research article evolutionary game-based secrecy rate...

14
Research Article Evolutionary Game-Based Secrecy Rate Adaptation in Wireless Sensor Networks Guanxiong Jiang, 1 Shigen Shen, 1,2 Keli Hu, 1 Longjun Huang, 1,3 Hongjie Li, 2 and Risheng Han 2 1 Department of Computer Science and Engineering, Shaoxing University, Shaoxing 312000, China 2 College of Mathematics, Physics and Information Engineering, Jiaxing University, Jiaxing 314001, China 3 College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou 310014, China Correspondence should be addressed to Guanxiong Jiang; [email protected] Received 22 December 2014; Revised 26 February 2015; Accepted 4 March 2015 Academic Editor: Chuan-Ming Liu Copyright Β© 2015 Guanxiong Jiang et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Physical layer security, whose aim is to maximize the secrecy rate of a source while keeping eavesdroppers ignorant of data transmitted, is extremely suitable for Wireless Sensor Networks (WSNs). We therefore, by developing the classical wire-tap channel, construct an approach to compute the secrecy rate between a sensor node and its responsible cluster head in the clustered WSNs. A noncooperative secrecy rate game towards WSNs is formulated to solve contradictions between maximizing the secrecy rate of a sensor node and minimizing power consumed for data transmission. Using evolutionary game theory, we set up a selection dynamics upon which a power level can be adaptively selected by a sensor node. us, the objective of secrecy rate adaptation for maximizing the fitness of member sensor nodes is achieved. We also prove the game is stable; that is, there exist evolutionarily stable strategies (ESSs) that explain which strategies will be selected by a sensor node in the end. Moreover, a corresponding algorithm of secrecy rate adaptation is given. Numerical experiments show our proposed approach can adaptively adjust the secrecy rate of a sensor node, which provides a novel way to guarantee the confidentiality of WSNs. 1. Introduction Providing security for Wireless Sensor Networks (WSNs) is challenging, due to the characteristics of wireless com- munications, limited resources of sensor nodes, dense and enormous networks, as well as the unattended environments where sensor nodes are prone to physical attacks. A large number of security approaches [1] such as cryptography, attack detection, and secure routing have been proposed to defend various threats and vulnerabilities in WSNs. Different to these traditional methods, physical layer (PHY) security [2, 3] using the physical properties of the radio channel to help provide secure wireless communications is currently attracting considerable attention. is approach is extremely suitable for WSNs since it achieves security through taking advantage of the fundamental ability of the physical layer, not adding extra components. e main idea of PHY security is to maximize the rate of reliable information from a source to a destination, while keeping eavesdroppers ignorant of data transmitted. is rate is referred to as secrecy rate and its maximum reliable value for a channel is known as secrecy capacity. Wyner [4] in his pioneering work introduced a wire-tap channel and showed that perfect secrecy could be attained even without the application of shared secrets. Since its inception, secrecy capacity has been fundamentally devel- oped in other channels including Gaussian wire-tap channel [5], broadcast channel [6], relay channel [7], multiple-access channel [8], interference channel [9], multiple-input single- output (MISO) channel [10], multiple-input multiple-output (MIMO) channel [11], and feedback channel [12]. Along with the foundation of secrecy capacity in vari- ous channels, a recent trend of long-standing interest has emerged in how to improve PHY security under the same Hindawi Publishing Corporation International Journal of Distributed Sensor Networks Volume 2015, Article ID 975454, 13 pages http://dx.doi.org/10.1155/2015/975454

Upload: others

Post on 18-Mar-2021

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Research Article Evolutionary Game-Based Secrecy Rate ...downloads.hindawi.com/journals/ijdsn/2015/975454.pdftime slot the cluster head aggregates the data received and sends them

Research ArticleEvolutionary Game-Based Secrecy Rate Adaptation inWireless Sensor Networks

Guanxiong Jiang,1 Shigen Shen,1,2 Keli Hu,1 Longjun Huang,1,3

Hongjie Li,2 and Risheng Han2

1Department of Computer Science and Engineering, Shaoxing University, Shaoxing 312000, China2College of Mathematics, Physics and Information Engineering, Jiaxing University, Jiaxing 314001, China3College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou 310014, China

Correspondence should be addressed to Guanxiong Jiang; [email protected]

Received 22 December 2014; Revised 26 February 2015; Accepted 4 March 2015

Academic Editor: Chuan-Ming Liu

Copyright Β© 2015 Guanxiong Jiang et al. This is an open access article distributed under the Creative Commons AttributionLicense, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properlycited.

Physical layer security, whose aim is to maximize the secrecy rate of a source while keeping eavesdroppers ignorant of datatransmitted, is extremely suitable forWireless Sensor Networks (WSNs).We therefore, by developing the classical wire-tap channel,construct an approach to compute the secrecy rate between a sensor node and its responsible cluster head in the clustered WSNs.A noncooperative secrecy rate game towards WSNs is formulated to solve contradictions between maximizing the secrecy rateof a sensor node and minimizing power consumed for data transmission. Using evolutionary game theory, we set up a selectiondynamics upon which a power level can be adaptively selected by a sensor node. Thus, the objective of secrecy rate adaptation formaximizing the fitness ofmember sensor nodes is achieved.We also prove the game is stable; that is, there exist evolutionarily stablestrategies (ESSs) that explain which strategies will be selected by a sensor node in the end. Moreover, a corresponding algorithmof secrecy rate adaptation is given. Numerical experiments show our proposed approach can adaptively adjust the secrecy rate of asensor node, which provides a novel way to guarantee the confidentiality of WSNs.

1. Introduction

Providing security for Wireless Sensor Networks (WSNs)is challenging, due to the characteristics of wireless com-munications, limited resources of sensor nodes, dense andenormous networks, as well as the unattended environmentswhere sensor nodes are prone to physical attacks. A largenumber of security approaches [1] such as cryptography,attack detection, and secure routing have been proposed todefend various threats and vulnerabilities inWSNs. Differentto these traditional methods, physical layer (PHY) security[2, 3] using the physical properties of the radio channel tohelp provide secure wireless communications is currentlyattracting considerable attention. This approach is extremelysuitable for WSNs since it achieves security through takingadvantage of the fundamental ability of the physical layer, notadding extra components.

The main idea of PHY security is to maximize therate of reliable information from a source to a destination,while keeping eavesdroppers ignorant of data transmitted.This rate is referred to as secrecy rate and its maximumreliable value for a channel is known as secrecy capacity.Wyner [4] in his pioneering work introduced a wire-tapchannel and showed that perfect secrecy could be attainedeven without the application of shared secrets. Since itsinception, secrecy capacity has been fundamentally devel-oped in other channels including Gaussian wire-tap channel[5], broadcast channel [6], relay channel [7], multiple-accesschannel [8], interference channel [9], multiple-input single-output (MISO) channel [10], multiple-input multiple-output(MIMO) channel [11], and feedback channel [12].

Along with the foundation of secrecy capacity in vari-ous channels, a recent trend of long-standing interest hasemerged in how to improve PHY security under the same

Hindawi Publishing CorporationInternational Journal of Distributed Sensor NetworksVolume 2015, Article ID 975454, 13 pageshttp://dx.doi.org/10.1155/2015/975454

Page 2: Research Article Evolutionary Game-Based Secrecy Rate ...downloads.hindawi.com/journals/ijdsn/2015/975454.pdftime slot the cluster head aggregates the data received and sends them

2 International Journal of Distributed Sensor Networks

surroundings. These include methods such as cooperationrelays [13], joint relay and jammer selection [14], chan-nel frequency selectivity [15], and game theory [16–26].In practice, during the process of transmitting data, thetransmission power is a key factor that influences the secrecyrate of a source. From a noncooperative perspective, eachsensor node, due to its selfishness, attempts to increaseits transmission power for maximizing its secrecy rate inresponse to actions of the other sensor nodes. In this manner,it will however cause more and more interference to theother nodes and consume its own energy extraordinarily.These interactions among sensor nodes naturally result inapplications of game theory.

As an efficient method to solve problems of optimalstrategies, game theory provides a rich set of mathematicaltools for investigating the multiperson strategic decision-making, which has been broadly employed inWSNs security[27–33]. It is generally assumed that players in the classicalgame theory have complete information about the gameand about behaviors of opponents and must act completelyrationally. Distinguishable to these assumptions, evolution-ary game theory (EGT) to be borrowed in this paper imaginesthat conditioned players who are randomly drawn from alarge population play the game repeatedly. Moreover, overtime players have the opportunity to optimize their individualutilities by reacting to simple observations from their oppo-nents. This nature satisfies the requirement for the currentlarge-scale wireless networks with characteristics of self-organization, self-configuration, and self-optimization.Thus,many researchers are currently engaged in developing EGTbased schemes [34, 35]. Typical examples exist in evaluatingan incentive protocol [36], adjusting multiple-access controland power control [37], maximizing TCP throughout [38],learning for an optimal strategy [39], coevolving rationalstrategies [40], implementing network selection [41], sensingthe spectrum collaboratively [42], selecting dynamic service[43], enforcing cooperation among network nodes [44],promoting the selfish nodes to cooperatewith each other [45],and so forth.

Up to now, there are some papers on combining secrecycapacity with game theory in different environments. Thework in [19] formulates a noncooperative game between asource and a jammer relay for achieving the optimal secrecyrate of the source. Also, a noncooperative game betweenwireless users and a malicious node is introduced in [20],where the wireless users, through choosing a relay station,are to maximize a utility function considering their mutualinterference and security of the chosen path whereas themalicious node is to reduce the overall network’s secrecycapacity. From the perspective of information theory, thework in [22] provides a mathematical formulation for thenoncooperative zero-sumgame existed in the two-userMISOGaussian interference channel with confidential messages. In[23] the authors model a two-person zero-sum gamewith theergodicMIMO secrecy rate as the payoff function, in order toexamine the trade-offs for the legitimate transmitter and theadversary. Since cooperation, on the contrary, is capable ofimproving PHY security, the work in [21] introduces friendlyjammers to interfere with the eavesdropper to increase the

secrecy rate of a source. A Stackelberg game is investigatedto reflect interactions between the source that pays jammersfor their interference and jammers who charge the sourcewith a certain price for the jamming. Different from [21], aStackelberg game [18] between primary users and secondaryusers in cognitive radio networks is modeled to maximizetransmission rates of secondary users. Consequently, primaryusers’ secrecy rates are improved with the help of trustworthysecondary users. Besides, typical examples of the Stackelberggame exist in analyzing the cooperation between the primaryand secondary transmitters in cognitive radio channels [24]and formulating the sources and the friendly jammers in atwo-way relay system as a power control scheme to achievethe optimized secrecy rate of the sources [25]. Moreover, anontransferable coalitional game [17], as one of cooperativegames, is applied to achieve secrecy rate gains from coop-eration in the presence of a cost for information exchange.The work in [26] formulates the relay selection in a two-stagedecode-and-forward cooperative network as a coalitionalgame with transferable utility, which decreases the compu-tation complexity in solving the distributed relay selectionproblem. In addition, the cooperative Kalai-Smorodinskybargaining game [16] is adopted, for transmitters with theMIMO channel, to find an operating point that balancesnetwork performance and fairness. This point allows trans-mitters to adjust their precoders appropriately and thusimproves the overall secrecy capacity of the network.

