Abstract
Wireless sensor networks are often deployed in unattended and hostile environments. Due to the resource limitations and multihop communication in WSN, selective forwarding attacks launched by compromised insider nodes are a serious threat. A trust-based scheme for identifying and isolating malicious nodes is proposed and a mixed strategy and a continuous strategy Monitor-Forward game between the sender node and its one-hop neighboring node is constructed to mitigate the selective dropping attacks in WSN. The continuous game will mitigate false positives on packet dropping detection on unreliable wireless communication channel. Simulation results demonstrate that continuous Monitor-Forward game based selective forwarding solution is an efficient approach to identifying the selective forwarding attacks in WSN.
1. Introduction
Wireless sensor networks have been used in a wide range of applications such as military provision, environment monitoring, and man-unreachable circumstances [1–3]. Due to their shared medium, multihop relay, and lack of physical protection, nodes are vulnerable to various routing attacks, such as selective forwarding, black hole, wormhole, and sinkhole attacks. In these attacks, selective forwarding of packets [4] becomes an increasingly important concern as it is difficult to do with many current techniques in WSNs. As continuously misbehaving nodes in WSN will be distrusted and excluded from the network soon, a rational potential attacker will act normally most of the times, occasionally dropping packets. A number of literatures [5–9] are proposed to overcome this problem. However, this literalness focuses on cooperation among nodes in a WSN. In these researches, selfish nodes drop packets only to conserve their resources but not to damage the whole networks. References [10–21] proposed multipath schemes to eliminate the selective forwarding attack and enable energy to be balanced among these paths in a WSN. However, the adversary can overhear the communication between nodes in WSN and can modify routing control packets affecting the discovery of alternative paths and creating routing loops and dead ends. Multipath incurs more energy consumption than single-path routing. In particular, when a node is captured and compromised, all information of the node, including any security keys, becomes available to the attackers, and the adversary will have full control of the node. Game theory [22] is one of the effective mathematical methods to solve the attacker-defender interaction problems. And there is growing interest in using game to solve selective forwarding attack analysis problems. In [23], they analyze the collusion in selective forwarding attacks and propose a multiattacker repeated colluding game. They think the colluding attackers form a malicious group and the punishment to each colluding attacker is strongly related to the overall performance of this malicious group. In [24], the mixed strategy Nash equilibrium of the game provides the probability that the flooding packet would be forwarded by the receiver node. Here node i needs to make a decision whether to forward p or not. The number of players of the game is the number of nodes that receive p. Only a limited number of neighbors of the source node participate in forwarding. In [25], a stationary Markovian game model is utilized to optimize system performance in terms of throughput, delay, and power consumption cost. However, in Markov games, actions of players are determined based on the current state of the game, instead of considering the complete game history. In [26], they present a systematic study of collusion-resistant routing in noncooperative wireless ad hoc networks. In their model, each node in a path receives a payment from source node S for each forwarded packet. A central authority collects payments from the source node and guarantees secure distribution of payments to the forwarding nodes. And they assume that packet discarding and standby consume much less energy. However, this centralized mechanism and the above assumption are not suitable in WSN. Literature [27] proposed a generalized two-hop f-cast relay for packet routing, where f is replicated packet redundancy limit. They explore possible maximum throughput capacity of a node and determine the corresponding optimal setting of f to achieve it. Node's payoff is the achievable throughput capacity of its own traffic. And all nodes play the symmetric strategy profiles. Literature [6] proposes a model based on game theory and graph theory to investigate equilibrium conditions of packet forwarding strategies. In [28], they combine downstream assessments and end-to-end assessments to detect and mitigate collaborative Grey hole attacks. And a two-hop acknowledgment mechanism is integrated with forwarding assessments. However, in [6, 28], they assume the channel is error-free wireless and no per-link encryption. This does not meet the actual situation of most WSNs. In literature [29], they develop a channel aware detection (CAD) algorithm that can effectively identify the selective forwarding misbehavior from the normal channel losses. In [30], the authors proposed a packet forwarding framework based on each node's own past actions and its observation of other nodes. However, their objective is to maximize the node's own payoff, not to cause damage to other nodes. In literature [31], to obtain the trust value of the insider nodes along the route x, after every M data packets, the sender will generate a check packet and send it to destination node thought the route x. As this check packet passes through the route x, each insider node in x will attach its opinions about its upstream and downstream neighbors to the check packet. However, this mechanism cannot solve bad mouthing attack when nodes attach their opinions to the check packets. Selective dropping attack launched by insider node is still a problem that needs to be solved.
