research article evolutionary game-based secrecy rate...
TRANSCRIPT
Research ArticleEvolutionary Game-Based Secrecy Rate Adaptation inWireless Sensor Networks
Guanxiong Jiang,1 Shigen Shen,1,2 Keli Hu,1 Longjun Huang,1,3
Hongjie Li,2 and Risheng Han2
1Department of Computer Science and Engineering, Shaoxing University, Shaoxing 312000, China2College of Mathematics, Physics and Information Engineering, Jiaxing University, Jiaxing 314001, China3College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou 310014, China
Correspondence should be addressed to Guanxiong Jiang; [email protected]
Received 22 December 2014; Revised 26 February 2015; Accepted 4 March 2015
Academic Editor: Chuan-Ming Liu
Copyright Β© 2015 Guanxiong Jiang et al. This is an open access article distributed under the Creative Commons AttributionLicense, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properlycited.
Physical layer security, whose aim is to maximize the secrecy rate of a source while keeping eavesdroppers ignorant of datatransmitted, is extremely suitable forWireless Sensor Networks (WSNs).We therefore, by developing the classical wire-tap channel,construct an approach to compute the secrecy rate between a sensor node and its responsible cluster head in the clustered WSNs.A noncooperative secrecy rate game towards WSNs is formulated to solve contradictions between maximizing the secrecy rateof a sensor node and minimizing power consumed for data transmission. Using evolutionary game theory, we set up a selectiondynamics upon which a power level can be adaptively selected by a sensor node. Thus, the objective of secrecy rate adaptation formaximizing the fitness ofmember sensor nodes is achieved.We also prove the game is stable; that is, there exist evolutionarily stablestrategies (ESSs) that explain which strategies will be selected by a sensor node in the end. Moreover, a corresponding algorithmof secrecy rate adaptation is given. Numerical experiments show our proposed approach can adaptively adjust the secrecy rate of asensor node, which provides a novel way to guarantee the confidentiality of WSNs.
1. Introduction
Providing security for Wireless Sensor Networks (WSNs)is challenging, due to the characteristics of wireless com-munications, limited resources of sensor nodes, dense andenormous networks, as well as the unattended environmentswhere sensor nodes are prone to physical attacks. A largenumber of security approaches [1] such as cryptography,attack detection, and secure routing have been proposed todefend various threats and vulnerabilities inWSNs. Differentto these traditional methods, physical layer (PHY) security[2, 3] using the physical properties of the radio channel tohelp provide secure wireless communications is currentlyattracting considerable attention. This approach is extremelysuitable for WSNs since it achieves security through takingadvantage of the fundamental ability of the physical layer, notadding extra components.
The main idea of PHY security is to maximize therate of reliable information from a source to a destination,while keeping eavesdroppers ignorant of data transmitted.This rate is referred to as secrecy rate and its maximumreliable value for a channel is known as secrecy capacity.Wyner [4] in his pioneering work introduced a wire-tapchannel and showed that perfect secrecy could be attainedeven without the application of shared secrets. Since itsinception, secrecy capacity has been fundamentally devel-oped in other channels including Gaussian wire-tap channel[5], broadcast channel [6], relay channel [7], multiple-accesschannel [8], interference channel [9], multiple-input single-output (MISO) channel [10], multiple-input multiple-output(MIMO) channel [11], and feedback channel [12].
Along with the foundation of secrecy capacity in vari-ous channels, a recent trend of long-standing interest hasemerged in how to improve PHY security under the same
Hindawi Publishing CorporationInternational Journal of Distributed Sensor NetworksVolume 2015, Article ID 975454, 13 pageshttp://dx.doi.org/10.1155/2015/975454
2 International Journal of Distributed Sensor Networks
surroundings. These include methods such as cooperationrelays [13], joint relay and jammer selection [14], chan-nel frequency selectivity [15], and game theory [16β26].In practice, during the process of transmitting data, thetransmission power is a key factor that influences the secrecyrate of a source. From a noncooperative perspective, eachsensor node, due to its selfishness, attempts to increaseits transmission power for maximizing its secrecy rate inresponse to actions of the other sensor nodes. In this manner,it will however cause more and more interference to theother nodes and consume its own energy extraordinarily.These interactions among sensor nodes naturally result inapplications of game theory.
As an efficient method to solve problems of optimalstrategies, game theory provides a rich set of mathematicaltools for investigating the multiperson strategic decision-making, which has been broadly employed inWSNs security[27β33]. It is generally assumed that players in the classicalgame theory have complete information about the gameand about behaviors of opponents and must act completelyrationally. Distinguishable to these assumptions, evolution-ary game theory (EGT) to be borrowed in this paper imaginesthat conditioned players who are randomly drawn from alarge population play the game repeatedly. Moreover, overtime players have the opportunity to optimize their individualutilities by reacting to simple observations from their oppo-nents. This nature satisfies the requirement for the currentlarge-scale wireless networks with characteristics of self-organization, self-configuration, and self-optimization.Thus,many researchers are currently engaged in developing EGTbased schemes [34, 35]. Typical examples exist in evaluatingan incentive protocol [36], adjusting multiple-access controland power control [37], maximizing TCP throughout [38],learning for an optimal strategy [39], coevolving rationalstrategies [40], implementing network selection [41], sensingthe spectrum collaboratively [42], selecting dynamic service[43], enforcing cooperation among network nodes [44],promoting the selfish nodes to cooperatewith each other [45],and so forth.
Up to now, there are some papers on combining secrecycapacity with game theory in different environments. Thework in [19] formulates a noncooperative game between asource and a jammer relay for achieving the optimal secrecyrate of the source. Also, a noncooperative game betweenwireless users and a malicious node is introduced in [20],where the wireless users, through choosing a relay station,are to maximize a utility function considering their mutualinterference and security of the chosen path whereas themalicious node is to reduce the overall networkβs secrecycapacity. From the perspective of information theory, thework in [22] provides a mathematical formulation for thenoncooperative zero-sumgame existed in the two-userMISOGaussian interference channel with confidential messages. In[23] the authors model a two-person zero-sum gamewith theergodicMIMO secrecy rate as the payoff function, in order toexamine the trade-offs for the legitimate transmitter and theadversary. Since cooperation, on the contrary, is capable ofimproving PHY security, the work in [21] introduces friendlyjammers to interfere with the eavesdropper to increase the
secrecy rate of a source. A Stackelberg game is investigatedto reflect interactions between the source that pays jammersfor their interference and jammers who charge the sourcewith a certain price for the jamming. Different from [21], aStackelberg game [18] between primary users and secondaryusers in cognitive radio networks is modeled to maximizetransmission rates of secondary users. Consequently, primaryusersβ secrecy rates are improved with the help of trustworthysecondary users. Besides, typical examples of the Stackelberggame exist in analyzing the cooperation between the primaryand secondary transmitters in cognitive radio channels [24]and formulating the sources and the friendly jammers in atwo-way relay system as a power control scheme to achievethe optimized secrecy rate of the sources [25]. Moreover, anontransferable coalitional game [17], as one of cooperativegames, is applied to achieve secrecy rate gains from coop-eration in the presence of a cost for information exchange.The work in [26] formulates the relay selection in a two-stagedecode-and-forward cooperative network as a coalitionalgame with transferable utility, which decreases the compu-tation complexity in solving the distributed relay selectionproblem. In addition, the cooperative Kalai-Smorodinskybargaining game [16] is adopted, for transmitters with theMIMO channel, to find an operating point that balancesnetwork performance and fairness. This point allows trans-mitters to adjust their precoders appropriately and thusimproves the overall secrecy capacity of the network.
To the best of our knowledge, this paper is the first work tofocus on exploring secrecy rate adaptation in WSNs with theidea of EGT.Wefirst extend the classical secrecy rate equationto fit for the WSNs. We are thus able to understand whatparameters will influence the secrecy rate inWSNs.Then, wesolve the decision-making problem among sensor nodes formaximizing their utilities through a noncooperative secrecyrate game.The replicator dynamics is applied to illustrate theevolution process how sensor nodes select adaptively theirpower level strategies and achieve their adaptation of secrecyrate.