To the best of our knowledge, this paper is the first work tofocus on exploring secrecy rate adaptation in WSNs with theidea of EGT.Wefirst extend the classical secrecy rate equationto fit for the WSNs. We are thus able to understand whatparameters will influence the secrecy rate inWSNs.Then, wesolve the decision-making problem among sensor nodes formaximizing their utilities through a noncooperative secrecyrate game.The replicator dynamics is applied to illustrate theevolution process how sensor nodes select adaptively theirpower level strategies and achieve their adaptation of secrecyrate.

Compared with the related works mentioned herein,there are some distinctions in this paper. We concentrateclearly on the secrecy rate between a sensor node and itsresponsible cluster head in the clustered WSNs, while manyother channels are considered in [4–12, 46–48]. We employEGT to disclose the dynamics of secrecy rate adaptation forsensor nodes, while EGT is applied to other fields [34, 36–44, 49]. Our eventual objective is to maximize the fitnessof sensor nodes while several current works [16–21] makeuse of various games to improve PHY security for differentsurroundings. Therefore, our contributions lie mainly in thefollowing aspects:

(1) considering the interference environment, we con-struct an approach to compute the secrecy ratebetween a sensor node and its responsible clusterhead by developing the classical wire-tap channel [4,5], which is suitable for the clustered WSNs;

(2) we formulate a noncooperative secrecy rate gametowards WSNs, which is able to reflect interactionsamong sensor nodes and the cost of energy consumed

Page 3: Research Article Evolutionary Game-Based Secrecy Rate ...downloads.hindawi.com/journals/ijdsn/2015/975454.pdftime slot the cluster head aggregates the data received and sends them

International Journal of Distributed Sensor Networks 3

for transmitting data. Solving the game will helpsensor nodes, by maximizing their utilities, to selecttheir power level strategies correctly;

(3) we attain, from the view of EGT, a selection dynamicsthat promotes sensor nodes to seek a power levelstrategy with higher fitness, as well as ESSs for thegame to describe which power level strategies willbe adopted by mutants in the end. The secrecy rateadaptation for sensor nodes is thus achieved.

The rest of this paper is organized as follows. In Section 2,we discuss the network surroundings to be studied andcompute the secrecy rate between a sensor node and itsresponsible cluster head in the clustered WSNs. In Section 3,a noncooperative secrecy rate game towards WSNs is setup. Moreover, secrecy rate dynamics and ESSs for the gameare explored. In addition, an algorithm is introduced todescribe how to adjust adaptively secrecy rate of sensornodes. In Section 4, by performing numerical experimentsin an example of the secrecy rate game, we illustrate theinfluence of a cost parameter, as well as the correspondingESSs. Moreover, the process of secrecy rate adaptation forsensor nodes is disclosed. Finally, a conclusion is provided inSection 5.

2. System Model

2.1. Interference among Sensor Nodes. Multiple-access chan-nels based WSNs are under consideration in this paper. Itis well known that multiaccess interference is a significantfactor to reduce the performance of such networks. Lack ofcoordination among sensor nodes will lead to a great numberof interfering power from their neighbors, even if each sensornode transmits signals at the lowest required power to itsdestination.

To attain the number of interferers for a particular sensornode, we use the assumptions as follows. We assume theWSNs are composed of static and identical sensor nodes thatare uniformly scattered with node density 𝜌 on a 2D grid.Each of sensor nodes is equipped with an omnidirectionaltransmitting and receiving antenna of the same gain andoperates in a half-duplex way; that is, receiving and trans-mitting simultaneously are not allowed. The receiving andinterfering ranges rely on the transmission powers of a sourceand the other sensor nodes in the same zone. Let π‘Ÿ

𝑅be the

receiving distance that means the maximum distance fromwhich a receiving sensor node is able to recover correctlya signal transmitted, and let π‘Ÿ

𝐼be the interfering distance

denoting the maximum distance from which a receivingsensor node can sense carriers. Typically, π‘Ÿ

πΌβ‰ˆ 2π‘Ÿπ‘…[50].

Moreover, in order to sendmessages successfully, each sensornode is capable of selecting an appropriate power level.

For a given sensor node, we now describe the numberof its interferers. We employ Poisson distribution, due toits mathematical tractability, to estimate approximately thedistribution of sensor nodes. In general, the maximumnumber of interferers should be computed in terms of themean value and several times of standard deviation √𝜎. Forinstance, if we were to account for 99.6 percent of all sensor

Cluster headBase station

Member sensor nodeEavesdropper

Β· Β· Β· Β· Β· Β·

Β· Β· Β·

Β· Β· Β·

H1Hn

Sm

Sm

1

β„°m

Sm

Iπ‘š

Figure 1: Network model.

nodes, then we have to consider 3 Γ— √𝜎 in addition to themean [51]. For any sensor node, its interference zone is 𝑧

𝐼=

πœ‹π‘Ÿ2

𝐼, and its mean number of sensor nodes in zone 𝑧

𝐼is πœŒπ‘§πΌ.

In addition, the variance 𝜎 for Poisson distribution is equalto πœŒπ‘§πΌ. Therefore, the maximum number of interferers to any

sensor node can be denoted by

𝐼 = πœŒπ‘§πΌ+ 3βˆšπœŒπ‘§

𝐼. (1)

2.2. Secrecy Rate in Clustered WSNs. The topology to bestudied, as depicted in Figure 1, is based on the clusteredstructure due to its popularity. By using clustering, all sensornodes are grouped into different clusters. Each cluster hasa coordinator, referred to as cluster head, and a number ofother sensor nodes as members, calledmember sensor nodes.This clustering leads to a two-tier hierarchy, where clusterheads construct the higher tier while member sensor nodesform the lower tier. In this hierarchy, a time-slotted datatransmission scheme is adopted. In the first time slot, datacaptured by member sensor nodes in the same cluster aretransmitted to the responsible cluster head, then in the secondtime slot the cluster head aggregates the data received andsends them to the base station through other cluster heads.Note that, for simplicity, our work is focused on the secrecyrate between a member sensor node and its responsiblecluster head in the first time slot.

Let S, H, and E be sets of 𝑀 member sensor nodes,𝑁 cluster nodes, and 𝐾 eavesdroppers, respectively. Thus,S = {𝑆

1, 𝑆2, . . . , 𝑆

𝑀}, H = {𝐻

1, 𝐻2, . . . , 𝐻

𝑁}, and E =

{𝐸1, 𝐸2, . . . , 𝐸

𝐾}. For any member sensor node 𝑆

π‘š, π‘†π‘š

∈ S,there exists a uniquely responsible cluster head 𝐻

𝑛, π»π‘›βˆˆ H,

where 𝑛 is in fact determined by π‘š; there also exist severaleavesdroppers, each of which is denoted by 𝐸

π‘˜, πΈπ‘˜

∈ Eπ‘š,

Eπ‘š

βŠ† E, where Eπ‘š

is the set of eavesdroppers capableof listening in on data sensed by 𝑆

π‘š. Channel gains from

π‘†π‘što 𝐻𝑛and 𝐸

π‘˜are denoted by 𝐺

π‘†π‘š

𝐻𝑛

and πΊπ‘†π‘š

πΈπ‘˜

, respectively.For simplicity, all thermal noise powers at cluster heads andeavesdroppers are denoted by πœ‚

2. In addition, each channelbandwidth is π‘Š.

Page 4: Research Article Evolutionary Game-Based Secrecy Rate ...downloads.hindawi.com/journals/ijdsn/2015/975454.pdftime slot the cluster head aggregates the data received and sends them

4 International Journal of Distributed Sensor Networks

Due to the broadcast nature of channels, a cluster headendures a collision of signals from some member sensornodes that are transmitting their data simultaneously. Wetreat these signals from member sensor nodes other thanthe target source as additive interference and compute thenumber of these interferers according to (1). For any membersensor node 𝑆

π‘š, π‘†π‘š

∈ S, let Sπ‘šbe the set of its interferers

whose element is denoted by π‘†π‘š

𝑖, 𝑖 ∈ {1, 2, . . . , 𝐼

π‘š}, where

πΌπ‘š

denoting the number of interferers of π‘†π‘š

comes from(1). Thus, S

π‘š= {π‘†π‘š

1, π‘†π‘š

2, . . . , 𝑆

π‘š

πΌπ‘š

}. Following the idea of theclassical wire-tap channel [4, 5], the channel capacity frommember sensor node 𝑆

π‘što its corresponding cluster head𝐻

𝑛,

denoted by πΆπ‘†π‘š

𝐻𝑛

, can be given by

πΆπ‘†π‘š

𝐻𝑛

= π‘Š log2(1 +

π‘ƒπ‘šπΊπ‘†π‘š

𝐻𝑛

βˆ‘πΌπ‘š

𝑖=1οΏ½οΏ½π‘š

π‘–πΊπ‘†π‘š

𝑖

𝐻𝑛

+ πœ‚2) , (2)

where π‘ƒπ‘šis the transmission power adopted by 𝑆

π‘š, π‘†π‘š

∈

S, οΏ½οΏ½π‘šπ‘–

is the interference power adopted by π‘†π‘š

𝑖, π‘†π‘šπ‘–

∈ Sπ‘š,

and πΊπ‘†π‘š

𝑖

𝐻𝑛

is the channel gain between interferer π‘†π‘š

𝑖and the

interfered cluster head 𝐻𝑛.

