an edge computing system environment where the attacker is the leader, while the defenders are the followers.We propose an optimization problem that jointly optimizes resource consumption and player decisions by including state and decision variables.(2) Secondly, we formulate a mean-field Stackelberg game model to analyze the optimization problem, in which the dynamic evolutions of the states of the defenders are coupled with each other through the mean-field term and strongly influenced by the attack intensity.Moreover, we analyze the impact of the defense strategy on the evolution of the state of the attacker.The objectives for the defenders are to minimize the cost of defending against attackers and reduce the losses caused by attacks.The objective for the attackers is to minimize their attack cost.(3) Finally, we solve a local optimal control problem of the defenders given an arbitrary strategy of the attackers and discuss how the defenders' optimal decentralized strategies lead to an ε-Nash equilibrium for each fixed strategy of the leader, where ε converges to zero as N → ∞ .We then consider the leader's local optimal control problem and obtain the leader's decentralized optimal controller.
The remainder of this article is organized as follows.The related works are introduced in Section 2. The system model and problem formulation are provided in Section 3, and the local mean-field equilibrium and the Nash equilibrium are discussed in Section 4. Numerical simulations are given in Section 5. Finally, we conclude the work in Section 6.

Related Works
Edge computing has received much attention in recent years.Several studies have focused on the security issues in edge computing and provided some defense mechanisms.For instance, Alwarafy et al. [15] summarized the challenge of the security issues of Internet of Things (IoT) edge devices.The focus of this work was mainly on the classifications of attacks and threats for the devices with limited resources and a discussion of the defense strategies at different edge network layers for different security threats.In [16], a study was conducted to focus on the deployment of defense mechanisms to address security issues in edge computing.In this work [16], the security issues in edge computing systems were categorized into the perception layer, network layer, and application layer, and then the defense problem was analyzed from the perspective of artificial intelligence.
Li et al. [17] introduced a cooperative defense framework for defending against DDoS attacks in mobile edge computing, which could adapt to traffic changes by automatically coordinating container-carrying defense resources among the edge nodes.Myneni et al. [18] proposed a distributed deep defense framework by using edge computing approaches, which could detect and mitigate DDoS attacks near the data source; this defense framework could significantly reduce unnecessary bandwidth consumed by DDoS traffic going from edge network to edge network.Uddin et al. [19] proposed a layered approach to research the different categories of denial of service (DoS) and distributed denial of service (DDoS) attacks in edge computing systems.They analyzed the inherent vulnerabilities and weaknesses of attacks and proposed an architecture with detection and defense mechanisms based on federated learning.Zhou et al. [20] proposed a new defense framework in edge computing scenarios for the prediction and detection of DDoS attacks.
Wang et al. [21] introduced an eavesdropping-based attack-aware cache defense algorithm that could mitigate the effects of the attacker on the caching performance.Qiu et al. [22] proposed a defensive quantization method to mitigate the perturbations from the malicious samples in edge computing.Since improving the defense level means occupying more additional computation resources, the authors of [23] discussed the tradeoff between limited resource optimization and defense level improvement in edge computing offloading.Moreover, game theory has been used to solve the problem of resource-constrained resources and the security defense level.The survey in [24,25] summarized the methods that have been adopted to solve attacker-defender games and found that the current attacker-defender games that focus on technology adoption assume that the defender will deploy a single new technology at all target sites.The work discussed the future trends and research directions for applying game theory models in edge services and considering usage scenarios.For edge DDoS attacks, [26] proposed a novel game-theoretical approach named EDM Game and obtained the Nash equilibrium by using a decentralized algorithm.Wang et al. [27] analyzed the gains of defense mechanisms based on the stochastic differential game theory.Miao et al. [28] modeled the interaction behavior between defenders and attackers as a stochastic game model for resource-constrained devices and determined the optimal defense strategy.Qian et al. [29] proposed a mean-field game model to solve the data security issues in edge computing.
Although several works have considered the balance between limited resource consumption and security, some schemes achieve this goal by designing specific detection and defense technology, while others achieve this through game models.Few works consider the coupling relationship between the objective of attackers and the strategy of each defender and the dynamic changes in defense decisions under constrained resource consumption.