Compared with the related works mentioned herein,there are some distinctions in this paper. We concentrateclearly on the secrecy rate between a sensor node and itsresponsible cluster head in the clustered WSNs, while manyother channels are considered in [4β12, 46β48]. We employEGT to disclose the dynamics of secrecy rate adaptation forsensor nodes, while EGT is applied to other fields [34, 36β44, 49]. Our eventual objective is to maximize the fitnessof sensor nodes while several current works [16β21] makeuse of various games to improve PHY security for differentsurroundings. Therefore, our contributions lie mainly in thefollowing aspects:
(1) considering the interference environment, we con-struct an approach to compute the secrecy ratebetween a sensor node and its responsible clusterhead by developing the classical wire-tap channel [4,5], which is suitable for the clustered WSNs;
(2) we formulate a noncooperative secrecy rate gametowards WSNs, which is able to reflect interactionsamong sensor nodes and the cost of energy consumed
International Journal of Distributed Sensor Networks 3
for transmitting data. Solving the game will helpsensor nodes, by maximizing their utilities, to selecttheir power level strategies correctly;
(3) we attain, from the view of EGT, a selection dynamicsthat promotes sensor nodes to seek a power levelstrategy with higher fitness, as well as ESSs for thegame to describe which power level strategies willbe adopted by mutants in the end. The secrecy rateadaptation for sensor nodes is thus achieved.
The rest of this paper is organized as follows. In Section 2,we discuss the network surroundings to be studied andcompute the secrecy rate between a sensor node and itsresponsible cluster head in the clustered WSNs. In Section 3,a noncooperative secrecy rate game towards WSNs is setup. Moreover, secrecy rate dynamics and ESSs for the gameare explored. In addition, an algorithm is introduced todescribe how to adjust adaptively secrecy rate of sensornodes. In Section 4, by performing numerical experimentsin an example of the secrecy rate game, we illustrate theinfluence of a cost parameter, as well as the correspondingESSs. Moreover, the process of secrecy rate adaptation forsensor nodes is disclosed. Finally, a conclusion is provided inSection 5.
2. System Model
2.1. Interference among Sensor Nodes. Multiple-access chan-nels based WSNs are under consideration in this paper. Itis well known that multiaccess interference is a significantfactor to reduce the performance of such networks. Lack ofcoordination among sensor nodes will lead to a great numberof interfering power from their neighbors, even if each sensornode transmits signals at the lowest required power to itsdestination.
To attain the number of interferers for a particular sensornode, we use the assumptions as follows. We assume theWSNs are composed of static and identical sensor nodes thatare uniformly scattered with node density π on a 2D grid.Each of sensor nodes is equipped with an omnidirectionaltransmitting and receiving antenna of the same gain andoperates in a half-duplex way; that is, receiving and trans-mitting simultaneously are not allowed. The receiving andinterfering ranges rely on the transmission powers of a sourceand the other sensor nodes in the same zone. Let π
π be the
receiving distance that means the maximum distance fromwhich a receiving sensor node is able to recover correctlya signal transmitted, and let π
πΌbe the interfering distance
denoting the maximum distance from which a receivingsensor node can sense carriers. Typically, π
πΌβ 2ππ [50].
Moreover, in order to sendmessages successfully, each sensornode is capable of selecting an appropriate power level.
For a given sensor node, we now describe the numberof its interferers. We employ Poisson distribution, due toits mathematical tractability, to estimate approximately thedistribution of sensor nodes. In general, the maximumnumber of interferers should be computed in terms of themean value and several times of standard deviation βπ. Forinstance, if we were to account for 99.6 percent of all sensor
Cluster headBase station
Member sensor nodeEavesdropper
Β· Β· Β· Β· Β· Β·
Β· Β· Β·
Β· Β· Β·
H1Hn
Sm
Sm
1
β°m
Sm
Iπ
Figure 1: Network model.
nodes, then we have to consider 3 Γ βπ in addition to themean [51]. For any sensor node, its interference zone is π§
πΌ=
ππ2
πΌ, and its mean number of sensor nodes in zone π§
πΌis ππ§πΌ.
In addition, the variance π for Poisson distribution is equalto ππ§πΌ. Therefore, the maximum number of interferers to any
sensor node can be denoted by
πΌ = ππ§πΌ+ 3βππ§
πΌ. (1)
2.2. Secrecy Rate in Clustered WSNs. The topology to bestudied, as depicted in Figure 1, is based on the clusteredstructure due to its popularity. By using clustering, all sensornodes are grouped into different clusters. Each cluster hasa coordinator, referred to as cluster head, and a number ofother sensor nodes as members, calledmember sensor nodes.This clustering leads to a two-tier hierarchy, where clusterheads construct the higher tier while member sensor nodesform the lower tier. In this hierarchy, a time-slotted datatransmission scheme is adopted. In the first time slot, datacaptured by member sensor nodes in the same cluster aretransmitted to the responsible cluster head, then in the secondtime slot the cluster head aggregates the data received andsends them to the base station through other cluster heads.Note that, for simplicity, our work is focused on the secrecyrate between a member sensor node and its responsiblecluster head in the first time slot.
Let S, H, and E be sets of π member sensor nodes,π cluster nodes, and πΎ eavesdroppers, respectively. Thus,S = {π
1, π2, . . . , π
π}, H = {π»
1, π»2, . . . , π»
π}, and E =
{πΈ1, πΈ2, . . . , πΈ
πΎ}. For any member sensor node π
π, ππ
β S,there exists a uniquely responsible cluster head π»
π, π»πβ H,
where π is in fact determined by π; there also exist severaleavesdroppers, each of which is denoted by πΈ
π, πΈπ
β Eπ,
Eπ
β E, where Eπ
is the set of eavesdroppers capableof listening in on data sensed by π
π. Channel gains from
ππto π»πand πΈ
πare denoted by πΊ
ππ
π»π
and πΊππ
πΈπ
, respectively.For simplicity, all thermal noise powers at cluster heads andeavesdroppers are denoted by π
2. In addition, each channelbandwidth is π.
4 International Journal of Distributed Sensor Networks
Due to the broadcast nature of channels, a cluster headendures a collision of signals from some member sensornodes that are transmitting their data simultaneously. Wetreat these signals from member sensor nodes other thanthe target source as additive interference and compute thenumber of these interferers according to (1). For any membersensor node π
π, ππ
β S, let Sπbe the set of its interferers
whose element is denoted by ππ
π, π β {1, 2, . . . , πΌ
π}, where
πΌπ
denoting the number of interferers of ππ
comes from(1). Thus, S
π= {ππ
1, ππ
2, . . . , π
π
πΌπ
}. Following the idea of theclassical wire-tap channel [4, 5], the channel capacity frommember sensor node π
πto its corresponding cluster headπ»
π,
denoted by πΆππ
π»π
, can be given by
πΆππ
π»π
= π log2(1 +
πππΊππ
π»π
βπΌπ
π=1οΏ½οΏ½π
ππΊππ
π
π»π
+ π2) , (2)
where ππis the transmission power adopted by π
π, ππ
β
S, οΏ½οΏ½ππ
is the interference power adopted by ππ
π, πππ
β Sπ,
and πΊππ
π
π»π
is the channel gain between interferer ππ
πand the
interfered cluster head π»π.
Similarly, the channel capacity frommember sensor nodeππto eavesdropper πΈ
π, πΈπ
β Eπ, denoted by πΆ
ππ
πΈπ
, can begiven by
πΆππ
πΈπ
= π log2(1 +
πππΊππ
πΈπ
βπΌπ
π=1οΏ½οΏ½π
ππΊππ
π
πΈπ
+ π2) , (3)
where πΊππ
π
πΈπ
is the channel gain between interferer ππ
πand
eavesdropperπΈπ,πΈπβ Eπ.The secrecy rate betweenmember
sensor node ππand its responsible cluster headπ»
π, thus, can
be defined as (in fact, this scenario can be regarded as πΌπ-
user interference channel with |Eπ| external eavesdroppers,
where |Eπ| is the number of eavesdroppers who are able to
listen in data sensed by ππ)
πΆ (ππ) = (πΆ
ππ
π»π
β maxπΈπβEπ
πΆππ
πΈπ
)
+
, (4)
where (π₯)+= max{π₯, 0}.