A repeated continuous noncooperative game based neighbor monitoring system to detect compromised nodes in selective forwarding attack in WSN is proposed in this paper. Based on the monitoring results, we can select more reliable cluster heads having sufficient residual energy and high trust level for data forwarding and data aggregation.
The rest of this paper is organized as follows. Game theory is introduced in Section 2. In Section 3, a mixed strategy Monitor-Forward game in WSN is constructed and simulated. In Section 4, a game with continuous strategy to mitigate false positives on packet dropping detection on unreliable wireless communication channel is constructed and simulated. Routing protocol without monitor mechanism and routing protocol with mixed strategy Monitor-Forward game and with continuous strategy Monitor-Forward game in a clustered WSN are all simulated and compared in Section 5. Finally, conclusions are drawn in Section 6.
2. Game Theory
Game theory is the study of problems of conflict and cooperation among independent decision-makers. Game theory is one of the effective mathematical methods to solve the attacker-defender interaction problems in WSN. In game theory, pure strategy means that the players choose strategies determinedly. However, in the real case, the rational node will change its strategy over time. In action decision of WSN, if the suspicious node
2.1. Mixed Strategy Nash Equilibrium
Mixed strategy allows a player to randomly select a pure strategy. We first construct the Monitor-Forward game as a mixed strategy game, in which the node's strategy is probability distribution over its pure strategy set. A pure strategy can be regarded as a degenerate case of a mixed strategy, in which that particular pure strategy is selected with probability 1 and every other strategy with probability 0.
A Nash equilibrium for a mixed strategy game is stable if a small change in probabilities for one player leads to a situation where two conditions hold:
The player who did not change has no better strategy in the new circumstance. The player who did change is now playing with a strictly worse strategy.
2.2. Continuous Strategy Game
A continuous game allows more general sets of pure strategies, which may be uncountable infinite. It extends the notion of a discrete game, where the players choose from a finite set of pure strategies. In general, a game with uncountable infinite strategy sets will not necessarily have a Nash equilibrium solution. If, however, the strategy sets are required to be compact and the utility functions continuous, then a Nash equilibrium will be guaranteed.
The existence of a Nash equilibrium for any continuous game with continuous utility functions can be proven using Irving Glicksberg's generalization of the Kakutani fixed point theorem.
2.3. Repeated Game and QRE of a Repeated Game
In game theory, a repeated game is a special case of dynamic game which consists in some number of repetitions of some base game (called a stage game). It captures the idea that a player will have to take into account the impact of his current action on the future actions of other players; this is called his reputation.
The stage game in our repeated game in WSN is the 2-person games played by the suspicious node
Formal Definition. For G-period repeated game, at each period g, the moves during periods
If
However, because of the limited energy of nodes in WSN, the Monitor-Forward game is indeed a random ended repeated Monitor-Forward game. Random repeated game is very different from finite games with definite end time in action or strategy choosing. But it is very similar to infinite games in strategy choosing. So, we can treat this game as infinite games in strategy analysis process.
In a multiround repeated game, the nodes will focus more on the long-term overall utility. Since the game is ended randomly, node's lifetime which is decided by the residual battery energy is important in the strategy choosing. Suppose ω denotes how long the suspicious node and monitoring node believe the repeated Monitor-Forward game will last. ω is denoted by a real number that lies in the interval if if
2.4. Quantal Response Equilibrium
With the Monitor-Forward game repeats, the nodes obtains more and more information of the other's misbehavior. We can obtain the Quantal response equilibrium (QRE) by utilizing the method in [32]. Players make choices based on a quantal-choice model and assume other players do so as well.
Quantal response equilibrium (QRE) is a solution concept in game theory. First introduced by Richard McKelvey and Thomas Palfrey, it provides an equilibrium notion with bounded rationality. In a quantal response equilibrium, players are assumed to make errors in choosing which pure strategy to play. The probability of any particular strategy being chosen is positively related to the payoff from that strategy. Quantal responses are smoothed-out best responses, in the sense that players are more likely to choose better strategies than worse strategies but do not play a best response with a probability one.
