A Game Model for Analyzing Wireless Sensor Networks of 5G Environment Based on Adaptive Equilibrium Optimizer Algorithm

被引:4
|
作者
Zheng, Weimin [1 ]
Meng, Fanying [1 ]
Liu, Ning [1 ]
Huang, Shuo [1 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
基金
中国国家自然科学基金;
关键词
5G; wireless sensor networks; game model; adaptive equilibrium optimization; Nash equilibrium;
D O I
10.3390/s23198055
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Wireless sensors networks (WSNs) play an important role in life. With the development of 5G, its security issues have also raised concerns. Therefore, it is an important topic to study the offense and defense confrontation in WSNs. A complete information static game model is established to analyze the offense and defense confrontation problem of WSNs in 5G. An adaptive equilibrium optimizer algorithm (AEO) based on parameter adaptive strategy is proposed, which can jump out of the local optimal solution better. Experiments show that the optimization ability of AEO outperforms other algorithms on at least 80% of the 23 classical test functions of CEC. The convergence speed of AEO is better in the early stage of population iteration. The optimal offensive and defensive strategy under different offense and defense resources through simulation experiments is analyzed. The conclusion shows that when the offensive resources are large, the offender takes an indiscriminate attack. When the defense resources are small, the defender should defend the most important elements, and when the defense resources are large, the defender should allocate the same resources to defend each element to obtain the maximum benefit. This paper provides new solution ideas for the security problems under the offense and defense game in WSNs.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] A strategic game based equilibrium topology control algorithm for wireless sensor networks
    Chen, Bai
    Zhang, Yaxiao
    Dou, Jingjing
    Hao, Xiaochen
    Journal of Information and Computational Science, 2012, 9 (18): : 5665 - 5673
  • [2] Editorial: Game Theory for 5G Wireless Networks
    Zhang, Haijun
    Jiang, Chunxiao
    Cheng, Julian
    Peng, Mugen
    Leung, Victor C. M.
    MOBILE NETWORKS & APPLICATIONS, 2017, 22 (03): : 526 - 528
  • [3] Editorial: Game Theory for 5G Wireless Networks
    Haijun Zhang
    Chunxiao Jiang
    Julian Cheng
    Mugen Peng
    Victor C. M. Leung
    Mobile Networks and Applications, 2017, 22 : 526 - 528
  • [4] UAV Based Relay for Wireless Sensor Networks in 5G Systems
    Fu, Shu
    Zhao, Lian
    Su, Zhou
    Jian, Xin
    SENSORS, 2018, 18 (08)
  • [5] An optimal algorithm for mmWave 5G wireless networks based on neural network
    Chen, Liang
    Sefat, Shebnam M.
    Kim, Ki-Il
    HELIYON, 2023, 9 (06)
  • [6] Analyzing the Architecture Advantages and Vulnerabilities in Heterogeneous 5G Wireless Networks
    Farroha, B. S.
    Farroha, D. L.
    Farroha, J. S.
    2019 13TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2019,
  • [7] Transmitter Considerations for 5G Wireless Powered Sensor Networks
    Nadeem, Adnan
    Chatzichristodoulou, David
    Kiani, Hamza
    Quddious, Abdul
    Vassiliou, Loukia
    Shoaib, Nosherwan
    Vryonides, Photos
    Nikolaou, Symeon
    2022 16TH EUROPEAN CONFERENCE ON ANTENNAS AND PROPAGATION (EUCAP), 2022,
  • [8] Stable Transmission Algorithm for 5G Wireless Sensor Networks Based on Energy Equalization-delay Reduction Mechanism
    Wu, Bo
    International Journal of Network Security, 2022, 24 (03) : 428 - 435
  • [9] A Crowding Game for Dynamic RAN Slicing Algorithm in 5G Networks
    Boulos, Karen
    Khawam, Kinda
    Yassin, Mohamad
    Costanzo, Salvatore
    2021 17TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB 2021), 2021, : 181 - 186
  • [10] A Novel Environment Self-adaptive Localization Algorithm Based on RSSI for Wireless Sensor Networks
    Yi, Xiao
    Liu, Yu
    Deng, Lu
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 2, 2010, : 360 - 363