System Model and Problem Statement
In this section, we consider an edge computing system with N defender nodes, and the attackers modeled as one player.As shown in Figure 1, the structure of the edge computing architecture comprises three layers, which are named the terminal device layer, the edge layer, and the cloud layer.Edge computing architecture enables practical applications by providing resources and services through collaborative computing between the terminal and the edge cloud.Edge servers are connected to the cloud, which collects and centrally analyzes data from terminal devices and provides feedback to the bottom two layers.The terminal devices with limited resources process the calculation and storage of local real-tasks.
In this paper, the dynamic interactions between attackers and defenders are studied by using mean-field Stackelberg differential games, in which the attacker can be considered as the leader and the defenders as the followers.The attacker chooses the strategy before the start of the games and announces it to the defenders.The defenders choose their optimal strategies noncooperatively and simultaneously based on the attack level.Moreover, the information structures for both the attacker and the defenders are given by each agent's initial condition in the proposed game model.by using mean-field Stackelberg differential games, in which the attacker can be considered as the leader and the defenders as the followers.The attacker chooses the strategy before the start of the games and announces it to the defenders.The defenders choose their optimal strategies noncooperatively and simultaneously based on the attack level.Moreover, the information structures for both the attacker and the defenders are given by each agent's initial condition in the proposed game model.We consider { } as the resource consumption level of the edge device i , 0 ( )   x t as the number of attackers, ( ) i u t as the defense level of the defender i ( ) , and 0 ( ) u t as the attack level of the attacker.The evolution of the system states is influenced by the strategic decisions made by both the defenders and attackers in the context of edge computing security.The evolution of the state ( ) x t is also related to the mass behavior of the defenders.
Hence, the dynamic evolution states of the defenders and attackers can be given by ( ) where i a , i b , 0 a , 0 b , i c , 0 c , and i λ are the real parameters.Specifically, i a is a random coefficient of resource consumption to process the local tasks for the device i , i b is the probability of the device responding to the defense mechanism.
( ) ( ) is the mean-field term that captures the mass behavior of all the edge devices.
( ) ( ) means the available resource to detect the behavior of the attackers.We consider {x i (t), 1 ≤ i ≤ N} as the resource consumption level of the edge device i, x 0 (t) as the number of attackers, u i (t) as the defense level of the defender i(1 ≤ i ≤ N), and u 0 (t) as the attack level of the attacker.The evolution of the system states is influenced by the strategic decisions made by both the defenders and attackers in the context of edge computing security.The evolution of the state x i (t) is also related to the mass behavior of the defenders.∥x∥ 2 =< x, x > denotes the induced 2-norm.Hence, the dynamic evolution states of the defenders and attackers can be given by where a i , b i , a 0 , b 0 , c i , c 0 , and λ i are the real parameters.Specifically, a i is a random coefficient of resource consumption to process the local tasks for the device i, b i is the probability of the device responding to the defense mechanism.
term that captures the mass behavior of all the edge devices.c i ∥x i (t) − Ax N (t)∥ 2 means the available resource to detect the behavior of the attackers.b 0 is the probability of successful attacks, and κ i is the probability that the number of attackers is detected and filtered by the defense mechanisms.
For the defenders, the purpose is to reduce the limited resource consumption, minimize the loss caused by the attackers, and obtain the optimal strategies to maximize against the attacks.The objective function of the defenders is given by where is the cost of deviation from the whole average resource level of the node, β i ∥u i (t)∥ 2 is the cost of the defense mechanisms, and λ i u T i (t)u 0 (t) is the payment for defenders, which depends on both the defense mechanisms and the attack level.Meanwhile, the attacker aims to choose the optimal attack strategy to damage the edge devices and try to increase its attack intensity by maximizing its attack frequency.The objective function of the attacker is given by where α 0 , β 0 , and γ i are positive parameters.β 0 ∥u 0 (t)∥ 2 is the cost of the attacker caused by the attack intensity.The second component α 0 ∥x 0 (t) − Ax N (t)∥ 2 is the cost of successful attacks, and γ i u i (t) is the cost caused by the defense mechanism.According to the above analysis, the attacker in the proposed model chooses and then announces their strategies to the defenders.The defenders choose their optimal strategies noncooperatively and simultaneously based on the leader's observed strategy.Each individual defender will choose its optimal defense strategy to minimize the loss caused by the attacks.Next, we will solve a local optimal control problem of the defenders given an arbitrary strategy of the attackers.We will then discuss the local optimal control problem of the attackers.

Mean-Field Games Equilibrium and Optimal Strategies
In this section, we consider the mean-field Stackelberg game for the system model, in which the attacker can be considered as the leader because it first chooses the strategy.The defenders are considered as the followers, and they can detect the behavior of attackers.In this framework, each player knows its parameters while the attacker also knows the parameters of the defenders.Since the defenders are coupled through the mean-field term, the optimal control problem of each defender can be considered as an independent mean-field equilibrium problem, which we discuss below.

