1. Introduction
Wireless sensor networks (WSNs) are an emerging field with a high degree of interdisciplinary and knowledge integration, realizing the functions of sensing monitoring, data processing, and communication transmission in various application scenarios [
1,
2]. Due to the harsh deployment environment, the node energy cannot be replenished in time and effectively, leading to the energy hole problem in the data collection and transmission procedure and significantly reducing the network lifetime [
3]. The network routing protocol can balance the difference in network energy consumption, improve the survival rate of nodes, and boost the network lifetime by optimizing the network topology and data transmission links without increasing hardware cost [
4]. Compared with other protocols, the hierarchical routing protocol exhibits considerable advantages in improving energy utilization, reducing transmission delay and packet loss rate, and alleviating the energy hole issue [
5]. Inspired by the high reliability and centralized management of hierarchical network architecture, a large number of researchers have extensively investigated cluster head (CH) selection for hierarchical routing protocol. For instance, LEACH (Low energy adaptive clustering hierarchy) protocol generates CHs uniformly through the node bootstrapping mechanism [
6]. Zheng et al. proposed an energy-balanced clustering algorithm based on distance to the base station (BS) and neighbor distribution to determine the optimal CHs according to residual energy and neighborhood distribution of nodes [
7]. Moreover, Li et al. suggested an energy-balanced routing protocol to divide the network into several clusters by using the
K-means++ algorithm and select CH by using the fuzzy logical system [
8]. However, the current methods of CH selection usually consider the residual energy and location of nodes and ignore the impact of the selection on network invulnerability, leading to inferior invulnerability performance in the face of network attacks. Therefore, combining CH election with invulnerability improvement and energy consumption optimization, selecting CHs with balanced invulnerability and average residual energy is undoubtedly beneficial to extending the network lifetime.
At present, some studies have further changed from the traditional invulnerability quantification analysis to focus on invulnerability enhancement [
9]. For example, Fu et al. presented a sink-oriented cascading model for WSNs to resist the cascading failures by topology optimization, and this model can construct a topology with high robustness in a short time [
10]. Furthermore, Zhang et al. recommended the fireworks and particle swarm optimization algorithm to optimize the topology structure and elevate the network’s dynamic and static invulnerability [
11]. Nevertheless, the invulnerability evaluation indicators used in these existing studies are insufficient and cannot effectively quantify the network invulnerability to provide powerful support for promoting network quality of service (QoS).
In addition, due to the complexity of topology, modeling, and link quality, the success rate of mathematical modelling and competitive analysis for WSNs is unsatisfactory, and game theory has already demonstrated remarkable performance in the optimization techniques for WSNs [
12]. Game theory is widely used in the design of routing protocols, including optimal CH selection for hierarchical routing, cluster formation, network topology control, etc. [
13]. Pitchai et al. proposed a game-theory-based energy-efficient routing algorithm for the CH election in hierarchical routing to decrease network energy consumption [
14]. Moreover, the topology control game algorithm of Markov lifetime prediction model developed by Hao et al. has acceptable capability in ensuring the connectivity and robustness of network [
15]. Nonetheless, the existing routing protocols for WSNs based on game theory barely regard the capability of prolonging the network lifetime cycle as a performance criterion and rarely take into account the changes in network invulnerability. Compared with network coverage and connectivity indicators, invulnerability can comprehensively reflect QoS. Hence, the game between invulnerability and average residual energy in the CH election process can balance the energy consumption and improve the ability against external attacks.
To solve the predicaments mentioned above, the objective of this study is to evaluate the effectiveness of an invulnerability-aware clustering routing algorithm (IACRA) using game-theoretic approach for lifetime optimization of WSNs. Firstly, the integration metric describing the invulnerability of the local network and the whole network is proposed to define the profit model, and the energy cost model of nodes becoming CHs or cluster members is established. Secondly, the utility function is set up according to the strategy set to gain the optimal probability of each node elected as CH and then the dominance function of candidate CHs is developed to ensure that the CH with high residual energy and short distance from the BS is obtained. Finally, the cluster update mechanism is employed to rotate the nodes consuming excessive energy to new clusters to balance the power consumption and prolong the network lifetime. In addition, the feasibility and practicality of the proposed method compared to traditional routing protocols are also verified.