3. Joint Secrecy Rate and EGT
3.1. ACompendiumof EGT. Briefly, EGT ismainly concernedabout a dynamic environment where players are continuallyinteracting with others and adapting their strategies basedon their expected payoffs they attain. In EGT, the concept ofpopulation consisting of a group of individuals (i.e., players)is introduced, and expected payoffs are replaced by fitnessof individuals. An individual in an evolutionary game isable to observe the actions of other individuals, learn fromthese observations, and slowly adjust its strategy to attainthe solution in the end. In this manner, we are able tounderstand the dynamics of interactions among individualsin a population.
In fact, the evolutionary process is determined bytwo noticeable elements: a mutation mechanism to providemutants and a selection mechanism to promote somemutantswith higher fitness over others [52]. While the mutationmechanism is described by evolutionary stable strategy (ESS),the selection mechanism is highlighted by replicator dynam-ics. The concept of ESS is to require that the final equilibriummust be capable of repelling all invaders; that is, if a strategyis evolutionarily stable, then it must keep such a quality thatalmost all individuals in the same population follow thisstrategy and mutants hardly invade successfully. This ESSis in fact a refinement of Nash equilibrium. On the otherhand, the replicator dynamics is able to explain and predictthe changeable trend towards population shares associatedwith different pure or mixed strategies. It selects individualsin a fitness proportional fashion. Thus, subpopulations withbetter fitness than the average will grow, while those withworse fitness than the average will be reduced in theirnumbers.
3.2. Secrecy Rate Game towards WSNs
Definition 1. The secrecy rate game towards WSNs that issymmetric consists of a 3-tuple G = (S,P,U), where
(i) S = {π1, π2, . . . , π
π} is a set of member sensor nodes
(individuals) in the same WSNs;(ii) P = β
π
π=1Pπ
is a set of strategy profiles for allmember sensor nodes, where P
π= {ππ
| ππ
1, ππ
2,
. . . , ππ
πΏ}, π β {1, 2, . . . ,π}. Here P
πand πΏ, respec-
tively, are the set and number of pure power levelstrategies available to member sensor node π
π, ππ
β
S;(iii) U = {π(π
π, ποΏ½οΏ½) | ππ
β Pπ, ποΏ½οΏ½
β PοΏ½οΏ½, π, οΏ½οΏ½ β
{1, 2, . . . ,π}} is a set of utility attained by membersensor node π
πadopting power level strategy π
π
when its opponent adopting ποΏ½οΏ½.
In the secrecy rate game towards WSNs, we consider allmember sensor nodes form a population and regard themas individuals. These individuals are intelligent agents who,during interactions with others, are able to self-adjust theirstrategies according to their current fitness. Their objectivesare to adapt their secrecy rates by maximizing individualfitness.
Due to the interference among sensor nodes, an optimalpower must be allocated to all member sensor nodes. From(4), the secrecy rate of member sensor node π
πmay be
maximized if ππ
transmits its data at its full power. Themember sensor node π
π, if doing so, will however result
in more interference to its neighboring sensor nodes andwill also consume its own battery largely. The performanceof the WSNs will thus be reduced. Therefore, to meet theseinteractions, we introduce the utility function for membersensor node π
πas
π (ππ, ποΏ½οΏ½) = πΆ (π
π) β πΌπ
π, (5)
where πΆ(ππ) is from (4), and πΌ is a cost parameter that
reflects the degree of a member sensor node consuming
International Journal of Distributed Sensor Networks 5
energy for data transmission. Note that the member sensornode adopting π
οΏ½οΏ½has been included as one of interferers in
the first term of (5). Next, the goal of the secrecy rate gameis to help all individuals select their strategies adaptively sothat the maximum fitness of member sensor nodes can beattained with the minimum expense of their power. Thus,secrecy rate adaptation of a member sensor node, along withthis evolutionary process, is to be achieved.
3.3. Dynamics Analysis on Secrecy Rates of Member SensorNodes. Wenow explore the secrecy rate dynamics ofmembersensor nodes using the replicator dynamics. To begin with, allmember sensor nodes, for transmitting data, select randomlyone of available power levels. Each member sensor node,from the view of noncooperative game theory, expects tomaximize its own fitness. It therefore adjusts periodically itspower level (i.e., its secrecy rate is adjusted) and compares thecorresponding fitness with the average fitness of the wholeWSNs. If a higher value is attained, the member sensor nodechanges its current power level (i.e., its current secrecy rateis changed) to a new one; otherwise, it keeps its currentstrategy unchanged. Letting π
π(π‘) (note that here, βπ, οΏ½οΏ½ β
{1, 2, . . . ,π}, we assume Pπ
= PοΏ½οΏ½, which is rational due
to the same characteristic of all member sensor nodes. Thisassumption means all member sensor nodes have the sameset of power level strategies; i.e., βπ, οΏ½οΏ½ β {1, 2, . . . ,π}, βπ β
{1, 2, . . . , πΏ}, πππ
= ποΏ½οΏ½
πis satisfied, where π
π
πand π
οΏ½οΏ½
πdenote
member sensor nodes ππand π
οΏ½οΏ½adopting the same power
level strategy π) be the fraction ofmember sensor nodes usingpower level strategy π at time π‘, we have
β
πβPπ
ππ (π‘) = 1. (6)
The state of the WSNs at time π‘, denoted by π(π‘), is thenπ(π‘) = [π
ππ
1
(π‘), πππ
2
(π‘), . . . , πππ
πΏ
(π‘)] that can be consideredas a mixed strategy of the WSNs. Let π be the power levelstrategy adopted by the opponent π
οΏ½οΏ½. Thus, referring to [53],
the fitness of member sensor node ππadopting power level
strategy π at time π‘ is
ππ (π‘) = β
πβPοΏ½οΏ½
ππ (π‘) π (π, π) , (7)
where π(π, π) is from (5). The average fitness of the wholeWSNs at time π‘ is
π (π‘) = β
πβPπ
ππ (π‘) ππ (π‘) . (8)
Correspondingly, we define the expected secrecy rate ofmember sensor node π
πadopting power level strategy π at
time π‘ as
ππ (π‘) = β
πβPοΏ½οΏ½
ππ (π‘) πΆ (π) , (9)
where πΆ(π) is from (4). The average secrecy rate of the wholeWSNs at time π‘ is defined as
π (π‘) = β
πβPπ
ππ (π‘) ππ (π‘) . (10)
To make use of the idea of the replicator dynamics,we require the rate at which member sensor nodes changetheir strategies. This rate is determined by the performanceof current strategies of member sensor nodes and by thepopulation state. Let π
π(π) be the average review rate of
member sensor nodes using power level strategy π, πππ(π) (in
particular, πππ(π) is the probability that the reviewingmember
sensor nodes adopting power level strategy π do not changetheir strategy) be the probability that the reviewing membersensor nodes change from power level strategy π to π. Thus,in the whole WSNs the fraction of the reviewing membersensor nodes changing from power level strategy π to π isππ(π‘)ππ(π)ππ
π(π). As a result, the outflow from the power level
strategy π is
β
π,π =π
ππ (π‘) ππ (π) π
π
π(π) = π
π (π‘) ππ (π) β
π,π =π
ππ
π(π)
= ππ (π‘) ππ (π) (1 β π
π
π(π)) ,
(11)
while the inflow to the power level strategy π isβπ,π =π
ππ(π‘)ππ(π)ππ
π(π). Subtracting the outflow from the
inflow, we can then attain the differential equation as
ππ (π‘) = β
π,π =π
ππ (π‘) ππ (π) π
π
π(π) β π
π (π‘) ππ (π) (1 β ππ
π(π))
= β
π
ππ (π‘) ππ (π) π
π
π(π) β π
π (π‘) ππ (π) ,
(12)
which constructs the replicator dynamics determining whichpower level strategies will be adaptively selected by amembersensor node.