Similarly, the channel capacity frommember sensor nodeπ‘†π‘što eavesdropper 𝐸

π‘˜, πΈπ‘˜

∈ Eπ‘š, denoted by 𝐢

π‘†π‘š

πΈπ‘˜

, can begiven by

πΆπ‘†π‘š

πΈπ‘˜

= π‘Š log2(1 +

π‘ƒπ‘šπΊπ‘†π‘š

πΈπ‘˜

βˆ‘πΌπ‘š

𝑖=1οΏ½οΏ½π‘š

π‘–πΊπ‘†π‘š

𝑖

πΈπ‘˜

+ πœ‚2) , (3)

where πΊπ‘†π‘š

𝑖

πΈπ‘˜

is the channel gain between interferer π‘†π‘š

𝑖and

eavesdropperπΈπ‘˜,πΈπ‘˜βˆˆ Eπ‘š.The secrecy rate betweenmember

sensor node π‘†π‘šand its responsible cluster head𝐻

𝑛, thus, can

be defined as (in fact, this scenario can be regarded as πΌπ‘š-

user interference channel with |Eπ‘š| external eavesdroppers,

where |Eπ‘š| is the number of eavesdroppers who are able to

listen in data sensed by π‘†π‘š)

𝐢 (π‘ƒπ‘š) = (𝐢

π‘†π‘š

𝐻𝑛

βˆ’ maxπΈπ‘˜βˆˆEπ‘š

πΆπ‘†π‘š

πΈπ‘˜

)

+

, (4)

where (π‘₯)+= max{π‘₯, 0}.

3. Joint Secrecy Rate and EGT

3.1. ACompendiumof EGT. Briefly, EGT ismainly concernedabout a dynamic environment where players are continuallyinteracting with others and adapting their strategies basedon their expected payoffs they attain. In EGT, the concept ofpopulation consisting of a group of individuals (i.e., players)is introduced, and expected payoffs are replaced by fitnessof individuals. An individual in an evolutionary game isable to observe the actions of other individuals, learn fromthese observations, and slowly adjust its strategy to attainthe solution in the end. In this manner, we are able tounderstand the dynamics of interactions among individualsin a population.

In fact, the evolutionary process is determined bytwo noticeable elements: a mutation mechanism to providemutants and a selection mechanism to promote somemutantswith higher fitness over others [52]. While the mutationmechanism is described by evolutionary stable strategy (ESS),the selection mechanism is highlighted by replicator dynam-ics. The concept of ESS is to require that the final equilibriummust be capable of repelling all invaders; that is, if a strategyis evolutionarily stable, then it must keep such a quality thatalmost all individuals in the same population follow thisstrategy and mutants hardly invade successfully. This ESSis in fact a refinement of Nash equilibrium. On the otherhand, the replicator dynamics is able to explain and predictthe changeable trend towards population shares associatedwith different pure or mixed strategies. It selects individualsin a fitness proportional fashion. Thus, subpopulations withbetter fitness than the average will grow, while those withworse fitness than the average will be reduced in theirnumbers.

3.2. Secrecy Rate Game towards WSNs

Definition 1. The secrecy rate game towards WSNs that issymmetric consists of a 3-tuple G = (S,P,U), where

(i) S = {𝑆1, 𝑆2, . . . , 𝑆

𝑀} is a set of member sensor nodes

(individuals) in the same WSNs;(ii) P = ∏

𝑀

π‘š=1Pπ‘š

is a set of strategy profiles for allmember sensor nodes, where P

π‘š= {π‘ƒπ‘š

| π‘ƒπ‘š

1, π‘ƒπ‘š

2,

. . . , π‘ƒπ‘š

𝐿}, π‘š ∈ {1, 2, . . . ,𝑀}. Here P

π‘šand 𝐿, respec-

tively, are the set and number of pure power levelstrategies available to member sensor node 𝑆

π‘š, π‘†π‘š

∈

S;(iii) U = {πœ‡(𝑃

π‘š, 𝑃��) | π‘ƒπ‘š

∈ Pπ‘š, 𝑃��

∈ PοΏ½οΏ½, π‘š, οΏ½οΏ½ ∈

{1, 2, . . . ,𝑀}} is a set of utility attained by membersensor node 𝑆

π‘šadopting power level strategy 𝑃

π‘š

when its opponent adopting 𝑃��.

In the secrecy rate game towards WSNs, we consider allmember sensor nodes form a population and regard themas individuals. These individuals are intelligent agents who,during interactions with others, are able to self-adjust theirstrategies according to their current fitness. Their objectivesare to adapt their secrecy rates by maximizing individualfitness.

Due to the interference among sensor nodes, an optimalpower must be allocated to all member sensor nodes. From(4), the secrecy rate of member sensor node 𝑆

π‘šmay be

maximized if π‘†π‘š

transmits its data at its full power. Themember sensor node 𝑆

π‘š, if doing so, will however result

in more interference to its neighboring sensor nodes andwill also consume its own battery largely. The performanceof the WSNs will thus be reduced. Therefore, to meet theseinteractions, we introduce the utility function for membersensor node 𝑆

π‘šas

πœ‡ (π‘ƒπ‘š, 𝑃��) = 𝐢 (𝑃

π‘š) βˆ’ 𝛼𝑃

π‘š, (5)

where 𝐢(π‘ƒπ‘š) is from (4), and 𝛼 is a cost parameter that

reflects the degree of a member sensor node consuming

Page 5: Research Article Evolutionary Game-Based Secrecy Rate ...downloads.hindawi.com/journals/ijdsn/2015/975454.pdftime slot the cluster head aggregates the data received and sends them

International Journal of Distributed Sensor Networks 5

energy for data transmission. Note that the member sensornode adopting 𝑃

οΏ½οΏ½has been included as one of interferers in

the first term of (5). Next, the goal of the secrecy rate gameis to help all individuals select their strategies adaptively sothat the maximum fitness of member sensor nodes can beattained with the minimum expense of their power. Thus,secrecy rate adaptation of a member sensor node, along withthis evolutionary process, is to be achieved.

3.3. Dynamics Analysis on Secrecy Rates of Member SensorNodes. Wenow explore the secrecy rate dynamics ofmembersensor nodes using the replicator dynamics. To begin with, allmember sensor nodes, for transmitting data, select randomlyone of available power levels. Each member sensor node,from the view of noncooperative game theory, expects tomaximize its own fitness. It therefore adjusts periodically itspower level (i.e., its secrecy rate is adjusted) and compares thecorresponding fitness with the average fitness of the wholeWSNs. If a higher value is attained, the member sensor nodechanges its current power level (i.e., its current secrecy rateis changed) to a new one; otherwise, it keeps its currentstrategy unchanged. Letting πœƒ

𝑗(𝑑) (note that here, βˆ€π‘š, οΏ½οΏ½ ∈

{1, 2, . . . ,𝑀}, we assume Pπ‘š

= PοΏ½οΏ½, which is rational due

to the same characteristic of all member sensor nodes. Thisassumption means all member sensor nodes have the sameset of power level strategies; i.e., βˆ€π‘š, οΏ½οΏ½ ∈ {1, 2, . . . ,𝑀}, βˆ€π‘— ∈

{1, 2, . . . , 𝐿}, π‘ƒπ‘šπ‘—

= 𝑃��

𝑗is satisfied, where 𝑃

π‘š

𝑗and 𝑃

οΏ½οΏ½

𝑗denote

member sensor nodes π‘†π‘šand 𝑆

οΏ½οΏ½adopting the same power

level strategy 𝑗) be the fraction ofmember sensor nodes usingpower level strategy 𝑗 at time 𝑑, we have

βˆ‘

π‘—βˆˆPπ‘š

πœƒπ‘— (𝑑) = 1. (6)

The state of the WSNs at time 𝑑, denoted by πœƒ(𝑑), is thenπœƒ(𝑑) = [πœƒ

π‘ƒπ‘š

1

(𝑑), πœƒπ‘ƒπ‘š

2

(𝑑), . . . , πœƒπ‘ƒπ‘š

𝐿

(𝑑)] that can be consideredas a mixed strategy of the WSNs. Let 𝑙 be the power levelstrategy adopted by the opponent 𝑆

οΏ½οΏ½. Thus, referring to [53],

the fitness of member sensor node π‘†π‘šadopting power level

strategy 𝑗 at time 𝑑 is

πœ‡π‘— (𝑑) = βˆ‘

π‘™βˆˆPοΏ½οΏ½

πœƒπ‘™ (𝑑) πœ‡ (𝑗, 𝑙) , (7)

where πœ‡(𝑗, 𝑙) is from (5). The average fitness of the wholeWSNs at time 𝑑 is

πœ‡ (𝑑) = βˆ‘

π‘—βˆˆPπ‘š

πœƒπ‘— (𝑑) πœ‡π‘— (𝑑) . (8)

Correspondingly, we define the expected secrecy rate ofmember sensor node 𝑆

π‘šadopting power level strategy 𝑗 at

time 𝑑 as

πœπ‘— (𝑑) = βˆ‘

π‘™βˆˆPοΏ½οΏ½

πœƒπ‘™ (𝑑) 𝐢 (𝑗) , (9)

where 𝐢(𝑗) is from (4). The average secrecy rate of the wholeWSNs at time 𝑑 is defined as

𝜍 (𝑑) = βˆ‘

π‘—βˆˆPπ‘š

πœƒπ‘— (𝑑) πœπ‘— (𝑑) . (10)

To make use of the idea of the replicator dynamics,we require the rate at which member sensor nodes changetheir strategies. This rate is determined by the performanceof current strategies of member sensor nodes and by thepopulation state. Let π‘Ÿ

𝑗(πœƒ) be the average review rate of

member sensor nodes using power level strategy 𝑗, π‘π‘—π‘ž(πœƒ) (in

particular, 𝑝𝑗𝑗(πœƒ) is the probability that the reviewingmember

sensor nodes adopting power level strategy 𝑗 do not changetheir strategy) be the probability that the reviewing membersensor nodes change from power level strategy 𝑗 to π‘ž. Thus,in the whole WSNs the fraction of the reviewing membersensor nodes changing from power level strategy 𝑗 to π‘ž isπœƒπ‘—(𝑑)π‘Ÿπ‘—(πœƒ)𝑝𝑗