The main contributions and novelties of this study include four aspects:
By merging the invulnerability indicators used to quantify the local and whole network, the network invulnerability based on weighted fusion is constructed for further defining the profit model;
The optimal probability function of each node selected as CH is built through the game between invulnerability and node energy consumption;
Based on the residual energy and distance from the BS, the dominance function of candidate CHs is established to ensure the uniqueness of CH per cluster;
The performance of invulnerability and average residual energy of WSNs based on the addressed protocol under random, maximum-degree, and maximum-betweenness attacks are systematically analyzed.
The remainder of this paper is arranged as follows. The literature review is presented in
Section 2. The network model is given in
Section 3. The details of the presented clustering routing algorithm are displayed in
Section 4 and
Section 5. The validations on the performances of the proposed routing protocol for network lifetime optimization are exhibited in
Section 6. Finally, conclusions are shown in
Section 7.
2. Related Works
WSNs are usually deployed in unattended environments and faced with varied potential attacks, resulting in the increased probability of node failure [
16,
17]. Thus, the invulnerability improvement has become a vital issue for the practicality and feasibility of WSNs. Due to the restriction of cost and technique, it is impossible to enhance network invulnerability by entirely depending on optimizing node capability. At the same time, improving invulnerability through node backup will seriously boost network redundancy and energy consumption [
18]. Therefore, promoting the stability and reliability of WSNs by using efficient network routing schemes without raising the fixed investment has become a trending topic.
The measurement of network invulnerability is undoubtedly a quantitative index to evaluate QoS and is the key to network invulnerability inquisition [
19]. Recently, the most widely used invulnerability indicators of non-topological WSNs primarily include network lifetime, survival ratio, and network coverage, etc. [
20,
21,
22]. These indicators are easy to obtain, so one or more indicators are usually used to estimate invulnerability. Since these indexes mainly employ network attributes unrelated to topology structure as the evaluation criteria, these network attributes cannot actually and accurately depict invulnerability [
23]. On this basis, the topology-based invulnerability indexes come into being. These indexes apply network connectivity as the object, adjacency matrix as the source of feature extraction, graph theory and probability statistics as theoretical means to compute invulnerability more comprehensively [
24,
25]. For instance, Chvatalz introduced the graph toughness to assess the invulnerability performance of WSNs [
26]. Although there are numerous quantitative studies on topology-based invulnerability, the methods focus on various description perspectives and have specific limitations for different types of networks under the assumption of stationary network topology. However, in the application of hierarchical routing protocols, the clustering structure varies dynamically, resulting in the failure to estimate the invulnerability of whole network in variable environments [
27]. The evaluation method based on the equivalent shortest path number can describe the dynamic communication process through the shortest path after the network impairment and can be used to characterize the local invulnerability of network [
28]. Moreover, on the basis of connectivity, considering the characteristics of network convergence, the invulnerability measure method using effective connectivity is biased towards the invulnerability of overall network [
29]. Thus, it is definitely valuable to combine the invulnerability indicator based on the shortest path number and the invulnerability metric based on the connectivity to clarify the general survivability of network.
Scale-free topology has been used by multiple researchers to improve the invulnerability of WSNs under external attacks [
30,
31,
32,
33]. However, these studies fail to precisely assess the impact of different node failure scenarios and damage types on invulnerability performance. In addition, these studies mainly concentrate on appraising network invulnerability, neglecting the analysis and optimization of network structure.
Moreover, the analysis of invulnerability is undoubtedly concerned with the guarantee of QoS performance under the impact of various network attacks [
34,
35,
36,
37]. Nevertheless, the related studies cannot fully reflect the difference value of network invulnerability in the process of node failure. Furthermore, it can effectively indicate the dynamic variation of invulnerability by describing the change in network performance caused by removing critical nodes [
38]. However, the existing attack schemes rarely involve the evaluation of node importance, which is usually called centrality. Jahanpour discovered that compared with other centrality indicators (reciprocal closeness, complement-derived closeness, eigenvector centrality, etc.), degree and betweenness could be used more satisfactorily to select important nodes [
39]. Therefore, in this study, two heuristic node deliberate attack strategies are designed using degree and betweenness. In addition, the failure of nodes under network attack belongs to a transition process in practice, and the nodes do not die immediately. Accordingly, the arbitrary removal of these nodes does not conform to the actual circumstances. In this paper, we presume that the energy of nodes will decline significantly once attacked.