Local Optimal Control Problem for the Defenders
Due to the heterogeneity of the edge devices, we replace x N (t) with z(t), which can be viewed as the mass behavior of the defenders when N → ∞ , in which the individual influence of each defender will be negligible.We will obtain the optimal strategies of the defenders under this consideration.Proposition 1. Corresponding to system models (1) and (3), we consider the local optimal strategy problem for each defender.There exists a unique optimal defense strategy u * i (t) if and only if where the adjoint process and the optimal trajectory satisfy the following equations: where x * i (0) = x i0 , p i (T) = 0.
Proof.Consider the variation of defense strategy δu i (t) for each i, which is the control process, such as . The variational equation is as follows: where δx i (0) = 0. □ Since the cost function is convex, Equation ( 5) is the optimal defense strategy if and only if the first-order cost function case Next, we use the It ô formula: Since δx i (0) = 0, and p i (T) = 0, we obtain the optimal control.We now obtain the local optimal strategy for the defender and the corresponding state trajectory.The purpose of this analysis is to determine the mean-field approximation and the ε-Stackelberg equilibrium problem.It can be seen from Proposition 1 that the optimal defense strategy is determined by the threat level of the attackers and the adjoint operator, whereas the defense strategy also depends on the state because of the limited resources of edge devices.Hence, we can refine the adjoint operator p i (t).
To obtain the feedback representation of the defenders in ( 5) and ( 6), let , where V i (t) is the value function, and φ i (t) is the contin- uously differentiable function satisfying φ i (T) = 0 and V i (T) = 0 (12) By using the above transformation, the corresponding optimal state equation and the optimal defense strategy can be re-written as follows: where The corresponding optimal defense strategy with state feedback representation is given by Hence, for each defender, Equations ( 5) and ( 11) are both the optimal defense strategy for defenders and the latter is with the optimal state feedback representation.Meanwhile, φ i (t) is decoupled from x * i (t), and Equation ( 10) has a unique solution with V i (t) ≥ 0 and V i (T) = 0.

Optimality for the N Defenders: ε-Nash Equilibrium
In edge computing with large nodes, each defender node has the same system and it influences the choice of the strategy of another defender through the mean-field term.We can discuss the mean-field equilibrium in this case.We apply the optimal strategy (5) and the associated optimal state trajectory (6) to the N defenders.Let z(t) = lim N→∞ x N (t), and p(t) = lim N→∞ p N (t); hence, we have the following differential equations: ) Appl.Sci.2024, 14, 3538 7 of 14 where z(t) = lim N→∞ x * N i (t), p(T) = 0, and E[x 0 (0)] = x 0 .With the equations given in ( 13) and ( 14), the above equivalent representation can be re-written as where φ i (t) and φ(T) = 0.While the pair x * i , u * i is the optimal solution of the game, (z, p) has a unique solution.Moreover, if the number of defenders N is large enough, we will obtain the mean-field approximate equilibrium solution, which is dependent on the strategy of the attacker.Definition 1.For any strategy u 0 (t), the strategy set U = {u 1 (t), u 2 (t), • • • , u N (t)} is called to satisfy an ε-Nash equilibrium with respect to the cost J i for any i, if there existsε 1 ≥ 0 such that for each defender i, we have Theorem 1.For any strategy of the attacker, we have Moreover, we have Proof.We prove the first statement (22) because the second representation (23) can be proved similarly.By the state trajectory ( 16) and Gronwall's inequality, we have Thus, ( 21) is obtained.Applying Cauchy-Schwarz inequality, we have Hence, we obtained the ε-Nash equilibrium for any defender i, 1 ≤ i ≤ N, that is, where

Mean-Field Equilibrium of Attacker
In this section, we discuss the equilibrium problem faced by the attacker and try to obtain the corresponding optimal strategy.The local optimal solution will be analyzed and an approximation mean-field solution will be obtained.
Due to the nature of the mean-field game under consideration, the attacker aims to minimize the following equation: subject to the attacker's state equation: and the mean-field approximation constraint: where p(T) = 0, E[x 0 (0)] = x 0 , and E ∥x 0 (0)∥ 2 < ∞.In ( 27), the mean-field term is replaced with the approximated term z(t), which is dependent on the strategy of the attacker u 0 (t) as can be obtained from (29).Note that the mean-field game equilibrium problem for the defenders has been discussed by an approximated condition.Since the optimization problem for the attacker ( 27) has the initial and boundary conditions, it is much more tractable than the control problem of defenders.Based on the mean-field approximation problem in Section 4, the mean-field constraints ( 29) and (30) can be replaced by where z(0) = x 0 and φ(T) = 0.