π‘ž(πœƒ). As a result, the outflow from the power level

strategy 𝑗 is

βˆ‘

π‘ž,π‘ž =𝑗

πœƒπ‘— (𝑑) π‘Ÿπ‘— (πœƒ) 𝑝

𝑗

π‘ž(πœƒ) = πœƒ

𝑗 (𝑑) π‘Ÿπ‘— (πœƒ) βˆ‘

π‘ž,π‘ž =𝑗

𝑝𝑗

π‘ž(πœƒ)

= πœƒπ‘— (𝑑) π‘Ÿπ‘— (πœƒ) (1 βˆ’ 𝑝

𝑗

𝑗(πœƒ)) ,

(11)

while the inflow to the power level strategy 𝑗 isβˆ‘π‘ž,π‘ž =𝑗

πœƒπ‘ž(𝑑)π‘Ÿπ‘ž(πœƒ)π‘π‘ž

𝑗(πœƒ). Subtracting the outflow from the

inflow, we can then attain the differential equation as

πœƒπ‘— (𝑑) = βˆ‘

π‘ž,π‘ž =𝑗

πœƒπ‘ž (𝑑) π‘Ÿπ‘ž (πœƒ) 𝑝

π‘ž

𝑗(πœƒ) βˆ’ πœƒ

𝑗 (𝑑) π‘Ÿπ‘— (πœƒ) (1 βˆ’ 𝑝𝑗

𝑗(πœƒ))

= βˆ‘

π‘ž

πœƒπ‘ž (𝑑) π‘Ÿπ‘ž (πœƒ) 𝑝

π‘ž

𝑗(πœƒ) βˆ’ πœƒ

𝑗 (𝑑) π‘Ÿπ‘— (πœƒ) ,

(12)

which constructs the replicator dynamics determining whichpower level strategies will be adaptively selected by amembersensor node.

For a member sensor node, whether or not to switch itspower level is based on the corresponding fitness. Amongthe notations above, we suppose that 𝑗 and π‘ž denote thepower level strategies adopted by the original individuals anda small group of mutants, respectively. Then, the reviewingmember sensor nodes change to the mutant strategy if andonly if the fitness difference observed is positive; that is,πœ‡π‘ž(𝑑) > πœ‡

𝑗(𝑑). This difference between random variables

πœ‡π‘—(𝑑) and πœ‡

π‘ž(𝑑) has a continuously differentiable probability

distribution function πœ™ : R β†’ [0, 1]. The conditionalprobability that member sensor nodes will change to powerlevel strategy π‘ž, given that its original strategy is 𝑗, is thusπœ™(πœ‡π‘ž(𝑑) βˆ’ πœ‡

𝑗(𝑑)). Furthermore, since the probability that

member sensor nodes will select power level strategy π‘ž attime 𝑑 is πœƒ

π‘ž(𝑑), we can attain the resulting conditional choice

probability as

𝑝𝑗

π‘ž(πœƒ) =

{{

{{

{

πœƒπ‘ž (𝑑) πœ™ (πœ‡

π‘ž (𝑑) βˆ’ πœ‡π‘— (𝑑)) , if π‘ž = 𝑗,

1 βˆ’ βˆ‘

π‘ž =𝑗

πœƒπ‘ž (𝑑) πœ™ (πœ‡

π‘ž (𝑑) βˆ’ πœ‡π‘— (𝑑)) , if π‘ž = 𝑗.

(13)

In fact, the choice probabilities in (13) result from indi-vidual differences in preferences acrossmember sensor nodesand not from observation errors made by member sensor

Page 6: Research Article Evolutionary Game-Based Secrecy Rate ...downloads.hindawi.com/journals/ijdsn/2015/975454.pdftime slot the cluster head aggregates the data received and sends them

6 International Journal of Distributed Sensor Networks

nodeswith identical preferences. To isolate the effect of choiceprobabilities, for simplicity, we assume that all review rates areconstantly equal to one; that is,

βˆ€π‘— ∈ Pπ‘š, π‘Ÿπ‘— (πœƒ) ≑ 1. (14)

Substituting (13) and (14) into (12), we can, formember sensornodes, get the selection dynamics as

πœƒπ‘— (𝑑) = πœƒ

𝑗 (𝑑) βˆ‘

π‘ž,π‘ž =𝑗

πœƒπ‘ž (𝑑)

β‹… (πœ™ (πœ‡π‘— (𝑑) βˆ’ πœ‡

π‘ž (𝑑)) βˆ’ πœ™ (πœ‡π‘ž (𝑑) βˆ’ πœ‡

𝑗 (𝑑))) .

(15)

This selection dynamics, determining the selection prob-ability of a power level strategy, will be used to adapt thedecision of a member sensor node and is at the same timeaffected by decisions of the other member sensor nodes.

3.4. Convergence and Stability Analysis on Secrecy Rate Gametowards WSNs

Lemma 2. If a power level strategy 𝑗 is strictly dominant, thenlimπ‘‘β†’βˆž

πœƒπ‘—(𝑑) = 1.

Proof. Thecase that a power level strategy is strictly dominantmeans member sensor nodes with this strategy, irrespectiveof which strategy any of other member sensor nodes chooses,can gain a strictly higher fitness than with any of otherstrategies. This will result in increasing the correspondingfraction in the population. Member sensor nodes employinga strictly dominant strategy will then occupy the wholepopulation over time. Lemma 2 therefore follows.

From Lemma 2, we can attain that member sensor nodeswhose strategies are strictly dominated will vanish eventuallyfrom the population; that is, if a power level strategy 𝑗 isstrictly dominated, then lim

π‘‘β†’βˆžπœƒπ‘—(𝑑) = 0.

Theorem3. TheWSNs population state πœƒ(𝑑) converges to equi-librium.

Proof. It is obvious that member sensor nodes employing dif-ferent power level strategies will attain different fitness underthe same WSNs surroundings. This fact means only onepower level strategy, correspondingly, is endowed with thehighest fitness among all strategies. Ranking all fitness valuesin descending order, we express the relationship of thesefitness as πœ‡

1(𝑑) > πœ‡

2(𝑑) > β‹… β‹… β‹… > πœ‡

𝐿(𝑑), and let lim

π‘‘β†’βˆžπœƒ(𝑑) =

[πœƒ1(𝑑), πœƒ2(𝑑), . . . , πœƒ

𝐿(𝑑)] be the corresponding population state.

According to Lemma 2 theWSNs population state, subject tothe constraints πœƒ

𝑗(𝑑) β‰₯ 0 and βˆ‘

π‘—βˆˆPπ‘š

πœƒπ‘—(𝑑) = 1, will ultimately

converge to

limπ‘‘β†’βˆž

πœƒ (𝑑) = [πœƒ1 (𝑑) , πœƒ2 (𝑑) , . . . , πœƒπΏ (𝑑)] = [1, 0, . . . , 0] (16)

as equilibrium.Theorem 3 therefore follows.

Theorem 4. The equilibrium of the secrecy rate game towardsWSNs is evolutionarily stable.

Proof. Following Theorem 3, we can, for the secrecy rategame towards WSNs, attain equilibrium as {1, 0, . . . , 0} of 𝐿-dimension. At this equilibrium point the set of differentialequations denoted in (15), by substituting

πœƒ1 (𝑑) = 1 βˆ’ πœƒ

2 (𝑑) βˆ’ β‹… β‹… β‹… βˆ’ πœƒπΏ (𝑑) , (17)

can be changed into

πœ—π‘— (𝑑) = πœ—

𝑗 (𝑑)(πœ‘π‘—π‘ž

(1 βˆ’ πœ—π‘— (𝑑)) +

π‘ƒπ‘š

𝐿

βˆ‘

𝑖=π‘ƒπ‘š

2,𝑖 =𝑗

πœ—π‘– (𝑑) πœ‘π‘—π‘–) ,

𝑗 = π‘ƒπ‘š

2, . . . , 𝑃

π‘š

𝐿,

(18)

where πœ‘π‘—π‘žis equal to πœ™(πœ‡

𝑗(𝑑) βˆ’ πœ‡

π‘ž(𝑑)) βˆ’ πœ™(πœ‡

π‘ž(𝑑) βˆ’ πœ‡

𝑗(𝑑)), and

πœ— (𝑑) = [πœ—2 (𝑑) , πœ—3 (𝑑) , . . . , πœ—πΏ (𝑑)] (19)

denotes the corresponding downsized population state,which has equilibrium as πœ—

βˆ—(𝑑) = [0, 0, . . . , 0] of (𝐿 βˆ’ 1)-

dimension.We now illustrate, in order to justify the equilibrium is

evolutionarily stable, that eigenvalues of the Jacobian matrixof the downsized population state all have negative real part.Here an element of the Jacobianmatrix that is a (πΏβˆ’1)Γ—(πΏβˆ’1)

matrix, denoted by π½π‘—π‘ž, is a partial derivative as

π½π‘—π‘ž

= [πœ• πœ—π‘—(𝑑)

πœ•πœ—π‘ž(𝑑)

]

πœ—(𝑑)=πœ—βˆ—(𝑑)

, 𝑗, π‘ž = π‘ƒπ‘š

2, . . . , 𝑃

π‘š

𝐿. (20)

The Jacobian matrix denoted by J is therefore attained by

J =

[[[[[[[

[

πœ‘π‘ƒπ‘š

2π‘ƒπ‘š

1

0 β‹… β‹… β‹… 0

0 πœ‘π‘ƒπ‘š

3π‘ƒπ‘š

1

β‹… β‹… β‹… 0

.

.

.... d

.

.

.

0 0 β‹… β‹… β‹… πœ‘π‘ƒπ‘š

πΏπ‘ƒπ‘š

1

]]]]]]]

]

. (21)

In (21) πœ‘π‘ƒπ‘š

2π‘ƒπ‘š

1

, πœ‘π‘ƒπ‘š

3π‘ƒπ‘š

1

, . . . , πœ‘π‘ƒπ‘š

πΏπ‘ƒπ‘š

1

are in fact the eigenvaluesof Jacobian matrix J. From Lemma 2, for any 𝑗 = 2, . . . , 𝐿,πœ™(πœ‡π‘—(𝑑) βˆ’ πœ‡

π‘ž(𝑑)) is equal to zero. We can thus attain

πœ‘π‘—1

= πœ™ (πœ‡π‘— (𝑑) βˆ’ πœ‡

π‘ž (𝑑)) βˆ’ πœ™ (πœ‡π‘ž (𝑑) βˆ’ πœ‡

𝑗 (𝑑))

= βˆ’πœ™ (πœ‡π‘ž (𝑑) βˆ’ πœ‡

𝑗 (𝑑)) < 0.