For balancing invulnerability and energy consumption in WSNs, game theory has become a unique method for developing routing protocols, and its rational behavior can be applied to the systematic analysis of hierarchical networks [
40]. The routing protocols based on game theory have demonstrated more attractive advantages than other protocols regarding network lifetime, energy efficiency, and route establishment time [
41]. Considering the factors such as residual energy and link quality, the loss function and profit function can supply proper decisions in CH competition, simplifying the optimal CH selection process for cluster-based routing protocols [
42]. Lin et al. utilized an innovative routing protocol named game-theory-based energy efficient clustering routing protocol (GEEC) to reduce average energy consumption [
43]. Wu et al. employ an efficient energy-aware and game-theory-based clustering protocol (EEGC) to select CHs through equilibrium probability of the game and residual energy dependence index [
44]. Yang et al. used a hybrid, game-theory-based distributed clustering protocol (HGTD) for getting an equilibrium probability by playing a localized clustering game for each node [
45]. The advantages and disadvantages of the above-mentioned three routing protocols are summarized in
Table 1. However, these studies on routing protocols based on game theory rarely integrate QoS indexes into the game process and generally explore network performance through mixed routing indicators. Therefore, QoS cannot be ensured under external attacks because network invulnerability is not involved in the definition of the game model.
4. Game Clustering Model
4.1. Definition of Game Space
Participant: The active nodes in WSNs, denoted as N = {1, 2, 3, …, N}.
Strategic space: The actions of nodes are carried out in rounds. In each round, nodes select respective strategies from the strategy set S = {D, ND}, D denotes that the node participates in the CH election, and ND implies that the node does not partake in the CH election.
Utility function: The strategies of participants are interdependent, and the benefits of each participant are related to the strategy set of other participants. Accordingly, U = {U(i), i = 1, 2, 3, …, N} is used to depict the node profit set corresponding to the strategy set in this study.
In the network, CHs process the data collected from ordinary nodes and transmit it to the BS in the form of data packets. Meanwhile, nodes can choose strategy
D or strategy
ND to maximize their payoffs. If no node chooses strategy
D to become a CH and the data acquired by nodes cannot be sent to the BS, the profits of all nodes equal 0. In the case that at least one node
j selects strategy
D to be a CH, then the payoffs of node
j and any node other than node
j are
and
, respectively, where
is the gain of the data collected by the node successfully reaching the BS,
is the loss of the node elected as CH,
is the punishment for the node becoming an ordinary node. In the case that
,
, being elected as CH can obtain more benefits, and all nodes will definitely choose the CH strategy. Therefore, in this paper, the following assumption
is set. Furthermore, the profit function
U(
i) of any node
i is defined as
The corresponding profit matrix is shown in
Table 2.
Based on the above matrix, in the situation that all nodes are selected as CHs or all nodes are elected as ordinary nodes, both the strategy set S = {D, D, …, D} and S = {ND, ND, …, ND} are not a Nash equilibrium. The overall payoff is the most satisfactory when one node becomes CH and other nodes are ordinary nodes.
4.2. Profit and Loss Analysis
4.2.1. Profit Model
Definition 1. For a network with N nodes, if there are u0(kmin) shortest paths with the number of hops equaled kmin between node i and node j, then the number of equivalent shortest paths between node i and node j is expressed as emij, which can be computed by Equation (2).
where the number of hops
kmin ≤
N−1,
u1(
kmin) refers to the number of paths in which the number of hops between nodes is less than
kmin in the corresponding
N-node fully-connected network, and
t indicates an integer variable. Obviously,
emij ∈ (0,1], in the condition that there is a direct edge between two nodes,
emij is equal to 1. For any node
i and node
j, if
emij is equivalent to 1, the network is regarded as fully connected.
The invulnerability of each cluster in the network is equal to the equivalent shortest path number of the cluster and is denoted as follows
where
N signifies the number of nodes in a cluster,
is the sum of the number of equivalent shortest paths in the entire cluster, and
N(
N − 1)/2 is the number of node-to-node connections that can be established. For an incompletely connected network, the equivalent shortest path number
inv ∈ (0,1), it can be easily noticed that the larger the
inv, the more compact the cluster structure and the more potent the invulnerability.