For a member sensor node, whether or not to switch itspower level is based on the corresponding fitness. Amongthe notations above, we suppose that π and π denote thepower level strategies adopted by the original individuals anda small group of mutants, respectively. Then, the reviewingmember sensor nodes change to the mutant strategy if andonly if the fitness difference observed is positive; that is,ππ(π‘) > π
π(π‘). This difference between random variables
ππ(π‘) and π
π(π‘) has a continuously differentiable probability
distribution function π : R β [0, 1]. The conditionalprobability that member sensor nodes will change to powerlevel strategy π, given that its original strategy is π, is thusπ(ππ(π‘) β π
π(π‘)). Furthermore, since the probability that
member sensor nodes will select power level strategy π attime π‘ is π
π(π‘), we can attain the resulting conditional choice
probability as
ππ
π(π) =
{{
{{
{
ππ (π‘) π (π
π (π‘) β ππ (π‘)) , if π = π,
1 β β
π =π
ππ (π‘) π (π
π (π‘) β ππ (π‘)) , if π = π.
(13)
In fact, the choice probabilities in (13) result from indi-vidual differences in preferences acrossmember sensor nodesand not from observation errors made by member sensor
6 International Journal of Distributed Sensor Networks
nodeswith identical preferences. To isolate the effect of choiceprobabilities, for simplicity, we assume that all review rates areconstantly equal to one; that is,
βπ β Pπ, ππ (π) β‘ 1. (14)
Substituting (13) and (14) into (12), we can, formember sensornodes, get the selection dynamics as
ππ (π‘) = π
π (π‘) β
π,π =π
ππ (π‘)
β (π (ππ (π‘) β π
π (π‘)) β π (ππ (π‘) β π
π (π‘))) .
(15)
This selection dynamics, determining the selection prob-ability of a power level strategy, will be used to adapt thedecision of a member sensor node and is at the same timeaffected by decisions of the other member sensor nodes.
3.4. Convergence and Stability Analysis on Secrecy Rate Gametowards WSNs
Lemma 2. If a power level strategy π is strictly dominant, thenlimπ‘ββ
ππ(π‘) = 1.
Proof. Thecase that a power level strategy is strictly dominantmeans member sensor nodes with this strategy, irrespectiveof which strategy any of other member sensor nodes chooses,can gain a strictly higher fitness than with any of otherstrategies. This will result in increasing the correspondingfraction in the population. Member sensor nodes employinga strictly dominant strategy will then occupy the wholepopulation over time. Lemma 2 therefore follows.
From Lemma 2, we can attain that member sensor nodeswhose strategies are strictly dominated will vanish eventuallyfrom the population; that is, if a power level strategy π isstrictly dominated, then lim
π‘ββππ(π‘) = 0.
Theorem3. TheWSNs population state π(π‘) converges to equi-librium.
Proof. It is obvious that member sensor nodes employing dif-ferent power level strategies will attain different fitness underthe same WSNs surroundings. This fact means only onepower level strategy, correspondingly, is endowed with thehighest fitness among all strategies. Ranking all fitness valuesin descending order, we express the relationship of thesefitness as π
1(π‘) > π
2(π‘) > β β β > π
πΏ(π‘), and let lim
π‘ββπ(π‘) =
[π1(π‘), π2(π‘), . . . , π
πΏ(π‘)] be the corresponding population state.
According to Lemma 2 theWSNs population state, subject tothe constraints π
π(π‘) β₯ 0 and β
πβPπ
ππ(π‘) = 1, will ultimately
converge to
limπ‘ββ
π (π‘) = [π1 (π‘) , π2 (π‘) , . . . , ππΏ (π‘)] = [1, 0, . . . , 0] (16)
as equilibrium.Theorem 3 therefore follows.
Theorem 4. The equilibrium of the secrecy rate game towardsWSNs is evolutionarily stable.
Proof. Following Theorem 3, we can, for the secrecy rategame towards WSNs, attain equilibrium as {1, 0, . . . , 0} of πΏ-dimension. At this equilibrium point the set of differentialequations denoted in (15), by substituting
π1 (π‘) = 1 β π
2 (π‘) β β β β β ππΏ (π‘) , (17)
can be changed into
ππ (π‘) = π
π (π‘)(πππ
(1 β ππ (π‘)) +
ππ
πΏ
β
π=ππ
2,π =π
ππ (π‘) πππ) ,
π = ππ
2, . . . , π
π
πΏ,
(18)
where πππis equal to π(π
π(π‘) β π
π(π‘)) β π(π
π(π‘) β π
π(π‘)), and
π (π‘) = [π2 (π‘) , π3 (π‘) , . . . , ππΏ (π‘)] (19)
denotes the corresponding downsized population state,which has equilibrium as π
β(π‘) = [0, 0, . . . , 0] of (πΏ β 1)-
dimension.We now illustrate, in order to justify the equilibrium is
evolutionarily stable, that eigenvalues of the Jacobian matrixof the downsized population state all have negative real part.Here an element of the Jacobianmatrix that is a (πΏβ1)Γ(πΏβ1)
matrix, denoted by π½ππ, is a partial derivative as
π½ππ
= [π ππ(π‘)
πππ(π‘)
]
π(π‘)=πβ(π‘)
, π, π = ππ
2, . . . , π
π
πΏ. (20)
The Jacobian matrix denoted by J is therefore attained by
J =
[[[[[[[
[
πππ
2ππ
1
0 β β β 0
0 πππ
3ππ
1
β β β 0
.
.
.... d
.
.
.
0 0 β β β πππ
πΏππ
1
]]]]]]]
]
. (21)
In (21) πππ
2ππ
1
, πππ
3ππ
1
, . . . , πππ
πΏππ
1
are in fact the eigenvaluesof Jacobian matrix J. From Lemma 2, for any π = 2, . . . , πΏ,π(ππ(π‘) β π
π(π‘)) is equal to zero. We can thus attain
ππ1
= π (ππ (π‘) β π
π (π‘)) β π (ππ (π‘) β π
π (π‘))
= βπ (ππ (π‘) β π
π (π‘)) < 0.
(22)
FromTheorem 2.7.3 in [54], the equilibrium point πβ(π‘)is evolutionarily stable. Theorem 4 therefore follows.
3.5. Secrecy Rate Adaptation Algorithm. The algorithm ofsecrecy rate adaptation for WSNs is in fact to describethe process how member sensor nodes select adaptivelytheir power level strategies. During this iterative process,periodically, a member sensor node observes its fitness inan entirely distributed mode and evaluates its current fitnesswith the average fitness of the wholeWSNs. If the difference islarger than a predefined maximum bound, then the member
International Journal of Distributed Sensor Networks 7
sensor node selects a new power level strategy according tothe selection dynamics from (15). This interactive processgoes on until the ESS of the secrecy rate game towards WSNsis achieved. All member sensor nodes thus find a satisfac-tory solution to secrecy rate adaptation, and no membersensor nodes can benefit by switching their current powerlevel strategies while the other ones keep their strategiesunchanged. From now on, we can show the algorithm asfollows.
Algorithm 1.
(1) Initialize all coefficients including π, πΌ, π2 and all
channel gains;
(2) π‘ β 0;
(3) select a power level strategy πwith the selection prob-ability π(π‘) = [1/πΏ, 1/πΏ, . . . , 1/πΏ]. This probabilityassures eachmember sensor node has the same fitnessat the beginning of the game;
(4) compute the fitness ππ(π‘) and the average fitness π(π‘)
according to (7) and (8), respectively;
(5) compute the expected secrecy rate ππ(π‘) and the
average secrecy rate π(π‘) according to (9) and (10),respectively;
(6) DOWHILE .T.
//π means a predefined minimum bound;
(7) IF |π(π‘) β ππ(π‘)| < π;
(8) EXIT;
(9) ENDIF
//π means a predefined maximum bound;
(10) IF |π(π‘) β ππ(π‘)| > π;
(11) get π(π‘ + 1) by solving (15) with thestandard numerical solver;
(12) select a newpower level strategy πwiththe new selection probability π(π‘ + 1);
(13) compute the fitness ππ(π‘ + 1) and the
average fitness π(π‘ + 1) according to (7) and (8),respectively;
(14) compute the expected secrecy rateππ(π‘+1) and the average secrecy rate π(π‘+1) according
to (9) and (10), respectively;
(15) ENDIF;
(16) π‘ β π‘ + 1;
(17) ENDDO;
(18) RETURN the array of ππand π.