(22)

FromTheorem 2.7.3 in [54], the equilibrium point πœ—βˆ—(𝑑)is evolutionarily stable. Theorem 4 therefore follows.

3.5. Secrecy Rate Adaptation Algorithm. The algorithm ofsecrecy rate adaptation for WSNs is in fact to describethe process how member sensor nodes select adaptivelytheir power level strategies. During this iterative process,periodically, a member sensor node observes its fitness inan entirely distributed mode and evaluates its current fitnesswith the average fitness of the wholeWSNs. If the difference islarger than a predefined maximum bound, then the member

Page 7: Research Article Evolutionary Game-Based Secrecy Rate ...downloads.hindawi.com/journals/ijdsn/2015/975454.pdftime slot the cluster head aggregates the data received and sends them

International Journal of Distributed Sensor Networks 7

sensor node selects a new power level strategy according tothe selection dynamics from (15). This interactive processgoes on until the ESS of the secrecy rate game towards WSNsis achieved. All member sensor nodes thus find a satisfac-tory solution to secrecy rate adaptation, and no membersensor nodes can benefit by switching their current powerlevel strategies while the other ones keep their strategiesunchanged. From now on, we can show the algorithm asfollows.

Algorithm 1.

(1) Initialize all coefficients including π‘Š, 𝐼, πœ‚2 and all

channel gains;

(2) 𝑑 ← 0;

(3) select a power level strategy 𝑗with the selection prob-ability πœƒ(𝑑) = [1/𝐿, 1/𝐿, . . . , 1/𝐿]. This probabilityassures eachmember sensor node has the same fitnessat the beginning of the game;

(4) compute the fitness πœ‡π‘—(𝑑) and the average fitness πœ‡(𝑑)

according to (7) and (8), respectively;

(5) compute the expected secrecy rate πœπ‘—(𝑑) and the

average secrecy rate 𝜍(𝑑) according to (9) and (10),respectively;

(6) DOWHILE .T.

//𝜏 means a predefined minimum bound;

(7) IF |πœ‡(𝑑) βˆ’ πœ‡π‘—(𝑑)| < 𝜏;

(8) EXIT;

(9) ENDIF

//𝜏 means a predefined maximum bound;

(10) IF |πœ‡(𝑑) βˆ’ πœ‡π‘—(𝑑)| > 𝜏;

(11) get πœƒ(𝑑 + 1) by solving (15) with thestandard numerical solver;

(12) select a newpower level strategy 𝑗withthe new selection probability πœƒ(𝑑 + 1);

(13) compute the fitness πœ‡π‘—(𝑑 + 1) and the

average fitness πœ‡(𝑑 + 1) according to (7) and (8),respectively;

(14) compute the expected secrecy rateπœπ‘—(𝑑+1) and the average secrecy rate 𝜍(𝑑+1) according

to (9) and (10), respectively;

(15) ENDIF;

(16) 𝑑 ← 𝑑 + 1;

(17) ENDDO;

(18) RETURN the array of πœπ‘—and 𝜍.

4. Experiments

Since member sensor nodes are generally constrained inlimited computation, memory, and battery life, we simplifythe number of power level strategies to introduce an exampleof the secrecy rate game towards WSNs. We consider thata member sensor node 𝑆

π‘š, when transmitting data, has to

select a strategy in Pπ‘š

= {𝑃𝐻, 𝑃𝐿}, where 𝑃

𝐻and 𝑃

𝐿denote

the high and low power levels, respectively. That is, for anyπ‘š ∈ {1, 2, . . . ,𝑀}, P

π‘š= {𝑃𝐻, 𝑃𝐿}. The utility of a member

sensor node, from (5), can thus be rewritten as

πœ‡ (π‘ƒπ‘š, 𝑃��)

= π‘Š(log2(1 +

π‘ƒπ‘šπΊπ‘†π‘š

𝐻𝑛

𝑃��𝐺𝑆��

𝐻𝑛

+ βˆ‘πΌπ‘š

𝑖=1οΏ½οΏ½π‘š

π‘–πΊπ‘†π‘š

𝑖

𝐻𝑛

+ πœ‚2)

βˆ’ maxπΈπ‘˜βˆˆEπ‘š

log2(1 +

π‘ƒπ‘šπΊπ‘†π‘š

πΈπ‘˜

𝑃��𝐺𝑆��

πΈπ‘˜

+ βˆ‘πΌπ‘š

𝑖=1οΏ½οΏ½π‘š

π‘–πΊπ‘†π‘š

𝑖

πΈπ‘˜

+ πœ‚2))

+

βˆ’ π›Όπ‘ƒπ‘š,

(23)

where π‘ƒπ‘š, 𝑃��

∈ Pπ‘š, π‘†π‘š, 𝑆��

∈ S. For simple description, letπœ‡π»π»

, πœ‡π»πΏ

, πœ‡πΏπ»

, and πœ‡πΏπΏ

be πœ‡(𝑃𝐻, 𝑃𝐻), πœ‡(𝑃

𝐻, 𝑃𝐿), πœ‡(𝑃

𝐿, 𝑃𝐻),

and πœ‡(𝑃𝐿, 𝑃𝐿), respectively.

Obviously, for the example of the secrecy rate gametowards WSNs, we can get (a) 𝑃

𝐻is an ESS if and only if

πœ‡π»π»

> πœ‡πΏπ»

and πœ‡π»πΏ

> πœ‡πΏπΏ, (b) 𝑃

𝐿is an ESS if and only if

πœ‡π»π»

< πœ‡πΏπ»

and πœ‡π»πΏ

< πœ‡πΏπΏ, and (c) ((πœ‡

πΏπΏβˆ’πœ‡π»πΏ

)/(πœ‡π»π»

βˆ’πœ‡π»πΏ

βˆ’

πœ‡πΏπ»

+πœ‡πΏπΏ

), (πœ‡π»π»

βˆ’πœ‡πΏπ»

)/(πœ‡π»π»

βˆ’πœ‡π»πΏ

βˆ’πœ‡πΏπ»

+πœ‡πΏπΏ

)) is a mixedESS if and only if πœ‡

𝐻𝐻< πœ‡πΏπ»

and πœ‡π»πΏ

> πœ‡πΏπΏ.

Next, we initialize all coefficients required in the exampleof the secrecy rate game towards WSNs for performingnumerical experiments. According to IEEE 802.15.4 physicallayer specifications, we let 𝜌 = 0.01, π‘Š = 2MHz, 𝑃

𝐻=

30mW, 𝑃𝐿

= 10mW, and 𝜎2

= βˆ’112 dBm, respectively. Wealso let the channel gain between a member sensor node andits responsible cluster head be 1, and we let the channel gainbetween a member sensor node and an eavesdropper be 0.6.Since different power levels will lead to different interferencezones, we let π‘Ÿ

𝐻= 50m and π‘Ÿ

𝐿= 10m, where π‘Ÿ

𝐻and π‘ŸπΏ

denote the interference distance of a member sensor nodeadopting 𝑃

𝐻and 𝑃

𝐿, respectively. In addition, we assume

the working probability of interferers is 0.01 based on theempirical value. The number of interferers adopting the high(resp., low) power level strategy 𝑃

𝐻(resp. 𝑃

𝐿), therefore, is

0.01 Γ— (πœŒπœ‹π‘Ÿ2

𝐻+ 3βˆšπœŒπœ‹π‘Ÿ2

𝐻) (resp., 0.01 Γ— (πœŒπœ‹π‘Ÿ

2

𝐿+ 3βˆšπœŒπœ‹π‘Ÿ2

𝐿)).

4.1. Effect of 𝛼. The ESSs of the secrecy rate game towardsWSNs are dependent on the cost parameter 𝛼. As depicted inFigure 2, utilities of all strategy profiles are decreasing linearlywith different speeds while 𝛼 is increasing gradually. Thisfact means the influence of a power level strategy becomeslarger than that of secrecy rate on the utility of a membersensor node. We can see lines of πœ‡

𝐻𝐻and πœ‡πΏπ»

intersect when𝛼 β‰ˆ 4.2267, which implies πœ‡

𝐻𝐻> πœ‡πΏπ»

if 𝛼 < 4.2267,

Page 8: Research Article Evolutionary Game-Based Secrecy Rate ...downloads.hindawi.com/journals/ijdsn/2015/975454.pdftime slot the cluster head aggregates the data received and sends them

8 International Journal of Distributed Sensor Networks

1 2 3 4 5 6 7 8 9 10

0

50

100

150

Util

ity

𝛼

βˆ’50

βˆ’100

βˆ’150

βˆ’200

πœ‡HH πœ‡LHπœ‡HL πœ‡LL

Figure 2: Effect of 𝛼 on ESSs of the example of the secrecy gametowards WSNs.

otherwise πœ‡π»π»

< πœ‡πΏπ»

. Similarly, if 𝛼 < 5.0919 then πœ‡π»πΏ

>

πœ‡πΏπΏ; otherwise πœ‡

𝐻𝐿< πœ‡πΏπΏ. Therefore, 𝑃

𝐻is an ESS if and

only if 𝛼 < 4.2267; 𝑃𝐿is an ESS if and only if 𝛼 > 5.0919;

((πœ‡πΏπΏ

βˆ’πœ‡π»πΏ

)/(πœ‡π»π»

βˆ’πœ‡π»πΏ

βˆ’πœ‡πΏπ»

+πœ‡πΏπΏ

), (πœ‡π»π»

βˆ’πœ‡πΏπ»

)/(πœ‡π»π»

βˆ’πœ‡π»πΏ

βˆ’

πœ‡πΏπ»

+πœ‡πΏπΏ

)) is a mixed ESS if and only if 4.2267 < 𝛼 < 5.0919.