Definition 2. For a network composed of clusters, the invulnerability of the network can be measured by the weighted sum of the invulnerability per cluster. The invulnerability indicator of the network INV can be calculated as followswhere Nm is the number of nodes in the mth cluster, N is the number of nodes in the whole network, and invm is the invulnerability of the mth cluster. - 2.
Invulnerability based on connectivity
The invulnerability measurement based on effectively connected clusters is defined as follows
where
represents the number of the clusters in the network,
means the number of nodes in the
mth cluster,
N is the total number of nodes in the network, and
lm is the average length of the shortest path between any nodes in the
mth cluster.
The invulnerability based on the number of shortest paths focuses on the survivability of the local network. On the other hand, the invulnerability based on connectivity is biased towards the destruction-resistant of the whole network. Thus, by combining the two indicators, the network invulnerability in the case that node
i is elected as CH can be expressed as follows
In the study, the utility function of the game model is described as the quadratic function of the network invulnerability
B(
i) and the residual energy of the node
E(
i), then the utility function in the game model of CH selection is defined as
where
expresses the competitive factor for nodes to be selected as CHs. The circumstance that
= 1 implies no difference in the invulnerability, whether the node is selected as CH or not. In the case of
= 0, it means that the node is assigned as CH, which has an irreplaceable advantage of invulnerability.
Bj is the invulnerability when another node except node
i is selected as CH,
,
ei is the efficiency factor of
Bi corresponding to node
i,
Nm is the number of nodes in the
mth cluster, and
N is the total number of nodes in the network.
The optimal invulnerability
Bi can be obtained by maximizing
U(
B). Accordingly, we take the derivative of
U(
B) with respect to
Bi and set it to 0, as follows
Consequently, the invulnerability function can be derived as follows
In addition,
Vi is the profit function, which can be described as
where
Bi(
E) is the network invulnerability if node
i is selected as CH,
Ei is the current remaining energy of node
i,
E is the initial energy of node. Meanwhile,
γ is an adjustable parameter. If the node is not attacked,
γ equals 1; otherwise,
γ ∈ [0,1).
4.2.2. Cost Model
The loss of selected CH
CCH(
i) primarily includes receiving data packets from cluster members, fusing data packets of cluster members, and the energy consumed by transferring data packets to the BS. In this study, the free space channel is assumed to be utilized for intra-cluster communication, and the multipath fading channel is presumed to be used for communication between CHs and the BS. Thus,
CCH(
i) is defined as
where
CTx(CH,BS) is the energy required to transmit data packets from CH to the BS,
CRx(CH, i) is the energy consumed by receiving data of cluster members,
Caggr is the energy consumption of data fusion through CH, and
CTx(CH,BS) is given by
where
d(CH,BS) represents the distance between CH and the BS, and
εmp denotes the power amplification constant under the multipath fading channel model.
Eelec is the power consumption of sending and receiving 1 bit data, and
k is the packet size. Moreover, the energy consumption of the packets acquired and fused by CH is proportional to the packet size. Hence,
CTx(CH,i) and
Caggr are obtained by
where
Nm is the number of nodes in the cluster, and
Eaggr is the energy consumption of merging data of a node.
Therefore, the cost of the selected CH is described by
In addition, the cost of cluster members is depicted by
where
d(CH,i) is the distance between cluster member
i and CH, and
εfs is the power amplification constant of free space channel model.
4.3. Utility Function
The game model includes two strategies,
D and
ND, and the probabilities of choosing strategy
D and
ND for a node are assigned as
P and 1 −
P, respectively. We assume that the cluster that node
i locates at has
Nm nodes, each node competes with other
Nm−1 nodes, and the cluster payoff relies on the number of choices of strategy
D. If strategy
ND is selected for all
N nodes, the benefit for all nodes is 0. Suppose at least one node chooses strategy
D and the income of the node is
V(
i) −
CCH(
i), then the number of nodes that select strategy
ND is
Nm−1 and the revenue of each node is
V(
i) −
CCM(
i). The total payoff of these
Nm−1 nodes can be expressed as follows:
Furthermore, the average income of node
i is obtained by
Subsequently,
is achieved by taking the derivative of
to compute the maximum benefit as follows
where
is the optimal probability function for node
i to select strategy
D.