4. Experiments
Since member sensor nodes are generally constrained inlimited computation, memory, and battery life, we simplifythe number of power level strategies to introduce an exampleof the secrecy rate game towards WSNs. We consider thata member sensor node π
π, when transmitting data, has to
select a strategy in Pπ
= {ππ», ππΏ}, where π
π»and π
πΏdenote
the high and low power levels, respectively. That is, for anyπ β {1, 2, . . . ,π}, P
π= {ππ», ππΏ}. The utility of a member
sensor node, from (5), can thus be rewritten as
π (ππ, ποΏ½οΏ½)
= π(log2(1 +
πππΊππ
π»π
ποΏ½οΏ½πΊποΏ½οΏ½
π»π
+ βπΌπ
π=1οΏ½οΏ½π
ππΊππ
π
π»π
+ π2)
β maxπΈπβEπ
log2(1 +
πππΊππ
πΈπ
ποΏ½οΏ½πΊποΏ½οΏ½
πΈπ
+ βπΌπ
π=1οΏ½οΏ½π
ππΊππ
π
πΈπ
+ π2))
+
β πΌππ,
(23)
where ππ, ποΏ½οΏ½
β Pπ, ππ, ποΏ½οΏ½
β S. For simple description, letππ»π»
, ππ»πΏ
, ππΏπ»
, and ππΏπΏ
be π(ππ», ππ»), π(π
π», ππΏ), π(π
πΏ, ππ»),
and π(ππΏ, ππΏ), respectively.
Obviously, for the example of the secrecy rate gametowards WSNs, we can get (a) π
π»is an ESS if and only if
ππ»π»
> ππΏπ»
and ππ»πΏ
> ππΏπΏ, (b) π
πΏis an ESS if and only if
ππ»π»
< ππΏπ»
and ππ»πΏ
< ππΏπΏ, and (c) ((π
πΏπΏβππ»πΏ
)/(ππ»π»
βππ»πΏ
β
ππΏπ»
+ππΏπΏ
), (ππ»π»
βππΏπ»
)/(ππ»π»
βππ»πΏ
βππΏπ»
+ππΏπΏ
)) is a mixedESS if and only if π
π»π»< ππΏπ»
and ππ»πΏ
> ππΏπΏ.
Next, we initialize all coefficients required in the exampleof the secrecy rate game towards WSNs for performingnumerical experiments. According to IEEE 802.15.4 physicallayer specifications, we let π = 0.01, π = 2MHz, π
π»=
30mW, ππΏ
= 10mW, and π2
= β112 dBm, respectively. Wealso let the channel gain between a member sensor node andits responsible cluster head be 1, and we let the channel gainbetween a member sensor node and an eavesdropper be 0.6.Since different power levels will lead to different interferencezones, we let π
π»= 50m and π
πΏ= 10m, where π
π»and ππΏ
denote the interference distance of a member sensor nodeadopting π
π»and π
πΏ, respectively. In addition, we assume
the working probability of interferers is 0.01 based on theempirical value. The number of interferers adopting the high(resp., low) power level strategy π
π»(resp. π
πΏ), therefore, is
0.01 Γ (πππ2
π»+ 3βπππ2
π») (resp., 0.01 Γ (πππ
2
πΏ+ 3βπππ2
πΏ)).
4.1. Effect of πΌ. The ESSs of the secrecy rate game towardsWSNs are dependent on the cost parameter πΌ. As depicted inFigure 2, utilities of all strategy profiles are decreasing linearlywith different speeds while πΌ is increasing gradually. Thisfact means the influence of a power level strategy becomeslarger than that of secrecy rate on the utility of a membersensor node. We can see lines of π
π»π»and ππΏπ»
intersect whenπΌ β 4.2267, which implies π
π»π»> ππΏπ»
if πΌ < 4.2267,
8 International Journal of Distributed Sensor Networks
1 2 3 4 5 6 7 8 9 10
0
50
100
150
Util
ity
πΌ
β50
β100
β150
β200
πHH πLHπHL πLL
Figure 2: Effect of πΌ on ESSs of the example of the secrecy gametowards WSNs.
otherwise ππ»π»
< ππΏπ»
. Similarly, if πΌ < 5.0919 then ππ»πΏ
>
ππΏπΏ; otherwise π
π»πΏ< ππΏπΏ. Therefore, π
π»is an ESS if and
only if πΌ < 4.2267; ππΏis an ESS if and only if πΌ > 5.0919;
((ππΏπΏ
βππ»πΏ
)/(ππ»π»
βππ»πΏ
βππΏπ»
+ππΏπΏ
), (ππ»π»
βππΏπ»
)/(ππ»π»
βππ»πΏ
β
ππΏπ»
+ππΏπΏ
)) is a mixed ESS if and only if 4.2267 < πΌ < 5.0919.
4.2. ESSs for the Example of the Secrecy Rate Game towardsWSNs. To illustrate the evolution of member sensor nodesselecting different power level strategies, the probability dis-tribution function π in (15) should be first defined. Accordingto the idea [52] through linearizing the function π, wesuppose
π (π₯) = π½ + πΎπ₯, (24)
where π½, πΎ β R, such that 0 β€ π½ + πΎπ₯ β€ 1. Substituting(24) into (15), we can attain the selection dynamics ofmembersensor nodes as
ππ (π‘) = 2πΎπ
π (π‘) β
π,π =π
ππ (π‘) (ππ (π‘) β π
π (π‘)) , (25)
where πΎ is in fact a parameter that will influence theconvergence speed of ESS. Let πΎ be 0.5 (in practice, πΎ maybe an arbitrary real number); we attain different ESSs ofthe example of the secrecy rate game under different costparameter values 3, 4.5, and 6, which are illustrated in Figures3, 4, and 5, respectively. Note that these cost parameter valuesdetermine three different ESSs. As illustrated in Section 4.1,πΌ = 3 specifies that π
π»is an ESS, πΌ = 4.5 specifies that π
πΏis
an ESS, and πΌ = 6 specifies that there is a mixed ESS.In Figure 3, when the initial value of (25) is 0.005, that is,
if only 0.5%member sensor nodes select the high power levelstrategy π
π»in the beginning, the fraction of member sensor
nodes selecting ππ», after about 51 times of playing the game,
will be stable at 1; that is, all member sensor nodes selectππ»as
their optimal strategy. We can also see that the higher initialfraction of member sensor nodes selecting π
π»is, the faster
0 10 20 30 40 500
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Times
πH(0) = 0.005
πH(0) = 0.255πH(0) = 0.555
πH(t)
Figure 3: ππ»is an ESS when πΌ = 3.
0 10 20 30 40 50Times
πH(0) = 0.995
πH(0) = 0.755πH(0) = 0.455
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1πH(t)
Figure 4: ππΏis an ESS when πΌ = 6.
convergence speed of achieving ESSππ»can be attained.These
results reflect the fact that ππ»is an ESS when πΌ = 3.
In Figure 4, even if 99.5% member sensor nodes selectππ»in the beginning, we can find that, after about 37 times
of playing the game, the fraction of member sensor nodesselecting π
π»will be stable at 0; that is, all member sensor
nodes select the low power level strategy ππΏin the end. In
addition, the convergence speed of achieving ESSππΏbecomes
faster and faster as decreasing the initial fraction of membersensor nodes selecting π
π». The fact that π
πΏis an ESS when
πΌ = 6 is thus reflected.In Figure 5, all curves of member sensor nodes selecting
ππ», irrespective of different initial value of (25), converge
to a limit 0.6841 or so. At this equilibrium point, about
International Journal of Distributed Sensor Networks 9
0 10 20 30 40 50Times
πH(0) = 0.155
πH(0) = 0.500πH(0) = 0.855
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
πH(t)
Figure 5: A mixed ESS (0.6841, 0.3159) exists when πΌ = 4.5.