4.2. ESSs for the Example of the Secrecy Rate Game towardsWSNs. To illustrate the evolution of member sensor nodesselecting different power level strategies, the probability dis-tribution function πœ™ in (15) should be first defined. Accordingto the idea [52] through linearizing the function πœ™, wesuppose

πœ™ (π‘₯) = 𝛽 + 𝛾π‘₯, (24)

where 𝛽, 𝛾 ∈ R, such that 0 ≀ 𝛽 + 𝛾π‘₯ ≀ 1. Substituting(24) into (15), we can attain the selection dynamics ofmembersensor nodes as

πœƒπ‘— (𝑑) = 2π›Ύπœƒ

𝑗 (𝑑) βˆ‘

π‘ž,π‘ž =𝑗

πœƒπ‘ž (𝑑) (πœ‡π‘— (𝑑) βˆ’ πœ‡

π‘ž (𝑑)) , (25)

where 𝛾 is in fact a parameter that will influence theconvergence speed of ESS. Let 𝛾 be 0.5 (in practice, 𝛾 maybe an arbitrary real number); we attain different ESSs ofthe example of the secrecy rate game under different costparameter values 3, 4.5, and 6, which are illustrated in Figures3, 4, and 5, respectively. Note that these cost parameter valuesdetermine three different ESSs. As illustrated in Section 4.1,𝛼 = 3 specifies that 𝑃

𝐻is an ESS, 𝛼 = 4.5 specifies that 𝑃

𝐿is

an ESS, and 𝛼 = 6 specifies that there is a mixed ESS.In Figure 3, when the initial value of (25) is 0.005, that is,

if only 0.5%member sensor nodes select the high power levelstrategy 𝑃

𝐻in the beginning, the fraction of member sensor

nodes selecting 𝑃𝐻, after about 51 times of playing the game,

will be stable at 1; that is, all member sensor nodes select𝑃𝐻as

their optimal strategy. We can also see that the higher initialfraction of member sensor nodes selecting 𝑃

𝐻is, the faster

0 10 20 30 40 500

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Times

πœƒH(0) = 0.005

πœƒH(0) = 0.255πœƒH(0) = 0.555

πœƒH(t)

Figure 3: 𝑃𝐻is an ESS when 𝛼 = 3.

0 10 20 30 40 50Times

πœƒH(0) = 0.995

πœƒH(0) = 0.755πœƒH(0) = 0.455

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1πœƒH(t)

Figure 4: 𝑃𝐿is an ESS when 𝛼 = 6.

convergence speed of achieving ESS𝑃𝐻can be attained.These

results reflect the fact that 𝑃𝐻is an ESS when 𝛼 = 3.

In Figure 4, even if 99.5% member sensor nodes select𝑃𝐻in the beginning, we can find that, after about 37 times

of playing the game, the fraction of member sensor nodesselecting 𝑃

𝐻will be stable at 0; that is, all member sensor

nodes select the low power level strategy 𝑃𝐿in the end. In

addition, the convergence speed of achieving ESS𝑃𝐿becomes

faster and faster as decreasing the initial fraction of membersensor nodes selecting 𝑃

𝐻. The fact that 𝑃

𝐿is an ESS when

𝛼 = 6 is thus reflected.In Figure 5, all curves of member sensor nodes selecting

𝑃𝐻, irrespective of different initial value of (25), converge

to a limit 0.6841 or so. At this equilibrium point, about

Page 9: Research Article Evolutionary Game-Based Secrecy Rate ...downloads.hindawi.com/journals/ijdsn/2015/975454.pdftime slot the cluster head aggregates the data received and sends them

International Journal of Distributed Sensor Networks 9

0 10 20 30 40 50Times

πœƒH(0) = 0.155

πœƒH(0) = 0.500πœƒH(0) = 0.855

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

πœƒH(t)

Figure 5: A mixed ESS (0.6841, 0.3159) exists when 𝛼 = 4.5.

68.41% member sensor nodes select 𝑃𝐻while about 31.59%

member sensor nodes selecting𝑃𝐿, as their respective optimal

strategies. The other interpretation is that member sensornodes switch their strategies between strategies 𝑃

𝐻and 𝑃

𝐿,

that is, playing 𝑃𝐻

for 68.41% of the time and 𝑃𝐿for the

remainder of the time. In fact, under this situation the casethat all member sensor nodes select 𝑃

𝐻(resp. 𝑃

𝐿) cannot be

evolutionarily stable. This is because the utility of a membersensor node adopting 𝑃

𝐿(resp., 𝑃

𝐻), when encountering one

adopting 𝑃𝐻(resp. 𝑃

𝐿), is better than that of a member sensor

node adopting𝑃𝐻(resp.𝑃

𝐿).These results lead to the fact that

there is a mixed ESS (0.6841, 0.3159) when 𝛼 = 4.5.

4.3. Secrecy Rate Adaptation. Our mechanism of secrecy rateadaptation in WSNs is realized when member sensor nodesselect adaptively their power level strategies for maximizingtheir fitness. For convenience, let πœƒ

𝐻(𝑑) be the fraction of

member sensor nodes adopting𝑃𝐻at time 𝑑; then the fraction

of nodes adopting 𝑃𝐿at time 𝑑 is 1 βˆ’ πœƒ

𝐻(𝑑). We denote the

fitness of member sensor nodes adopting 𝑃𝐻and 𝑃𝐿at time 𝑑

by πœ‡π»(𝑑) and πœ‡

𝐿(𝑑), respectively, where πœ‡

𝐻(𝑑) and πœ‡

𝐿(𝑑), from

(7), are given by

πœ‡π» (𝑑) = πœƒ

𝐻 (𝑑) πœ‡π»π» + (1 βˆ’ πœƒπ» (𝑑)) πœ‡π»πΏ, (26)

πœ‡πΏ (𝑑) = πœƒ

𝐻 (𝑑) πœ‡πΏπ» + (1 βˆ’ πœƒπ» (𝑑)) πœ‡πΏπΏ. (27)

From (8), we can attain that the average fitness of the wholeWSNs is

πœ‡ (𝑑) = πœƒπ» (𝑑) πœ‡π» (𝑑) + (1 βˆ’ πœƒ

𝐻 (𝑑)) πœ‡πΏ (𝑑) . (28)

Similarly, we denote the expected secrecy rate of amember sensor node adopting 𝑃

𝐻and 𝑃

𝐿at time 𝑑 by 𝜍

𝐻(𝑑)

0 10 20 30 40 5010

20

30

40

50

60

70

80

Times

Fitn

ess

πœ‡(t)πœ‡H(t)

πœ‡L(t)

Figure 6: Different fitness when 𝛼 = 3.

and 𝜍𝐿(𝑑), respectively, where 𝜍

𝐻(𝑑) and 𝜍

𝐿(𝑑), from (9), are

given by

𝜍𝐻 (𝑑) = πœƒ

𝐻 (𝑑) 𝜍𝐻𝐻 + (1 βˆ’ πœƒπ» (𝑑)) 𝜍𝐻𝐿, (29)

𝜍𝐿 (𝑑) = πœƒ

𝐻 (𝑑) 𝜍𝐿𝐻 + (1 βˆ’ πœƒπ» (𝑑)) 𝜍𝐿𝐿, (30)

and the average secrecy rate of the whole WSNs, 𝜍(𝑑), from(10), is given by

𝜍 (𝑑) = πœƒπ» (𝑑) 𝜍𝐻 (𝑑) + (1 βˆ’ πœƒ

𝐻 (𝑑)) 𝜍𝐿 (𝑑) . (31)

Here πœπ‘’V, 𝑒, V ∈ {𝐻, 𝐿}, denotes the secrecy rate of a

member sensor node adopting 𝑃𝑒when encountering one

adopting 𝑃V, which can be computed by the first term in (23).We are now able to, under different cost values 3, 4.5, and

6, show changeable trends of fitness depicted in Figures 6,7, and 8, as well as expected secrecy rates in Figures 9, 10,and 11, respectively. In Figures 6 and 9 where 𝑃

𝐻is an ESS,

the fitness (resp., expected secrecy rate) of a member sensornode adopting 𝑃

𝐻is always higher than that of one adopting

𝑃𝐿. As member sensor nodes play the game continuously,

both fitness values (resp., expected secrecy rates) decreasegradually while the average fitness (resp., secrecy rate) ofthe whole WSNs increases. After about 51 times of playingthe game, the curves of both πœ‡

𝐻(𝑑) (resp., 𝜍

𝐻(𝑑)) and πœ‡(𝑑)

(resp., 𝜍(𝑑)) converge to a limit 42.9739 (resp., 132.9091) orso. Arriving at this equilibrium point implies all membersensor nodes, through switching their power level strategiesadaptively, select 𝑃

𝐻in the end due to its higher fitness.

The secrecy rate attained by a member sensor node is alsoadjusted adaptively. In Figures 7 and 10 where𝑃

𝐿is an ESS, we

can see some converse phenomena. The fitness of a membersensor node adopting 𝑃

𝐿is higher than that of a member

sensor node adopting 𝑃𝐻, whereas the expected secrecy rate

of a member sensor node adopting 𝑃𝐿is lower. Moreover,

the average fitness of the whole WSNs is increasing whilethe average secrecy rate is decreasing. In the end, when

Page 10: Research Article Evolutionary Game-Based Secrecy Rate ...downloads.hindawi.com/journals/ijdsn/2015/975454.pdftime slot the cluster head aggregates the data received and sends them

10 International Journal of Distributed Sensor NetworksFi

tnes

s

0 10 20 30 40 50

0

Times

βˆ’10

βˆ’15

βˆ’20

βˆ’25

βˆ’30

βˆ’35

βˆ’40

βˆ’45

βˆ’50

βˆ’5

πœ‡(t)πœ‡H(t)

πœ‡L(t)

Figure 7: Different fitness when 𝛼 = 6.

Fitn

ess

0 10 20 30 40 506

8

10

12

14

16

18

20

22

Times

πœ‡(t)πœ‡H(t)

πœ‡L(t)

Figure 8: Different fitness when 𝛼 = 4.5.

all member sensor nodes select 𝑃𝐿as their optimal power

level strategy, the curves of both πœ‡πΏ(𝑑) and πœ‡(𝑑), after about

37 times of playing the game, converge to a limit βˆ’1.0675or so. Correspondingly, the expected secrecy rate attainedby a member sensor node is adjusted adaptively to a limit59.9593 or so. In Figures 8 and 11 where a mixed ESS existsat (0.6841, 0.3159) or so, there is a similar trend among curvesof πœ‡π»(𝑑), πœ‡πΏ(𝑑), and πœ‡(𝑑). After about 36 times of playing the

game, all curves in Figure 8 converge to a limit 6.8323 or so.That is, after achieving the mixed equilibrium point, bothstrategies 𝑃

𝐻and 𝑃

𝐿coexist permanently and all member

sensor nodes have the samefitness regardless of their differentstrategies. On the other hand, in Figure 11 we can see expectedsecrecy rates of member sensor nodes adopting 𝑃

𝐻and 𝑃

𝐿

are decreasing slowly. The average secrecy rate of the whole

0 10 20 30 40 5040

60

80

100

120

140

160

180

Times

Expe

cted

secr

ecy

rate

𝜍(t)

𝜍H(t)

𝜍L(t)

Figure 9: Different expected secrecy rates when 𝛼 = 3.