5. Routing Scheme and Attack Types
5.1. Communication Flow
The presented clustering routing algorithm based on game theory can be separated into three stages: initialization, cluster establishment, and stable communication, as shown in
Figure 1. Specifically, the initialization stage mainly gathers the network details in the monitoring area, such as node location, energy, ID, etc.; the cluster establishment stage comprises CH selection and cluster formation; the stable communication stage implements the information transmission from cluster members to CHs and transfers the fused data to the BS.
First, the BS adopts flooding mode to broadcast the ‘networking’ message to the nodes within the monitoring area. Each node documents the distance from the BS and adjusts the appropriate transmitting power for dispatching individual information. Based on the location information, the BS divides the entire area into
ω clusters, and
ω is computed as follows
where
is the average distance between all nodes and the BS.
Secondly, according to the node information from each cluster, the BS calculates the invulnerability and cost of each node as CH and the cost of becoming a common node.
Finally, the BS computes the optimal probability pi* that each node in every cluster becomes CH and transfers the probability data of individual cluster to the local information table per node in the cluster for storage;
- 2.
Cluster establishment phase
At this stage, every node in the
ω clusters has three states: common node, candidate CH, and CH. These nodes with the highest probability are nominated as the candidate CHs for each cluster. Assuming that merely one candidate CH is in a cluster, the node declares itself as CH; Moreover, in the case that there is more than one candidate CH, the dominance function
gopt(
i) of all candidate CHs in a cluster is calculated by
where
is the distance between CH and the BS.
Then, the candidate CH with the highest dominance function value is designated as CH. If multiple candidate CHs have the same maximum value, the candidate CH with the smallest ID is assigned as CH. Furthermore, after completing the CH selection, each chosen CH sends a clustering message containing the ID of CH to the nodes in the corresponding cluster. The common nodes in a cluster return a reply message to CH to apply for cluster membership following the reception of the message. Until all nodes in the monitoring area join the clusters, the cluster establishment stage terminates;
- 3.
Stable communication phase
During the phase, CHs send the TDMA scheduling table to the corresponding cluster members to coordinate the data transmission for avoiding data conflict. Following the information acquisition from cluster members, CHs implement data fusion to further transmit the data packets to the BS in single-hop mode.
5.2. Cluster Update Mechanism
The network re-conducts the CH election when the average energy of the whole network declines by e%. Particularly, nodes that have been elected as CHs will quit the new CH election until all nodes in the cluster are selected as CHs. The total number of nodes participating in the game simultaneously should be the total number of nodes minus the number of elected CHs.
Each cluster rotates π/ω counterclockwise after r CH elections to modify the cluster location and cluster members. In this way, the nodes that consume excessive energy in the original cluster can be included in the new cluster, reducing the likelihood of these nodes becoming CHs and thus prolonging the node lifetime.
5.3. Strategies of Network Attacks
In order to comprehensively assess the performance of WSNs against different attacks, the designed attack scheme mainly have random attack and deliberate attack in our study. The random attack means that the probability of nodes attacked in each cluster is without distinction, while the deliberate attack is the selective attack of some nodes in per cluster on the basis of a specific strategy.
Under the random attack strategy, the nodes with a proportion of p1 are stochastically selected from the initial network, resulting in a drop in node power;
- 2.
Deliberate Attack
Under the maximum-degree attack scheme, the proportion of nodes attacked in descending order of degree centrality is
p2, and the attack causes a decline in node energy. The equation to calculate degree centrality in a cluster with
Nm nodes is defined by
where
Nm is the number of nodes in the
mth cluster, and
h(
x) is the number of direct connections between node
x and other
Nm − 1 nodes in the cluster.
For the maximum-betweenness attack scenario, the ratio
p3 of nodes is attacked in descending betweenness centrality, inducing the reduction in node energy. The formula to computer betweenness centrality for a cluster is given by
where
Nm expresses the number of nodes in the
mth cluster,
gj(
x) indicates the number of shortest paths from node
j to CH through node
x, and
gj implies the number of shortest paths from node
j to CH.