Optimality for the Attacker: The ε-Nash Equilibrium
In the edge computing environment, if the defenders obtain the optimal attacker strategy, the defense strategies can obtain an approximated Stackelberg equilibrium solution.The definition is given as follows: • • • , N satisfies an ε 2 - Nash equilibrium concerning the cost J 0 , if there exists ε 2 > 0, such that we have Theorem 2. For the optimal strategies u * 0 , Proof.Similar to the Proof of Theorem 1, and due to the fact that This completes the proof.□

Mean-Field Game Equilibrium Algorithm
This subsection shows the implementation of the mean-field game equilibrium algorithm for the proposed model, which is given in Algorithm 1.The equilibrium algorithm can be divided into the defense section and the attack section.Specifically, we calculate the optimal strategies and the corresponding state trajectories for defenders and attackers separately from the mean-field game model.Since the objective functions are quadratic, the solutions can be given based on the Stackelberg game theory, and the complexity of the mean-field equilibrium algorithm is O( 1 / √ n).The algorithm process can be described in Algorithm 1 and Figure 2.

Algorithm 1. Mean-field game equilibrium algorithm
Input: the number of defenders N and the initial state x 0 , x i0 .Output: the optimal strategies u * i and u * 0 .1. Set up the parameters α i , β i , λ i , a i , b i , c i , a 0 , b 0 , u 0 , and c. 2. The defenders detect attack behavior.3. Start the mean-field game for defenders.4. For t = 1 to T 5. Calculate optimal strategies for the defenders based on Equations ( 11)- (15)

Numerical Simulation
This section provides the simulation results to illustrate the dynamic evolution of the defense strategy of the defenders and the trajectory of the attackers based on the proposed mean-field Stackelberg game model.We first consider all the defenders as heterogeneous followers who share the same parameters and then discuss the heterogeneous case with 10, 000 N = . Each defender tries to obtain the optimal defense strategy to minimize the cost given in Equation (3).In Section 4.1, we obtained the optimal defense strategy for edge device i (5), 1 i N ≤ ≤ , and in Section 4.3, we obtained the optimal attack strategy (33).We assume that the coefficients are within the range of 0 to 1.We presume that the simulation time is T = 10 min.The rest of the related simulation parameters are given in Table 1.The evolution of the optimal defense strategies for any three defenders is shown in Figure 3.At the beginning of the attack, the defense level gradually increases as the defense mechanism responds and then stabilizes.The result indicates that the defenders respond to defense mechanisms to improve their defense when detecting attacks.Related to the defense strategy, the resource consumption for the defenders is given in Figure 4.It shows that the value of ( ) i x t gradually rises and then declines during the start of the attack, and finally, the value eventually reaches a stable range.When the defense mechanism is activated, it requires more resources for the edge devices.As a result, the node reduces the additional overhead of the computational task.When the level of offensive defense decreases, the resource consumption level starts to decrease

Numerical Simulation
This section provides the simulation results to illustrate the dynamic evolution of the defense strategy of the defenders and the trajectory of the attackers based on the proposed mean-field Stackelberg game model.We first consider all the defenders as heterogeneous followers who share the same parameters and then discuss the heterogeneous case with N = 10, 000.Each defender tries to obtain the optimal defense strategy to minimize the cost given in Equation (3).In Section 4.1, we obtained the optimal defense strategy for edge device i (5), 1 ≤ i ≤ N, and in Section 4.3, we obtained the optimal attack strategy (33).We assume that the coefficients are within the range of 0 to 1.We presume that the simulation time is T = 10 min.The rest of the related simulation parameters are given in Table 1.The evolution of the optimal defense strategies for any three defenders is shown in Figure 3.At the beginning of the attack, the defense level gradually increases as the defense mechanism responds and then stabilizes.The result indicates that the defenders respond to defense mechanisms to improve their defense when detecting attacks.Related to the defense strategy, the resource consumption for the defenders is given in Figure 4.It shows that the value of x i (t) gradually rises and then declines during the start of the attack, and finally, the value eventually reaches a stable range.When the defense mechanism is activated, it requires more resources for the edge devices.As a result, the node reduces the additional overhead of the computational task.When the level of offensive defense decreases, the resource consumption level starts to decrease and fluctuates within a certain range to maintain the computational requirements of the task.
of the game, the intensity of the attack is high and continues to increase with time.Then, the intensity of the attack begins to decrease because the defense mechanism has been activated.The result shows that the intensity of the attack reduces rapidly when effective defense strategies are implemented.Ultimately, there is a slight variation in attack intensity within a specific range due to the underlying attack behavior in edge devices.We compare the resource consumption level of the proposed model and the energy optimization strategy [28] in Figure 7.As shown in Figure 7, the proposed scheme consumes more energy than the energy-optimized strategy at the beginning because of the level of attacks, but then the resource consumption level is gradually reduced, which indicates that the node has an optimal strategy with a minimum resource consumption at this time.We compare the resource consumption level of the proposed model and the energy optimization strategy [28] in Figure 7.As shown in Figure 7, the proposed scheme consumes more energy than the energy-optimized strategy at the beginning because of the level of attacks, but then the resource consumption level is gradually reduced, which indicates that the node has an optimal strategy with a minimum resource consumption at this time.To ensure maximum security, each edge device will adopt its optimal defense level.In this framework, the number of attackers gradually decreases over time, which is shown in Figure 5. Figure 6 shows the evolution of the level of attack.At the beginning of the game, the intensity of the attack is high and continues to increase with time.Then, the intensity of the attack begins to decrease because the defense mechanism has been activated.The result shows that the intensity of the attack reduces rapidly when effective defense strategies are implemented.Ultimately, there is a slight variation in attack intensity within a specific range due to the underlying attack behavior in edge devices.