0 10 20 30 40 5040

60

80

100

120

140

160

180

Times

Expe

cted

secr

ecy

rate

𝜍(t)

𝜍H(t)

𝜍L(t)

Figure 10: Different expected secrecy rates when 𝛼 = 6.

WSNs, however, is increasing little by little. This adaptationof average secrecy rate results in equilibrium point 113.3959or so in the end.

5. Conclusion

We have demonstrated the evolution process of secrecy rateadaptation for sensor nodes in the clustered WSNs. For thisaim, the classical wiretap channel has been extended to fitfor the clustered WSNs and the corresponding equation tocompute secrecy rate has been attained. The secrecy rategame we have constructed is able to reflect the interactionsamong member sensor nodes. With EGT, we have attained aselection dynamics to determine how member sensor nodes

Page 11: Research Article Evolutionary Game-Based Secrecy Rate ...downloads.hindawi.com/journals/ijdsn/2015/975454.pdftime slot the cluster head aggregates the data received and sends them

International Journal of Distributed Sensor Networks 11

0 10 20 30 40 5040

60

80

100

120

140

160

180

Times

Expe

cted

secr

ecy

rate

𝜍(t)

𝜍H(t)

𝜍L(t)

Figure 11: Different expected secrecy rates when 𝛼 = 4.5.

for maximizing their fitness will select their power levelstrategies.We have also proved the stability of the secrecy rategame to illustrate which power level strategy will be adoptedin the end.The results from experiments for an example of thesecrecy rate game towards WSNs have verified all ESSs andhave revealed the process of expected secrecy rate adaptationfor member sensor nodes. As a result, this disclosure ofsecrecy rate adaptation will be beneficial to employ PHYsecurity to guarantee the secrecy of transmission in WSNs.

Notations

𝜌: Node densityπ‘Ÿπ‘…: Receiving distance

π‘ŸπΌ: Interfering distance

√𝜎: Standard deviation𝑧𝐼: Interference zone

𝐼: Maximum number of interferersto a sensor node

S,H, and E: Sets of 𝑀 member sensor nodes,𝑁 cluster nodes, and 𝐾

eavesdroppers, respectivelyEπ‘š: Set of eavesdroppers capable of

listening in data sensed bymember sensor node 𝑆

π‘š

πΊπ‘†π‘š

𝐻𝑛

: Channel gain between membersensor node 𝑆

π‘šand its responsible

cluster head 𝐻𝑛

πΊπ‘†π‘š

πΈπ‘˜

: Channel gain between membersensor node 𝑆

π‘šand eavesdropper

πΈπ‘˜, πΈπ‘˜βˆˆ Eπ‘š

πœ‚2: Thermal noise power at cluster

heads and eavesdroppers,respectively

π‘Š: Channel bandwidth

π‘†π‘š

𝑖: An interferer to member sensor node 𝑆

π‘š,

𝑖 ∈ {1, 2, . . . , πΌπ‘š}

Sπ‘š: Set of interferers to member sensor node

π‘†π‘š

πΆπ‘†π‘š

𝐻𝑛

: Channel capacity from member sensornode 𝑆

π‘što its responsible cluster head 𝐻

𝑛

π‘ƒπ‘š: Transmission power adopted by member

sensor node π‘†π‘š

οΏ½οΏ½π‘š

𝑖: Interference power adopted by interferer

π‘†π‘š

𝑖

πΊπ‘†π‘š

𝑖

𝐻𝑛

: Channel gain between interferer π‘†π‘šπ‘–and

the interfered cluster head 𝐻𝑛

πΆπ‘†π‘š

πΈπ‘˜

: Channel capacity from member sensornode 𝑆

π‘što eavesdropper 𝐸

π‘˜, πΈπ‘˜βˆˆ Eπ‘š

πΊπ‘†π‘š

𝑖

πΈπ‘˜

: Channel gain between interferer π‘†π‘šπ‘–and

eavesdropper πΈπ‘˜, πΈπ‘˜βˆˆ Eπ‘š

𝐢(π‘ƒπ‘š): Secrecy rate between member sensor node

π‘†π‘šadopting a power level 𝑃

π‘šand its

responsibleG = (S,P,U): Our secrecy rate game towards WSNsP: Set of strategy profiles for all member

sensor nodesPπ‘š: Set of pure power level strategies available

to member sensor node π‘†π‘š

U: Set of utilitiesπœ‡(π‘ƒπ‘š, 𝑃��): Utility function for member sensor node

π‘†π‘šadopting power level 𝑃

π‘šwhen its

opponent𝛼: Cost parameter reflecting the degree of a

member sensor node consuming energyfor transmission

πœƒπ‘—(𝑑): Fraction of member sensor nodes using

power level strategy 𝑗 at time 𝑑

πœƒ(𝑑): State of the whole WSNs at time 𝑑

πœ‡π‘—(𝑑): Fitness of member sensor nodes adopting

power level strategy 𝑗 at time 𝑑

πœ‡(𝑑): Average fitness of the whole WSNs at time𝑑

πœπ‘—(𝑑): Expected secrecy rate of member sensor

nodes adopting power level strategy 𝑗 attime 𝑑

𝜍(𝑑): Average secrecy rate of the whole WSNs attime 𝑑

π‘Ÿπ‘—(πœƒ): Average review rate of member sensor

nodes using power level strategy 𝑗

𝑝𝑗

π‘ž(πœƒ): Probability of a reviewing member sensor

node changing from power level strategy 𝑗

to π‘ž

πœ™: Probability distribution functionπœ—π‘—(𝑑): Fraction of member sensor nodes in the

downsized population using power levelstrategy 𝑗 at time 𝑑

πœ—(𝑑): State of the downsized population at time 𝑑

πœ‘π‘—π‘ž: Notation simple to denote equation

πœ™(πœ‡π‘—(𝑑) βˆ’ πœ‡

π‘ž(𝑑)) βˆ’ πœ™(πœ‡

π‘ž(𝑑) βˆ’ πœ‡

𝑗(𝑑))

π½π‘—π‘ž: Element of Jacobian matrix J

Page 12: Research Article Evolutionary Game-Based Secrecy Rate ...downloads.hindawi.com/journals/ijdsn/2015/975454.pdftime slot the cluster head aggregates the data received and sends them

12 International Journal of Distributed Sensor Networks

𝑃𝐻and 𝑃

𝐿: High and low power levels in the

example of the secrecy rate game,respectively

πœ‡π»π»

, πœ‡π»πΏ

, πœ‡πΏπ»

, and πœ‡πΏπΏ: Notations simple to denoteπœ‡(𝑃𝐻, 𝑃𝐻), πœ‡(𝑃𝐻, 𝑃𝐿), πœ‡(𝑃𝐿, 𝑃𝐻),

and πœ‡(𝑃𝐿, 𝑃𝐿), respectively.

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper.

Acknowledgments

This work was supported by National Natural Science Foun-dation of China under Grant no. 61272034, by ZhejiangProvincial Natural Science Foundation of China underGrants LY13F030012 and LY13F020035, and by Science Foun-dation of Shaoxing University under Grant no. 20145021.

References

[1] X. Chen, K. Makki, K. Yen, and N. Pissinou, β€œSensor networksecurity: a survey,” IEEECommunications Surveys andTutorials,vol. 11, no. 2, pp. 52–73, 2009.

[2] H. V. Poor, β€œInformation and inference in the wireless physicallayer,” IEEE Wireless Communications, vol. 19, no. 1, pp. 40–47,2012.

[3] A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L.Swindlehurst, β€œPrinciples of physical layer security in multiuserwireless networks: a survey,” IEEE Communications Surveys andTutorials, vol. 16, no. 3, pp. 1550–1573, 2014.

[4] A. D. Wyner, β€œThe wire-tap channel,”The Bell System TechnicalJournal, vol. 54, no. 8, pp. 1355–1387, 1975.

[5] S. K. Leung-Yan-Cheong and M. E. Hellman, β€œThe Gaussianwire-tap channel,” IEEE Transactions on Information Theory,vol. 24, no. 4, pp. 451–456, 1978.

[6] I. Csiszar and J. Korner, β€œBroadcast channels with confidentialmessages,” IEEETransactions on InformationTheory, vol. 24, no.3, pp. 339–348, 1978.

[7] Z. H. Awan, A. Zaidi, and L. Vandendorpe, β€œSecure com-munication over parallel relay channel,” IEEE Transactions onInformation Forensics and Security, vol. 7, no. 2, pp. 359–371,2012.

[8] Y. Liang and H. V. Poor, β€œMultiple-access channels with con-fidential messages,” IEEE Transactions on Information Theory,vol. 54, no. 3, pp. 976–1002, 2008.

[9] R. Liu, I. Maric, P. Spasojevic, and R. D. Yates, β€œDiscretememoryless inference and broadcast channels with confidentialmessages: secrecy rate regions,” IEEE Transactions on Informa-tion Theory, vol. 54, no. 6, pp. 2493–2507, 2008.

[10] S. Gerbracht, C. Scheunert, and E. A. Jorswieck, β€œSecrecyoutage in MISO systems with partial channel information,”IEEE Transactions on Information Forensics and Security, vol. 7,no. 2, pp. 704–716, 2012.

[11] S. Shafiee, N. Liu, and S. Ulukus, β€œTowards the secrecy capacityof the gaussian MIMO wire-tap channel: the 2-2-1 channel,”IEEE Transactions on Information Theory, vol. 55, no. 9, pp.4033–4039, 2009.

[12] L. Lai, H. El Gamal, and H. V. Poor, β€œThe wiretap channel withfeedback: encryption over the channel,” IEEE Transactions onInformation Theory, vol. 54, no. 11, pp. 5059–5067, 2008.

[13] L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, β€œImprovingwireless physical layer security via cooperating relays,” IEEETransactions on Signal Processing, vol. 58, no. 3, pp. 1875–1888,2010.

[14] J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, β€œJoint relayand jammer selection for secure two-way relay networks,” IEEETransactions on Information Forensics and Security, vol. 7, no. 1,pp. 310–320, 2012.