6. Results and Analysis
6.1. Initialization of Simulation P arameter
In this section, the nodes are deployed in a square area with a side length of 100 m, the number of nodes
N ranges from 800 to 1200, the node decline degree
e% varies from 5% to 25%, and the number of CH elections
r alters between 1 and 5. In addition, the data packet length
k is set to 2000, 3000, 4000, 5000 and 6000, respectively. The termination condition of simulations is that the death rate of nodes reaches 80%. The detailed initial simulation parameter settings are shown in
Table 3.
After the initialization of the simulation test, we assume that the three categories of attacks assail the network. Proportions p1, p2, and p3 are set to 10%, and the energy of nodes under attack is presumed to be reduced to 0.25 J. Proceed to the next step, the variation regulations of invulnerability and average residual energy caused by the change of network parameters under various attack modes are investigated in detail.
6.2. Impact of Network Parameters on Invulnerability
Figure 2 depicts the difference in invulnerability under three attack strategies with varied
e%. For different
e%, the invulnerability of the three attacks reaches the maximum when the number of communication rounds is 101. At this point, the descending sorting of invulnerability is maximum-degree attack, maximum-betweenness attack, and random attack. Moreover, under the case of
e% = 10%, 15%, 20%, and 25%, respectively, and the number of communication rounds equals 400, the order of invulnerability for the three attack modes remains identical. In contrast, at
e% = 5%, the invulnerability of maximum-betweenness attack (0.350 J) is the largest and that of random attack (0.313 J) is the least.
Figure 3 demonstrates the changes in invulnerability under three attacks with varying
k. The invulnerability subjected to these three attacks reaches the maximum at the same number of communication rounds (101). In comparing the maximum invulnerability, it is easy to observe that the invulnerability of the maximum-degree attack is the highest, while that of the random attack is the lowest. In particular, the greatest invulnerability (0.995 J) of the maximum-degree attack is the most remarkable for
k = 6000. In the circumstance that the number of communication rounds is 400, at
k = 2000, the invulnerability of maximum-degree attack substantially surpasses that of random attack (64.19%); at
k = 5000, the invulnerability of maximum-degree attack is superior to that of maximum-betweenness attack and the invulnerability of maximum attack is 23.89% larger than that of random attack.
Figure 4 shows the shifts in invulnerability under three attacks with various
r. When
r is 1, 3, 4, and 5, the invulnerability of the three attacks simultaneously attains the maximum at 21, 61, 81, and 101 communication rounds, respectively. At
r = 2, the invulnerability of random attack arrives at the peak value when the number of communication rounds is 21. Furthermore, the invulnerability of maximum-degree and maximum-betweenness attacks reaches the greatest value at 41 rounds. In the condition that
r is 2, 3, and 5, it is obviously found that the invulnerability of the maximum-degree attack is the most satisfactory. At the same time, when
r is 1 and 4, it is easily discovered that the maximum-betweenness attack has the most excellent invulnerability, but the random attack has the lowest invulnerability in both cases. In addition, in the case that
r is 2, 3, 4, and 5, the invulnerability of maximum-degree attack is the most outstanding, and that of random attack is the most inferior; at
r = 1, the invulnerability of maximum-betweenness attack is more heightened than that of maximum-degree attack and random attack.
Figure 5 exhibits network invulnerability changes with different
N for the three attacks. At 101 rounds, it can be uncovered that the highest invulnerability of maximum-degree, maximum-betweenness, and random attacks is ranked from high to low. For
N = 1200, the most prominent invulnerability (0.997 J) of maximum attack is the highest. Moreover, when
N is 1200 and 1000, the utmost invulnerability of maximum-betweenness attack is 0.990 J and 0.733 J, respectively, and the former is 35.06% higher than the latter. Additionally, in the case of
N = 1200, the maximum damage resistance of random attack (0.822 J) is 25.69% higher than that of
N = 800. Especially, the invulnerability order of the three attacks at 400 rounds is the same as that at 101 rounds.