68.41% member sensor nodes select ππ»while about 31.59%
member sensor nodes selectingππΏ, as their respective optimal
strategies. The other interpretation is that member sensornodes switch their strategies between strategies π
π»and π
πΏ,
that is, playing ππ»
for 68.41% of the time and ππΏfor the
remainder of the time. In fact, under this situation the casethat all member sensor nodes select π
π»(resp. π
πΏ) cannot be
evolutionarily stable. This is because the utility of a membersensor node adopting π
πΏ(resp., π
π»), when encountering one
adopting ππ»(resp. π
πΏ), is better than that of a member sensor
node adoptingππ»(resp.π
πΏ).These results lead to the fact that
there is a mixed ESS (0.6841, 0.3159) when πΌ = 4.5.
4.3. Secrecy Rate Adaptation. Our mechanism of secrecy rateadaptation in WSNs is realized when member sensor nodesselect adaptively their power level strategies for maximizingtheir fitness. For convenience, let π
π»(π‘) be the fraction of
member sensor nodes adoptingππ»at time π‘; then the fraction
of nodes adopting ππΏat time π‘ is 1 β π
π»(π‘). We denote the
fitness of member sensor nodes adopting ππ»and ππΏat time π‘
by ππ»(π‘) and π
πΏ(π‘), respectively, where π
π»(π‘) and π
πΏ(π‘), from
(7), are given by
ππ» (π‘) = π
π» (π‘) ππ»π» + (1 β ππ» (π‘)) ππ»πΏ, (26)
ππΏ (π‘) = π
π» (π‘) ππΏπ» + (1 β ππ» (π‘)) ππΏπΏ. (27)
From (8), we can attain that the average fitness of the wholeWSNs is
π (π‘) = ππ» (π‘) ππ» (π‘) + (1 β π
π» (π‘)) ππΏ (π‘) . (28)
Similarly, we denote the expected secrecy rate of amember sensor node adopting π
π»and π
πΏat time π‘ by π
π»(π‘)
0 10 20 30 40 5010
20
30
40
50
60
70
80
Times
Fitn
ess
π(t)πH(t)
πL(t)
Figure 6: Different fitness when πΌ = 3.
and ππΏ(π‘), respectively, where π
π»(π‘) and π
πΏ(π‘), from (9), are
given by
ππ» (π‘) = π
π» (π‘) ππ»π» + (1 β ππ» (π‘)) ππ»πΏ, (29)
ππΏ (π‘) = π
π» (π‘) ππΏπ» + (1 β ππ» (π‘)) ππΏπΏ, (30)
and the average secrecy rate of the whole WSNs, π(π‘), from(10), is given by
π (π‘) = ππ» (π‘) ππ» (π‘) + (1 β π
π» (π‘)) ππΏ (π‘) . (31)
Here ππ’V, π’, V β {π», πΏ}, denotes the secrecy rate of a
member sensor node adopting ππ’when encountering one
adopting πV, which can be computed by the first term in (23).We are now able to, under different cost values 3, 4.5, and
6, show changeable trends of fitness depicted in Figures 6,7, and 8, as well as expected secrecy rates in Figures 9, 10,and 11, respectively. In Figures 6 and 9 where π
π»is an ESS,
the fitness (resp., expected secrecy rate) of a member sensornode adopting π
π»is always higher than that of one adopting
ππΏ. As member sensor nodes play the game continuously,
both fitness values (resp., expected secrecy rates) decreasegradually while the average fitness (resp., secrecy rate) ofthe whole WSNs increases. After about 51 times of playingthe game, the curves of both π
π»(π‘) (resp., π
π»(π‘)) and π(π‘)
(resp., π(π‘)) converge to a limit 42.9739 (resp., 132.9091) orso. Arriving at this equilibrium point implies all membersensor nodes, through switching their power level strategiesadaptively, select π
π»in the end due to its higher fitness.
The secrecy rate attained by a member sensor node is alsoadjusted adaptively. In Figures 7 and 10 whereπ
πΏis an ESS, we
can see some converse phenomena. The fitness of a membersensor node adopting π
πΏis higher than that of a member
sensor node adopting ππ», whereas the expected secrecy rate
of a member sensor node adopting ππΏis lower. Moreover,
the average fitness of the whole WSNs is increasing whilethe average secrecy rate is decreasing. In the end, when
10 International Journal of Distributed Sensor NetworksFi
tnes
s
0 10 20 30 40 50
0
Times
β10
β15
β20
β25
β30
β35
β40
β45
β50
β5
π(t)πH(t)
πL(t)
Figure 7: Different fitness when πΌ = 6.
Fitn
ess
0 10 20 30 40 506
8
10
12
14
16
18
20
22
Times
π(t)πH(t)
πL(t)
Figure 8: Different fitness when πΌ = 4.5.
all member sensor nodes select ππΏas their optimal power
level strategy, the curves of both ππΏ(π‘) and π(π‘), after about
37 times of playing the game, converge to a limit β1.0675or so. Correspondingly, the expected secrecy rate attainedby a member sensor node is adjusted adaptively to a limit59.9593 or so. In Figures 8 and 11 where a mixed ESS existsat (0.6841, 0.3159) or so, there is a similar trend among curvesof ππ»(π‘), ππΏ(π‘), and π(π‘). After about 36 times of playing the
game, all curves in Figure 8 converge to a limit 6.8323 or so.That is, after achieving the mixed equilibrium point, bothstrategies π
π»and π
πΏcoexist permanently and all member
sensor nodes have the samefitness regardless of their differentstrategies. On the other hand, in Figure 11 we can see expectedsecrecy rates of member sensor nodes adopting π
π»and π
πΏ
are decreasing slowly. The average secrecy rate of the whole
0 10 20 30 40 5040
60
80
100
120
140
160
180
Times
Expe
cted
secr
ecy
rate
π(t)
πH(t)
πL(t)
Figure 9: Different expected secrecy rates when πΌ = 3.
0 10 20 30 40 5040
60
80
100
120
140
160
180
Times
Expe
cted
secr
ecy
rate
π(t)
πH(t)
πL(t)
Figure 10: Different expected secrecy rates when πΌ = 6.
WSNs, however, is increasing little by little. This adaptationof average secrecy rate results in equilibrium point 113.3959or so in the end.
5. Conclusion
We have demonstrated the evolution process of secrecy rateadaptation for sensor nodes in the clustered WSNs. For thisaim, the classical wiretap channel has been extended to fitfor the clustered WSNs and the corresponding equation tocompute secrecy rate has been attained. The secrecy rategame we have constructed is able to reflect the interactionsamong member sensor nodes. With EGT, we have attained aselection dynamics to determine how member sensor nodes
International Journal of Distributed Sensor Networks 11
0 10 20 30 40 5040
60
80
100
120
140
160
180
Times
Expe
cted
secr
ecy
rate
π(t)
πH(t)
πL(t)
Figure 11: Different expected secrecy rates when πΌ = 4.5.
for maximizing their fitness will select their power levelstrategies.We have also proved the stability of the secrecy rategame to illustrate which power level strategy will be adoptedin the end.The results from experiments for an example of thesecrecy rate game towards WSNs have verified all ESSs andhave revealed the process of expected secrecy rate adaptationfor member sensor nodes. As a result, this disclosure ofsecrecy rate adaptation will be beneficial to employ PHYsecurity to guarantee the secrecy of transmission in WSNs.