[15] N. Romero-Zurita, M. Ghogho, and D. McLernon, β€œPhysicallayer security of MIMO-OFDM systems by beamforming andartificial noise generation,” Physical Communication, vol. 4, no.4, pp. 313–321, 2011.

[16] S. A. A. Fakoorian and A. L. Swindlehurst, β€œMIMO interferencechannel with confidential messages: achievable secrecy ratesand precoder design,” IEEE Transactions on Information Foren-sics and Security, vol. 6, no. 3, pp. 640–649, 2011.

[17] W. Saad, Z. Han, T. Basar, M. Debbah, and A. HjΓΈrungnes,β€œDistributed coalition formation games for secure wirelesstransmission,” Mobile Networks and Applications, vol. 16, no. 2,pp. 231–245, 2011.

[18] Y. Wu and K. J. R. Liu, β€œAn information secrecy game incognitive radio networks,” IEEE Transactions on InformationForensics and Security, vol. 6, no. 3, pp. 831–842, 2011.

[19] M. Yuksel, X. Liu, and E. Erkip, β€œA secure communication gamewith a relay helping the eavesdropper,” IEEE Transactions onInformation Forensics and Security, vol. 6, no. 3, pp. 818–830,2011.

[20] Q. Zhu, W. Saad, Z. Han, H. V. Poor, and T. Basar, β€œEaves-dropping and jamming in next-generation wireless networks:a game-theoretic approach,” in Proceedings of the Military Com-munications Conference (MILCOM ’11), pp. 119–124, November2011.

[21] Z. Han, N. Marina, M. Debbah, and A. HjΓΈrungnes, β€œPhysicallayer security game: interaction between source, eavesdropper,and friendly jammer,” Eurasip Journal on Wireless Communi-cations and Networking, vol. 2009, Article ID 452907, 10 pages,2009.

[22] S. A. Fakoorian and A. L. Swindlehurst, β€œCompeting for secrecyin the MISO interference channel,” IEEE Transactions on SignalProcessing, vol. 61, no. 1, pp. 170–181, 2013.

[23] A. Mukherjee and A. L. Swindlehurst, β€œJamming games in theMIMO wiretap channel with an active eavesdropper,” IEEETransactions on Signal Processing, vol. 61, no. 1, pp. 82–91, 2013.

[24] F. Gabry, N. Li, N. Schrammar, M. Girnyk, L. K. Rasmussen,and M. Skoglund, β€œOn the optimization of the secondarytransmitter’s strategy in cognitive radio channels with secrecy,”IEEE Journal on Selected Areas in Communications, vol. 32, no.3, pp. 451–463, 2014.

[25] R. Zhang, L. Song, Z. Han, and B. Jiao, β€œPhysical layer securityfor two-way untrusted relaying with friendly jammers,” IEEETransactions on Vehicular Technology, vol. 61, no. 8, pp. 3693–3704, 2012.

[26] Z. Liu, Y. Shang, R. Zhang, and H. Xiang, β€œRelay selectionbased on coalitional game for secure wireless networks,” IETCommunications, vol. 8, no. 8, pp. 1355–1363, 2014.

[27] L. Chen and J. Leneutre, β€œFight jamming with jammingβ€”agame theoretic analysis of jamming attack in wireless networksand defense strategy,” Computer Networks, vol. 55, no. 9, pp.2259–2270, 2011.

Page 13: Research Article Evolutionary Game-Based Secrecy Rate ...downloads.hindawi.com/journals/ijdsn/2015/975454.pdftime slot the cluster head aggregates the data received and sends them

International Journal of Distributed Sensor Networks 13

[28] R. Machado and S. Tekinay, β€œA survey of game-theoreticapproaches in wireless sensor networks,” Computer Networks,vol. 52, no. 16, pp. 3047–3061, 2008.

[29] H.-Y. Shi, W.-L. Wang, N.-M. Kwok, and S.-Y. Chen, β€œGametheory for wireless sensor networks: a survey,” Sensors, vol. 12,no. 7, pp. 9055–9097, 2012.

[30] S. Shen, G. Yue, Q. Cao, and F. Yu, β€œA survey of game theory inwireless sensor networks security,” Journal of Networks, vol. 6,no. 3, pp. 521–532, 2011.

[31] S. Shen, Y. Li, H. Xu, andQ. Cao, β€œSignaling game based strategyof intrusion detection in wireless sensor networks,” Computersand Mathematics with Applications, vol. 62, no. 6, pp. 2404–2416, 2011.

[32] S. Shen, R. Han, L. Guo, W. Li, and Q. Cao, β€œSurvivabilityevaluation towards attacked WSNs based on stochastic gameand continuous-time Markov chain,” Applied Soft ComputingJournal, vol. 12, no. 5, pp. 1467–1476, 2012.

[33] S. Shen, H. Li, R. Han, A. V. Vasilakos, Y. Wang, and Q. Cao,β€œDifferential game-based strategies for preventing malwarepropagation in wireless sensor networks,” IEEE Transactions onInformation Forensics and Security, vol. 9, no. 11, pp. 1962–1973,2014.

[34] M. A. Khan, H. Tembine, and A. V. Vasilakos, β€œEvolutionarycoalitional games: design and challenges in wireless networks,”IEEE Wireless Communications, vol. 19, no. 2, pp. 50–56, 2012.

[35] S. Moretti and A. V. Vasilakos, β€œAn overview of recent applica-tions of game theory to bioinformatics,” Information Sciences,vol. 180, no. 22, pp. 4312–4322, 2010.

[36] B. Q. Zhao, J. C. S. Lui, and D.-M. Chiu, β€œA mathematicalframework for analyzing adaptive incentive protocols in P2Pnetworks,” IEEE/ACM Transactions on Networking, vol. 20, no.2, pp. 367–380, 2012.

[37] H. Tembine, E. Altman, R. El-Azouzi, and Y. Hayel, β€œEvolution-ary games in wireless networks,” IEEE Transactions on Systems,Man, and Cybernetics, Part B: Cybernetics, vol. 40, no. 3, pp.634–646, 2010.

[38] M. P. Anastasopoulos, D. K. Petraki, R. Kannan, and A. V.Vasilakos, β€œTCP Throughput adaptation in wimax networksusing replicator dynamics,” IEEE Transactions on Systems, Man,and Cybernetics, Part B: Cybernetics, vol. 40, no. 3, pp. 647–655,2010.

[39] M. A. Khan, H. Tembine, and A. V. Vasilakos, β€œGame dynamicsand cost of learning in heterogeneous 4G networks,” IEEEJournal on Selected Areas in Communications, vol. 30, no. 1, pp.198–213, 2012.

[40] Y. Wang, A. Nakao, and A. V. Vasilakos, β€œOn modeling ofcoevolution of strategies and structure in autonomous overlaynetworks,” ACM Transactions on Autonomous and AdaptiveSystems, vol. 7, no. 2, article 17, 25 pages, 2012.

[41] D. Niyato and E. Hossain, β€œDynamics of network selectionin heterogeneous wireless networks: an evolutionary gameapproach,” IEEE Transactions on Vehicular Technology, vol. 58,no. 4, pp. 2008–2017, 2009.

[42] B. Wang, K. J. R. Liu, and T. C. Clancy, β€œEvolutionary coop-erative spectrum sensing game: how to collaborate?” IEEETransactions on Communications, vol. 58, no. 3, pp. 890–900,2010.

[43] K. Zhu, D. Niyato, P. Wang, and Z. Han, β€œDynamic spectrumleasing and service selection in spectrum secondary marketof cognitive radio networks,” IEEE Transactions on WirelessCommunications, vol. 11, no. 3, pp. 1136–1145, 2012.

[44] W. Wang, M. Chatterjee, and K. Kwiat, β€œCooperation in wire-less networks with unreliable channels,” IEEE Transactions onCommunications, vol. 59, no. 10, pp. 2808–2817, 2011.

[45] Z. Chen, Y. Qiu, J. Liu, and L. Xu, β€œIncentive mechanism forselfish nodes in wireless sensor networks based on evolutionarygame,” Computers and Mathematics with Applications, vol. 62,no. 9, pp. 3378–3388, 2011.

[46] L. Lai and H. El Gamal, β€œThe relay-eavesdropper channel:cooperation for secrecy,” IEEE Transactions on InformationTheory, vol. 54, no. 9, pp. 4005–4019, 2008.

[47] Q. Li and W.-K. Ma, β€œOptimal and robust transmit designsfor MISO channel secrecy by semidefinite programming,” IEEETransactions on Signal Processing, vol. 59, no. 8, pp. 3799–3812,2011.

[48] J. Huang and A. L. Swindlehurst, β€œRobust secure transmissionin MISO channels based on worst-case optimization,” IEEETransactions on Signal Processing, vol. 60, no. 4, pp. 1696–1707,2012.

[49] S. Fischer and B. Vocking, β€œAdaptive routing with stale infor-mation,”Theoretical Computer Science, vol. 410, no. 36, pp. 3357–3371, 2009.

[50] S. De, C. Qiao, D. A. Pados, M. Chatterjee, and S. J. Philip,β€œAn integrated cross-layer study of wireless CDMA sensornetworks,” IEEE Journal on Selected Areas in Communications,vol. 22, no. 7, pp. 1271–1285, 2004.

[51] S. Sengupta, M. Chatterjee, and K. A. Kwiat, β€œA game theoreticframework for power control in wireless sensor networks,” IEEETransactions on Computers, vol. 59, no. 2, pp. 231–242, 2010.

[52] J. W. Weibull, Evolutionary Game Theory, MIT Press, Cam-bridge, Mass, USA, 1995.

[53] D. Fudenberg and D. K. Levine, The Theory of Learning inGames, vol. 2 of MIT Press Series on Economic Learning andSocial Evolution, MIT Press, Cambridge, UK, 1998.

[54] R. Cressman, Evolutionary Dynamics and Extensive formGames, vol. 5 of MIT Press Series on Economic Learning andSocial Evolution, MIT Press, Cambridge, Mass, USA, 2003.

Page 14: Research Article Evolutionary Game-Based Secrecy Rate ...downloads.hindawi.com/journals/ijdsn/2015/975454.pdftime slot the cluster head aggregates the data received and sends them

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporation http://www.hindawi.com

Journal ofEngineeringVolume 2014

Submit your manuscripts athttp://www.hindawi.com

VLSI Design

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Modelling & Simulation in EngineeringHindawi Publishing Corporation http://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

DistributedSensor Networks

International Journal of