To sum up, we can apparently notice that the order of invulnerability under the three attacks is inconsistent with the more robust capability of scale-free networks to resist random attacks with the variable network parameters. It may be that after critical nodes are attacked, CHs with improved invulnerability and balanced energy consumption can be selected according to the optimal probability of CH selection based on invulnerability and residual energy, providing the optimization strategy for subsequent network clustering and communication. Meanwhile, the cluster update mechanism can suppress the invalid network topology caused by the failure of nodes with higher degree centrality and betweenness centrality. In addition, with the increase of r, the number of communication rounds rises. It is because a less r implies that the network needs to be re-networking more frequently, leading to a considerable decrease in the remaining energy of the whole network. Compared with random and maximum-betweenness attacks, the proposed routing algorithm can sufficiently decrease the damage to the network provoked by the maximum-degree attack, improve the network invulnerability and positively impact network service performance.
6.3. Impact of Network Parameters on Average Residual Energy
Figure 6 exhibits the change of the average residual energy under the three attacks with altering
e. In the case of various
e, the maximum-degree and maximum-betweenness attacks decline rapidly in the later communication period. In addition, when
e is 5, 10, and 20, respectively, the average residual energy of random attack is larger than that of maximum-degree attack for the whole communication process. In the condition that
e is 5, 10, 15, 20 and 25, respectively, we can distinctly perceive that the average residual energy of random attack is bigger than that of maximum betweenness attack within the interval of [1,516], [1,512], [1,536], [1,665], and [1,494], respectively. If
e is 5, 10, 15, and 20, respectively, the average residual energy of the maximum-degree attack is greater than the maximum-betweenness attack in the early stage but less than the maximum-betweenness attack in the later phase. However, in the case of
e = 25, the average residual energy of the maximum-betweenness attack is consistently higher than that of the maximum-degree attack.
Figure 7 shows the variation characteristics of average residual energy under these three attacks with varied
k. Significantly, both the maximum degree and the maximum betweenness attacks lower sharply in the later phase for diverse
k. When
k is set to 4000, 5000, and 6000, the average residual energy of random attacks is greater than the maximum-degree attack. Furthermore, if
k equals 5000 and 6000, the average residual energy of maximum-betweenness attack will be higher than that of maximum-degree attack.
Figure 8 displays the variation of average residual energy under the three attacks with differing
r. It can be evidently seen that the maximum-degree attack and the maximum-betweenness attack decline enormously with the growth in communication rounds. Meanwhile, in the situation that
r is 1, 2, 3, and 5, respectively, it is discovered that when the number of communication rounds is in a specific interval, the average residual energy of random attack is smaller than that of maximum-betweenness attack. Moreover, other features worthy of our attention are as follows: when
r is 3, 4, and 5, the average residual energy of random attack is bigger than the maximum-degree of attack; in the case of
r = 4, the average residual energy of random attack is greater than the maximum-betweenness attack; when
r is 1, 2, and 3, the average residual energy of maximum-betweenness attack is larger than the maximum-degree attack.
Figure 9 illustrates the changes in average residual energy for the three attacks with different
N. The stability of average residual energy of maximum-degree and maximum-betweenness attacks is obviously worse than that of random attack with the increment of communication rounds. It should be noted that in the circumstance that
N is 800 and 1000, the average residual energy of random attack is greater than that of maximum-degree attack. When
N is 800, 1100, and 1200, the average residual energy of maximum-betweenness attack is more excellent than that of maximum-degree attack.
In summary, under the condition of assorted network parameters, we can observe that the average residual energy of random attack reduces the slowest and that of maximum-degree attack declines the promptest. This result is consistent with the opinion that the power consumption provoked by maximum-degree and maximum-betweenness attacks is more remarkable than that of random attack. Therefore, in the case of the random attack, the advantages of the routing algorithm are higher than that of the maximum-degree and maximum-betweenness attacks, providing an effective solution to network energy balance. Moreover, high-degree centrality nodes have more adjacent nodes, and more shortest paths pass through high-betweenness centrality nodes than ordinary nodes. These nodes play a more crucial role in the network, and the attack targets of maximum-degree attack and maximum-betweenness attack are these necessary nodes. However, the failure of essential nodes will induce frequent network route reconstruction, and the average residual energy of the network decreases faster. In addition, the rapid decline of the average residual energy may generate energy holes, so the average residual energy of maximum-degree attack and maximum-betweenness attack drops promptly at a larger number of communication rounds.