By far the most common specification for QRE is logit equilibrium (LQRE) [32]. In a logit equilibrium, player's strategies are chosen according to the probability distribution:
λ is a rationality parameter which is nonnegative (sometimes written as
3. Mixed Strategy Game Based Monitoring Mechanism in WSN
3.1. A Monitoring Based Trust System
In WSNs, compromised nodes have legitimately registered into the network and the attackers can bypass the public key and private key system. A reputation-based trust system which maintains information about nodes' history behaviors is a necessary complement to the existing security mechanism.
Trust is a particular level of the subjective probability with which an agent assesses another node in a context such as data integrity, honesty, and packet forwarding. In this paper, we suppose that in a clustered wireless sensor network, the cluster heads aggregate and compress the data from the sensor nodes in the cluster and forward it to its next-hop cluster head or the base station and only the trust on selective forwarding context is considered in the Monitor-Forward game. Cluster heads are also in charge of trust values on data reliability of sensor nodes in these clusters. A distributed watch dog runs on every cluster head in WSN to monitor and record the packet forwarding behaviors of its next hop cluster head in the route to destination. Each cluster head node in WSN maintains its own neighbor set
Each cluster head executes the trust model by monitoring its neighboring nodes' participation in the packet forwarding mechanism. If the node forwards the packet, it confirms that the node has acted in a benevolent manner and so its direct trust counter is incremented. If the forwarding node does not transmit the packet, its corresponding direct trust measure is decremented. In [33], after transmitting the packet, sending node must wait a trust update interval until the time it overhears the retransmission by its neighbor or the trust update interval has expired. This interval is related to the mobility and traffic of the network and can be set accordingly. If during the TUI the node is able to overhear its neighboring node retransmit the same packet, the sending node increases the trust value for that neighbor. In case no retransmission is heard and a time-out occurs when the TUI expires, the trust value for that neighbor is decremented. However, after transmitting the packet, the persistent monitoring of sending node would cost too much energy. In order to solve this problem, we propose a low cost game based monitoring mechanism to detect the compromised node.
3.2. A Monitor-Forward Game Based Monitoring Mechanism in WSN
In WSN, the sensor node consumes power for sensing, communicating, and data processing. More energy is required for communication than any other process. The transceiver of a node has four operational states that are transmit, receive, idle, and sleep. Most transceivers operating in idle mode consume almost equal power to operate in receive mode [34]. Thus, in a lot of literature, the transceiver is completely shut down when it is not transmitting or receiving rather than being in the idle or listening mode. In [33], to monitor the neighbor node, after transmitting the packet, sending node will not go to sleep but waits a trust update interval until it overhears the retransmission by its neighbor or the trust update interval has expired. However, if the trust update interval is too short, the transmission of its neighbor will be missed; if trust update interval is long, the persistent monitoring of node will cost a lot of energy.
By traffic analysis and statistical analysis executed in end nodes of a path [35], we can detects anomalies in network traffic and calculate probability of occurrence of attack on the path. However, which node in this path is malicious is not known. Nodes with monitoring mechanism can detect selective dropping attack of their neighboring node.
3.3. Formal Definition of the Game
The formal definition of the game is as follows.
Definition 1.
Let
Let
A strategy profile
Considering the larger cost of collusion attack monitoring, the nodes in the path whose attack probability is below the threshold will play a simpler static game without collusion considering. We begin with the simpler Monitor-Forward game without collusion considering.
3.4. Pure Strategies Set of the Game
The static Monitor-Forward game without collusion considering is a simultaneous game. In this game, each player has a finite number of pure strategies. The suspicious node
3.5. Mixed Strategy Nash Equilibrium of the Monitor-Forward Game
Suppose in this mixed strategy game the suspicious node's strategy is a probability distribution
The payoff matrix of the game is shown in Table 1. In each cell of the matrix, the first number represents the payoff to the monitoring node, and the second number represents the payoff to the suspicious node.
The payoff matrix of the static game.
We define
The utility
Similarly, the utility
The mixed strategy allows a player to randomly select a pure strategy. And the Nash equilibrium of the game indicates the outcome in which neither suspicious node nor the monitoring node wants to unilaterally change its strategy.
3.6. Result of Simulation
As we have known, l is the multiple of average RTT of one hop transmission in WSN and we suppose