Notations
π: Node densityππ : Receiving distance
ππΌ: Interfering distance
βπ: Standard deviationπ§πΌ: Interference zone
πΌ: Maximum number of interferersto a sensor node
S,H, and E: Sets of π member sensor nodes,π cluster nodes, and πΎ
eavesdroppers, respectivelyEπ: Set of eavesdroppers capable of
listening in data sensed bymember sensor node π
π
πΊππ
π»π
: Channel gain between membersensor node π
πand its responsible
cluster head π»π
πΊππ
πΈπ
: Channel gain between membersensor node π
πand eavesdropper
πΈπ, πΈπβ Eπ
π2: Thermal noise power at cluster
heads and eavesdroppers,respectively
π: Channel bandwidth
ππ
π: An interferer to member sensor node π
π,
π β {1, 2, . . . , πΌπ}
Sπ: Set of interferers to member sensor node
ππ
πΆππ
π»π
: Channel capacity from member sensornode π
πto its responsible cluster head π»
π
ππ: Transmission power adopted by member
sensor node ππ
οΏ½οΏ½π
π: Interference power adopted by interferer
ππ
π
πΊππ
π
π»π
: Channel gain between interferer πππand
the interfered cluster head π»π
πΆππ
πΈπ
: Channel capacity from member sensornode π
πto eavesdropper πΈ
π, πΈπβ Eπ
πΊππ
π
πΈπ
: Channel gain between interferer πππand
eavesdropper πΈπ, πΈπβ Eπ
πΆ(ππ): Secrecy rate between member sensor node
ππadopting a power level π
πand its
responsibleG = (S,P,U): Our secrecy rate game towards WSNsP: Set of strategy profiles for all member
sensor nodesPπ: Set of pure power level strategies available
to member sensor node ππ
U: Set of utilitiesπ(ππ, ποΏ½οΏ½): Utility function for member sensor node
ππadopting power level π
πwhen its
opponentπΌ: Cost parameter reflecting the degree of a
member sensor node consuming energyfor transmission
ππ(π‘): Fraction of member sensor nodes using
power level strategy π at time π‘
π(π‘): State of the whole WSNs at time π‘
ππ(π‘): Fitness of member sensor nodes adopting
power level strategy π at time π‘
π(π‘): Average fitness of the whole WSNs at timeπ‘
ππ(π‘): Expected secrecy rate of member sensor
nodes adopting power level strategy π attime π‘
π(π‘): Average secrecy rate of the whole WSNs attime π‘
ππ(π): Average review rate of member sensor
nodes using power level strategy π
ππ
π(π): Probability of a reviewing member sensor
node changing from power level strategy π
to π
π: Probability distribution functionππ(π‘): Fraction of member sensor nodes in the
downsized population using power levelstrategy π at time π‘
π(π‘): State of the downsized population at time π‘
πππ: Notation simple to denote equation
π(ππ(π‘) β π
π(π‘)) β π(π
π(π‘) β π
π(π‘))
π½ππ: Element of Jacobian matrix J
12 International Journal of Distributed Sensor Networks
ππ»and π
πΏ: High and low power levels in the
example of the secrecy rate game,respectively
ππ»π»
, ππ»πΏ
, ππΏπ»
, and ππΏπΏ: Notations simple to denoteπ(ππ», ππ»), π(ππ», ππΏ), π(ππΏ, ππ»),
and π(ππΏ, ππΏ), respectively.
Conflict of Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper.
Acknowledgments
This work was supported by National Natural Science Foun-dation of China under Grant no. 61272034, by ZhejiangProvincial Natural Science Foundation of China underGrants LY13F030012 and LY13F020035, and by Science Foun-dation of Shaoxing University under Grant no. 20145021.
References
[1] X. Chen, K. Makki, K. Yen, and N. Pissinou, βSensor networksecurity: a survey,β IEEECommunications Surveys andTutorials,vol. 11, no. 2, pp. 52β73, 2009.
[2] H. V. Poor, βInformation and inference in the wireless physicallayer,β IEEE Wireless Communications, vol. 19, no. 1, pp. 40β47,2012.
[3] A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L.Swindlehurst, βPrinciples of physical layer security in multiuserwireless networks: a survey,β IEEE Communications Surveys andTutorials, vol. 16, no. 3, pp. 1550β1573, 2014.
[4] A. D. Wyner, βThe wire-tap channel,βThe Bell System TechnicalJournal, vol. 54, no. 8, pp. 1355β1387, 1975.
[5] S. K. Leung-Yan-Cheong and M. E. Hellman, βThe Gaussianwire-tap channel,β IEEE Transactions on Information Theory,vol. 24, no. 4, pp. 451β456, 1978.
[6] I. Csiszar and J. Korner, βBroadcast channels with confidentialmessages,β IEEETransactions on InformationTheory, vol. 24, no.3, pp. 339β348, 1978.
[7] Z. H. Awan, A. Zaidi, and L. Vandendorpe, βSecure com-munication over parallel relay channel,β IEEE Transactions onInformation Forensics and Security, vol. 7, no. 2, pp. 359β371,2012.
[8] Y. Liang and H. V. Poor, βMultiple-access channels with con-fidential messages,β IEEE Transactions on Information Theory,vol. 54, no. 3, pp. 976β1002, 2008.
[9] R. Liu, I. Maric, P. Spasojevic, and R. D. Yates, βDiscretememoryless inference and broadcast channels with confidentialmessages: secrecy rate regions,β IEEE Transactions on Informa-tion Theory, vol. 54, no. 6, pp. 2493β2507, 2008.
[10] S. Gerbracht, C. Scheunert, and E. A. Jorswieck, βSecrecyoutage in MISO systems with partial channel information,βIEEE Transactions on Information Forensics and Security, vol. 7,no. 2, pp. 704β716, 2012.
[11] S. Shafiee, N. Liu, and S. Ulukus, βTowards the secrecy capacityof the gaussian MIMO wire-tap channel: the 2-2-1 channel,βIEEE Transactions on Information Theory, vol. 55, no. 9, pp.4033β4039, 2009.
[12] L. Lai, H. El Gamal, and H. V. Poor, βThe wiretap channel withfeedback: encryption over the channel,β IEEE Transactions onInformation Theory, vol. 54, no. 11, pp. 5059β5067, 2008.
[13] L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, βImprovingwireless physical layer security via cooperating relays,β IEEETransactions on Signal Processing, vol. 58, no. 3, pp. 1875β1888,2010.
[14] J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, βJoint relayand jammer selection for secure two-way relay networks,β IEEETransactions on Information Forensics and Security, vol. 7, no. 1,pp. 310β320, 2012.
[15] N. Romero-Zurita, M. Ghogho, and D. McLernon, βPhysicallayer security of MIMO-OFDM systems by beamforming andartificial noise generation,β Physical Communication, vol. 4, no.4, pp. 313β321, 2011.
[16] S. A. A. Fakoorian and A. L. Swindlehurst, βMIMO interferencechannel with confidential messages: achievable secrecy ratesand precoder design,β IEEE Transactions on Information Foren-sics and Security, vol. 6, no. 3, pp. 640β649, 2011.
[17] W. Saad, Z. Han, T. Basar, M. Debbah, and A. HjΓΈrungnes,βDistributed coalition formation games for secure wirelesstransmission,β Mobile Networks and Applications, vol. 16, no. 2,pp. 231β245, 2011.
[18] Y. Wu and K. J. R. Liu, βAn information secrecy game incognitive radio networks,β IEEE Transactions on InformationForensics and Security, vol. 6, no. 3, pp. 831β842, 2011.
[19] M. Yuksel, X. Liu, and E. Erkip, βA secure communication gamewith a relay helping the eavesdropper,β IEEE Transactions onInformation Forensics and Security, vol. 6, no. 3, pp. 818β830,2011.
[20] Q. Zhu, W. Saad, Z. Han, H. V. Poor, and T. Basar, βEaves-dropping and jamming in next-generation wireless networks:a game-theoretic approach,β in Proceedings of the Military Com-munications Conference (MILCOM β11), pp. 119β124, November2011.
[21] Z. Han, N. Marina, M. Debbah, and A. HjΓΈrungnes, βPhysicallayer security game: interaction between source, eavesdropper,and friendly jammer,β Eurasip Journal on Wireless Communi-cations and Networking, vol. 2009, Article ID 452907, 10 pages,2009.
[22] S. A. Fakoorian and A. L. Swindlehurst, βCompeting for secrecyin the MISO interference channel,β IEEE Transactions on SignalProcessing, vol. 61, no. 1, pp. 170β181, 2013.
[23] A. Mukherjee and A. L. Swindlehurst, βJamming games in theMIMO wiretap channel with an active eavesdropper,β IEEETransactions on Signal Processing, vol. 61, no. 1, pp. 82β91, 2013.