6.4. Algorithm Comparison
Figure 10 and
Figure 11 illustrate the comparison results in terms of invulnerability and average residual energy between the proposed IACRA and GEEC, HGTD, and EEGC algorithms. It can be distinctly seen that the number of communication rounds of the four algorithms is 816, 727, 676, and 762, respectively. As shown in
Figure 10, IACRA, GEEC, HGTD, and EEGC obtain the maximal invulnerability at the same number of communication rounds, which is 0.992, 0.638, 0.990, and 0.918, respectively. At 400 rounds, the invulnerability of IACRA is higher than that of GEEC, HGTD, and EEGC by 77.56%, 29.45%, and 15.90%, respectively. Concretely, the invulnerability of HGTD is greater than that of IACRA only when the number of communication rounds is within [1,101]. With the growth in the number of communication rounds, the invulnerability of HGTD drops faster and is gradually lower than that of IACRA, GEEC and EEGC. During the entire communication process, the invulnerability of IACRA is superior to that of GEEC and EEGC.
Furthermore, as displayed in
Figure 11, the average residual energy of IACRA is 8.61%, 18.35%, and 6.36% larger than that of GEEC, HGTD, and EEGC at 400 rounds, respectively. IACRA, GEEC, HGTD, and EEGC rapidly decline when communication rounds are 753, 663, 622, and 729, respectively. At this moment, the average residual energy corresponding to these four algorithms is 0.131 J, 0.133 J, 0.127 J, and 0.119 J. The above performance is caused by the fact that GEEC, HGTD, and EEGC merely pay attention to the impact of energy consumption, distance between nodes and the BS, and degree of nodes on game equilibrium in calculating CH selection probability. However, the CH election procedure of IACRA takes into consideration the balance of invulnerability and energy-consumption, and the distance between nodes and the BS is considered in the definition of the dominance function for CH selection, which is beneficial to making the candidate CH with high residual energy and that closer to the BS to become CH. Meanwhile, the presented cluster updating mechanism can rotate the nodes with low residual energy into new clusters, thus dramatically lengthening the network lifetime. In this study, compared with GEEC, HGTD, and EEGC, a novel invulnerability indicator is introduced to describe the network’s QoS sufficiently. Meanwhile, the game-theoretic selection mechanism of CHs balances the invulnerability and residual energy and enhances the robustness of network topology. In addition, the cluster update mechanism based on cluster rotation extends the lifetime of essential nodes and reduces the network energy consumption.
7. Conclusions
In this paper, the invulnerability-aware clustering routing algorithm based on game-theoretic method is proposed to improve invulnerability and balance network energy consumption in WSNs. In the network, each node in an individual cluster achieves the optimal probability of becoming a CH via the game of invulnerability and residual energy. In addition, the dominance function for candidate CHs considering the remaining energy and the distance from the BS is constructed to avoid the scenario of multiple CHs in a cluster. A cluster update mechanism is established to further optimize the network energy consumption by rotating the nodes with excessive energy consumption to new clusters. Furthermore, the network invulnerability under three external attacks rises first and then declines with varied network parameters. Specifically, the invulnerability of maximum-degree attack is the highest, indicating that the addressed routing algorithm has the most robust capability to reduce the negative impact on invulnerability performance of maximum-degree attack. With the change of network parameters, the average residual energy of random attack decreases the slowest, signifying that the presented routing algorithm can achieve the most satisfactory energy performance when encountering random attack. At the same time, increasing the number of CH elections r is useful to significantly boost the number of communication rounds.
For the proposed routing protocol, CH election computation and intra-cluster communication overhead mainly concentrated in the clustering setup and maintenance phase. Therefore, in future research, to reduce energy consumption, more representative nodes should be preliminarily chosen to participate in the CH election according to the distance from the BS, residual energy, node centrality, etc. Meanwhile, the weight of invulnerability and residual energy in the profit function should be adaptively adjusted to obtain more acceptable network performance under network attacks. In addition, IACRA is superior to GEEC, HGTD, and EEGC in terms of extending the network life cycle, improving the network invulnerability and balancing the network energy consumption. Nevertheless, the feasibility and effectiveness of the routing protocol in other network topologies still require verification. Furthermore, in the case of introducing new adversaries, rebuilding the profit matrix, modifying the existing game model, and reconducting a Nash equilibrium are undoubtedly demanded.