Payoff matrix the Monitor-Forward game.
Figure 1(a) shows the payoff matrix with
The Nash equilibrium is as follows:
Figure 1(b) shows the payoff matrix with
The Nash equilibrium is as follows:
The mixed strategy of The mixed strategy of
If we set
Figure 1(c) shows the payoff matrix with
The Nash equilibrium is as follows:
Figure 1(d) shows the payoff matrix with
The Nash equilibrium is as follows:
From the above simulation results, we can see that higher punishment B will lead to smaller monitoring probability of the monitoring node
3.7. QRE Simulation Result of the Repeated Game
We conducted an experiment with

QRE of repeated game with
The experiment parameters are

QRE of repeated game with
By using the method described in detail in [32], we can obtain predicted frequencies of moves at each information set for any parameter, λ, of the AQRE model. Given a data set from the particular experimental game, the estimate,
4. Continuous Strategy Monitor-Forward Game in WSN
4.1. Unreliable Communication Channel
Because of the unreliable wireless communication channel in WSN, packet loss, data corruption, and variable propagation delays will lead to large amounts of false positives on packet dropping detection that rely on strict timing. Normal loss events such as medium access collision or bad channel quality will lead to normal loss rates which are not caused by malicious act. The normal loss rates
4.2. Continuous Monitor-Forward Game in WSN
As previously mentioned, a mixed strategy Nash equilibrium is equilibrium where at least one player is playing a mixed strategy. In the continuous Monitor-Forward game
We should take into account of normal packet losses due to poor channel quality and medium access collisions by setting different k in the Monitor-Forward game. As wireless loss probability due to bad channel quality varies with the network status changing, k is dynamically adjusted with the normal loss rates in the game every time the game is played.
By the continuous game theory, we know that the utility functions of a player with continuous strategy are often expressed by a quadratic equation of a variable. As
Define the utility functions
4.3. Best Response Function of the Continuous Game
A best response is the point at which each player in a game has selected the best response (or one of the best responses) to the other players' strategies.
To achieve a strategy Nash equilibrium, set
In this continuous game, the best response of
We have known that
If
4.4. Simulation of the Continuous Monitor-Forward Game
In this continuous game, we have known that