Conclusions
In this article, we focused on a security strategy with limited resources in edge computing systems.We proposed a mean-field Stackelberg game-based model to optimize the defense strategies and minimize the cost of the defense mechanisms for The variation of the number of attackers over time We compare the resource consumption level of the proposed model and the energy optimization strategy [28] in Figure 7.As shown in Figure 7, the proposed scheme consumes more energy than the energy-optimized strategy at the beginning because of the level of attacks, but then the resource consumption level is gradually reduced, which indicates that the node has an optimal strategy with a minimum resource consumption at this time.

Conclusions
In this article, we focused on a security strategy with limited resources in edge computing systems.We proposed a mean-field Stackelberg game-based model to optimize the defense strategies and minimize the cost of the defense mechanisms for The variation of the number of attackers over time

Conclusions
In this article, we focused on a security strategy with limited resources in edge computing systems.We proposed a mean-field Stackelberg game-based model to optimize the defense strategies and minimize the cost of the defense mechanisms for defenders.The analysis developed in this model focused on scenarios with one attacker and multiple defenders.The attacker first chooses and then announces the optimal strategy to the defenders.Each defender will choose its optimal defense strategy to minimize the loss based on the leader's observed strategy.We achieved the optimal strategies for the defenders and attackers by solving the local optimal control problem.Using the mean-field approximation, we also determined the corresponding optimal consumption of resources of the defenders.We demonstrated that the optimal local control solutions for the defenders and attackers constitute an (ε 1 , ε 2 )-Nash equilibrium with the approximated mean-field equilibrium, where (ε 1 , ε 2 ) converges to zero as N → ∞ .Finally, we compared the proposed model with another scheme.The simulation results illustrated the dynamic evolution of the defense strategy given the optimal trajectory of the attackers.
In this paper, we considered the number of attackers as one player, and we evaluated the proposed model through numerical simulation.In future work, we will extend the proposed mean-field game model to problems with multiple attackers and defenders.In these cases, the optimal control problems of the attackers will be more complex due to the multiple influences on the mean-field behavior, and we will evaluate the game model in the real edge computing environment.

Figure 1 .
Figure 1.The architecture of edge computing.

Figure 1 .
Figure 1.The architecture of edge computing.

Figure 2 .
Figure 2. The procedure of the mean-field game algorithm.

Figure 2 .
Figure 2. The procedure of the mean-field game algorithm.

Figure 3 .
Figure 3.The evolution of the defense strategy.

Figure 4 .
Figure 4.The optimal resource consumption state of defenders.

Figure 3 .
Figure 3.The evolution of the defense strategy.

Figure 3 .
Figure 3.The evolution of the defense strategy.

Figure 4 .
Figure 4.The optimal resource consumption state of defenders.

Figure 4 .
Figure 4.The optimal resource consumption state of defenders.

Figure 5 .
Figure 5.The evolution of the number of attackers.

Figure 6 .
Figure 6.The evolution of the attack level.

Figure 7 .
Figure 7. Resource consumption level comparison between the proposed scheme and the energyoptimized strategy.

Figure 6 .
Figure 6.The evolution of the attack level.

Figure 5 .
Figure 5.The evolution of the number of attackers.

Figure 6 .
Figure 6.The evolution of the attack level.

Figure 7 .
Figure 7. Resource consumption level comparison between the proposed scheme and the energyoptimized strategy.

Figure 7 .
Figure 7. Resource consumption level comparison between the proposed scheme and the energyoptimized strategy.
. 6. Set up the objective function J * i and the state trajectory x *