[24] F. Gabry, N. Li, N. Schrammar, M. Girnyk, L. K. Rasmussen,and M. Skoglund, βOn the optimization of the secondarytransmitterβs strategy in cognitive radio channels with secrecy,βIEEE Journal on Selected Areas in Communications, vol. 32, no.3, pp. 451β463, 2014.
[25] R. Zhang, L. Song, Z. Han, and B. Jiao, βPhysical layer securityfor two-way untrusted relaying with friendly jammers,β IEEETransactions on Vehicular Technology, vol. 61, no. 8, pp. 3693β3704, 2012.
[26] Z. Liu, Y. Shang, R. Zhang, and H. Xiang, βRelay selectionbased on coalitional game for secure wireless networks,β IETCommunications, vol. 8, no. 8, pp. 1355β1363, 2014.
[27] L. Chen and J. Leneutre, βFight jamming with jammingβagame theoretic analysis of jamming attack in wireless networksand defense strategy,β Computer Networks, vol. 55, no. 9, pp.2259β2270, 2011.
International Journal of Distributed Sensor Networks 13
[28] R. Machado and S. Tekinay, βA survey of game-theoreticapproaches in wireless sensor networks,β Computer Networks,vol. 52, no. 16, pp. 3047β3061, 2008.
[29] H.-Y. Shi, W.-L. Wang, N.-M. Kwok, and S.-Y. Chen, βGametheory for wireless sensor networks: a survey,β Sensors, vol. 12,no. 7, pp. 9055β9097, 2012.
[30] S. Shen, G. Yue, Q. Cao, and F. Yu, βA survey of game theory inwireless sensor networks security,β Journal of Networks, vol. 6,no. 3, pp. 521β532, 2011.
[31] S. Shen, Y. Li, H. Xu, andQ. Cao, βSignaling game based strategyof intrusion detection in wireless sensor networks,β Computersand Mathematics with Applications, vol. 62, no. 6, pp. 2404β2416, 2011.
[32] S. Shen, R. Han, L. Guo, W. Li, and Q. Cao, βSurvivabilityevaluation towards attacked WSNs based on stochastic gameand continuous-time Markov chain,β Applied Soft ComputingJournal, vol. 12, no. 5, pp. 1467β1476, 2012.
[33] S. Shen, H. Li, R. Han, A. V. Vasilakos, Y. Wang, and Q. Cao,βDifferential game-based strategies for preventing malwarepropagation in wireless sensor networks,β IEEE Transactions onInformation Forensics and Security, vol. 9, no. 11, pp. 1962β1973,2014.
[34] M. A. Khan, H. Tembine, and A. V. Vasilakos, βEvolutionarycoalitional games: design and challenges in wireless networks,βIEEE Wireless Communications, vol. 19, no. 2, pp. 50β56, 2012.
[35] S. Moretti and A. V. Vasilakos, βAn overview of recent applica-tions of game theory to bioinformatics,β Information Sciences,vol. 180, no. 22, pp. 4312β4322, 2010.
[36] B. Q. Zhao, J. C. S. Lui, and D.-M. Chiu, βA mathematicalframework for analyzing adaptive incentive protocols in P2Pnetworks,β IEEE/ACM Transactions on Networking, vol. 20, no.2, pp. 367β380, 2012.
[37] H. Tembine, E. Altman, R. El-Azouzi, and Y. Hayel, βEvolution-ary games in wireless networks,β IEEE Transactions on Systems,Man, and Cybernetics, Part B: Cybernetics, vol. 40, no. 3, pp.634β646, 2010.
[38] M. P. Anastasopoulos, D. K. Petraki, R. Kannan, and A. V.Vasilakos, βTCP Throughput adaptation in wimax networksusing replicator dynamics,β IEEE Transactions on Systems, Man,and Cybernetics, Part B: Cybernetics, vol. 40, no. 3, pp. 647β655,2010.
[39] M. A. Khan, H. Tembine, and A. V. Vasilakos, βGame dynamicsand cost of learning in heterogeneous 4G networks,β IEEEJournal on Selected Areas in Communications, vol. 30, no. 1, pp.198β213, 2012.
[40] Y. Wang, A. Nakao, and A. V. Vasilakos, βOn modeling ofcoevolution of strategies and structure in autonomous overlaynetworks,β ACM Transactions on Autonomous and AdaptiveSystems, vol. 7, no. 2, article 17, 25 pages, 2012.
[41] D. Niyato and E. Hossain, βDynamics of network selectionin heterogeneous wireless networks: an evolutionary gameapproach,β IEEE Transactions on Vehicular Technology, vol. 58,no. 4, pp. 2008β2017, 2009.
[42] B. Wang, K. J. R. Liu, and T. C. Clancy, βEvolutionary coop-erative spectrum sensing game: how to collaborate?β IEEETransactions on Communications, vol. 58, no. 3, pp. 890β900,2010.
[43] K. Zhu, D. Niyato, P. Wang, and Z. Han, βDynamic spectrumleasing and service selection in spectrum secondary marketof cognitive radio networks,β IEEE Transactions on WirelessCommunications, vol. 11, no. 3, pp. 1136β1145, 2012.
[44] W. Wang, M. Chatterjee, and K. Kwiat, βCooperation in wire-less networks with unreliable channels,β IEEE Transactions onCommunications, vol. 59, no. 10, pp. 2808β2817, 2011.
[45] Z. Chen, Y. Qiu, J. Liu, and L. Xu, βIncentive mechanism forselfish nodes in wireless sensor networks based on evolutionarygame,β Computers and Mathematics with Applications, vol. 62,no. 9, pp. 3378β3388, 2011.
[46] L. Lai and H. El Gamal, βThe relay-eavesdropper channel:cooperation for secrecy,β IEEE Transactions on InformationTheory, vol. 54, no. 9, pp. 4005β4019, 2008.
[47] Q. Li and W.-K. Ma, βOptimal and robust transmit designsfor MISO channel secrecy by semidefinite programming,β IEEETransactions on Signal Processing, vol. 59, no. 8, pp. 3799β3812,2011.
[48] J. Huang and A. L. Swindlehurst, βRobust secure transmissionin MISO channels based on worst-case optimization,β IEEETransactions on Signal Processing, vol. 60, no. 4, pp. 1696β1707,2012.
[49] S. Fischer and B. Vocking, βAdaptive routing with stale infor-mation,βTheoretical Computer Science, vol. 410, no. 36, pp. 3357β3371, 2009.
[50] S. De, C. Qiao, D. A. Pados, M. Chatterjee, and S. J. Philip,βAn integrated cross-layer study of wireless CDMA sensornetworks,β IEEE Journal on Selected Areas in Communications,vol. 22, no. 7, pp. 1271β1285, 2004.
[51] S. Sengupta, M. Chatterjee, and K. A. Kwiat, βA game theoreticframework for power control in wireless sensor networks,β IEEETransactions on Computers, vol. 59, no. 2, pp. 231β242, 2010.
[52] J. W. Weibull, Evolutionary Game Theory, MIT Press, Cam-bridge, Mass, USA, 1995.
[53] D. Fudenberg and D. K. Levine, The Theory of Learning inGames, vol. 2 of MIT Press Series on Economic Learning andSocial Evolution, MIT Press, Cambridge, UK, 1998.
[54] R. Cressman, Evolutionary Dynamics and Extensive formGames, vol. 5 of MIT Press Series on Economic Learning andSocial Evolution, MIT Press, Cambridge, Mass, USA, 2003.
International Journal of
AerospaceEngineeringHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
RoboticsJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Active and Passive Electronic Components
Control Scienceand Engineering
Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
International Journal of
RotatingMachinery
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporation http://www.hindawi.com
Journal ofEngineeringVolume 2014
Submit your manuscripts athttp://www.hindawi.com
VLSI Design
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Shock and Vibration
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Civil EngineeringAdvances in
Acoustics and VibrationAdvances in
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Electrical and Computer Engineering
Journal of
Advances inOptoElectronics
Hindawi Publishing Corporation http://www.hindawi.com
Volume 2014
The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014
SensorsJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Modelling & Simulation in EngineeringHindawi Publishing Corporation http://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Chemical EngineeringInternational Journal of Antennas and
Propagation
International Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Navigation and Observation
International Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
DistributedSensor Networks
International Journal of