The payoff function of

By setting
As we can see, if the punishment B is small, the game will result in an equilibrium with low forward probability p of
5. Simulation of a Routing Protocol with Monitor-Forward Game in a Clustered WSN
5.1. Simulation Setup
The routing protocol with mixed strategy Monitor-Forward game (MSMFM) and routing protocol with continuous strategy Monitor-Forward Game (CSMFM) are simulated in various setups using Matlab. 100 nodes are randomly distributed in an area of 100-by-100 meters and the base station is set in the center of the area.
Initial energy of each node is set to 0.5 joules. The election probability of a node to become cluster head is 0.1. The battery power consumption of
5.2. Simulation Numerical Analysis
The initial deployment of the routing protocol without monitor mechanism (WMM) is shown as in Figure 6(a). 100 nodes are randomly distributed in an area of 100-by-100 meters and the base station is set in the center of the area. r denotes the packet transmitting round in WSN. As we can see in Figure 6, the first node died in the round

The initial deployment and lifetime of WMM.
In the ideal case without normal loss, 15% of the cluster head nodes are randomly chosen as selective dropping attackers in the forwarding paths between source and destination pairs. The network lifetime using different protocols is illustrated in Figure 7.

Lifetime of the network.
The simulation results indicate that lifetimes of networks using MSMFM and CSMFM are shorter than WMM as they have monitor mechanism which consumes much energy. Compared with MSMFM, CSMFM which use continuous strategy extends the lifetime of the network, delays the first node's death time, and enhances the energy efficiency.
The packet forward probability without normal packet loss is shown in Figure 8. The Packet Delivery Radio of CSMFM and MSMFM is improved compared to WMM because they detect and isolate the attacker and forward the packets to the destination through a different secure path. Using WMM which have no monitor mechanism, there is a significant degradation in the Packet Delivery Radio with selective dropping attacks. Using MSMFM, the Packet Delivery Radio is improved to 85% in the case of 20% dropping and 65% in case of 50% dropping. Using CSMFM, the Packet Delivery Radio is improved to 88% in the case of 20% dropping and 70% in case of 50% dropping.

The packet forward probability without normal packet loss.
The curves in Figure 9 illustrate the performance of CSMFM, MSMFM, and WMM in the presence and absence of attacker(s) with normal losses. As the sum of false alarm and missed detection probabilities of CSMFM is degraded compared to MSMFM, the Packet Delivery Radio of CSMFM is increased. And the increased channel loss rate does cause more packet loss.

The performance of CSMFM, MSMFM, and WMM in the presence and absence of attacker(s) with normal losses.
6. Conclusion
Due to the resource limitations and open environments in WSN, traditional cryptography based security mechanisms such as authorization and authentication are not effective against insider attacks. To mitigate selective forwarding attacks launched by insider nodes in multihop communication, a repeated mixed strategy and an energy-efficient continuous strategy Monitor-Forward game between the sender node and its one-hop neighboring node in a cluster WSN are proposed and simulated. We propose a trust management mechanism to identify and isolate malicious nodes for the cluster wireless sensor networks. A distributed watch dog runs on every cluster head in WSN to monitor and record the packet forwarding behaviors of its next hop cluster head node. By this trust model, we can select more reliable cluster heads having sufficient residual energy and high trust level.
The main contributions of our work are as follows:
We constructed and simulated a mixed strategy Monitor-Forward game, analyze the payoff matrix and mixed strategy Nash Equilibrium of the game with different parameters: B and C. The random ended repeated mixed strategy game and its quantal response equilibrium are discussed. Because of the unreliable wireless communication channel in WSN, packet loss, data corruption, and variable propagation delays will lead to large amounts of false positives on packet dropping detection that rely on strict timing. We constructed and simulated a continuous game which allows players to choose a strategy from a continuous strategy set. Routing protocol without monitor mechanism, routing protocol with mixed strategy Monitor-Forward game, and routing protocol with continuous strategy Monitor-Forward game in a clustered WSN are all simulated and analyzed with Matlab in various setups. Game analyzing and simulation results demonstrate that game theory based framework is an efficient approach to identifying the selective forwarding attacks and increase the packets forward probability of the networks. Continuous strategy game will consume less battery energy and have less false alarms than mixed strategy game on unreliable channels.
Footnotes
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgment
This paper is supported by the Fundamental Research Funds for the Central Universities (2014XT04).
