Next Article in Journal
Linear and Nonlinear Effects in Connectedness Structure: Comparison between European Stock Markets
Previous Article in Journal
The Free Energy Principle for Perception and Action: A Deep Learning Perspective
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Epidemic Model Base on Pulse Charging in Wireless Rechargeable Sensor Networks

1
Guangzhou Industry & Information Technology Institute for Intelligent Robotic Equipment, Guangzhou University, Guangzhou 510006, China
2
School of Mechanical and Electric Engineering, Guangzhou University, Guangzhou 510006, China
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Entropy 2022, 24(2), 302; https://doi.org/10.3390/e24020302
Submission received: 7 January 2022 / Revised: 14 February 2022 / Accepted: 14 February 2022 / Published: 21 February 2022
(This article belongs to the Topic Complex Systems and Artificial Intelligence)

Abstract

:
As wireless rechargeable sensor networks (WRSNs) are gradually being widely accepted and recognized, the security issues of WRSNs have also become the focus of research discussion. In the existing WRSNs research, few people introduced the idea of pulse charging. Taking into account the utilization rate of nodes’ energy, this paper proposes a novel pulse infectious disease model (SIALS-P), which is composed of susceptible, infected, anti-malware and low-energy susceptible states under pulse charging, to deal with the security issues of WRSNs. In each periodic pulse point, some parts of low energy states (LS nodes, LI nodes) will be converted into the normal energy states (S nodes, I nodes) to control the number of susceptible nodes and infected nodes. This paper first analyzes the local stability of the SIALS-P model by Floquet theory. Then, a suitable comparison system is given by comparing theorem to analyze the stability of malware-free T-period solution and the persistence of malware transmission. Additionally, the optimal control of the proposed model is analyzed. Finally, the comparative simulation analysis regarding the proposed model, the non-charging model and the continuous charging model is given, and the effects of parameters on the basic reproduction number of the three models are shown. Meanwhile, the sensitivity of each parameter and the optimal control theory is further verified.

1. Introduction

In recent years, wireless sensor networks (WSNs) have become a hotspot causing extensive attention from researchers [1,2,3,4,5]. Sensor nodes with data storage and data transferring functions make up a sensor network. Nodes can monitor the physical environment near them by deploying in an area without manual monitoring. WSNs have a wide range of applications such as secondary agricultural production, ecological monitoring, traffic safety monitoring, healthcare services and military fields [6]. However, because of the vulnerable nature of nodes and the limited battery capacity, security [7] and short life cycle [8] problems remain to be solved.
Researchers have come up with lots of solutions to optimize energy utilization problems. It is noted that the deployment of rechargeable nodes can solve the energy problem more fundamentally. Wireless rechargeable sensor networks (WRSNs) consist of rechargeable sensor nodes. In recent years, lots of research on WRSNs mainly focuses on the charging planning problem and the energy allocation problem [9,10,11]. However, the network security of WRSNs is rarely studied. Malware can replicate itself. Once implanted into the network system, malware will cause information leakage, network interruption and even network breakdown [12].
Since the infection mechanism of disease in the population is almost the same as the transmission mechanism of malware in WSNs, the epidemiological dynamic is generally used in the study of security issues in WSNs. The applications of epidemiological dynamics are mainly the model’s stability analysis. Recent related studies are shown in Table 1.
However, there are few studies on the application of epidemic dynamics in WRSNs, and there is almost no research on the pulse charging characteristic of WRSNs. Due to the similarity between the propagation characteristic of epidemic disease in the population and the propagation characteristic of malware attack in WRSNs, the application of pulse effect also gives us a novel method to suppress the spreading of malware. Recent related studies are shown in Table 2.
Due to the rechargeable characteristic, the time of the charging behavior relative to the whole process of the spreading of malware [33] is short, and the charging behavior can be thought of as a pulse activity to some extent. The problem of malware spreading under pulse charging is different from that under continuous charging mode [34]. In this paper, inspired by previous works [35] and taking into account the pulse-charging process, a time-delay free model of WRSNs based on pulse charging, SIALS-P (sensitive—infection—anti-malware—low energy sensitive) is proposed. The model reveals the hardware attack process of malware and the pulse charging process in WRSNs. In this paper, we introduce the local and global stability of the malware-free T-period solution of SIALS-P by using stability analysis theory to prove the persistence of malware transmission and propose an optimal impulsive control strategy.
The main contents of this paper are as follows: the modeling of SIALS-P and the proof of the existence of a malware-free equilibrium state and malware-free T-period solution will be introduced in Section 2. Section 3 prove the local stability and global stability of the system. Section 4 demonstrates the persistence of disease. Section 5 proposes and proves the optimal impulsive control strategy. Section 6 shows the simulation results. Section 7 is the conclusion of this paper.

2. Modeling Analysis

2.1. Epidemic Modeling on WRSNs

WRSNs is composed of randomly distributed rechargeable nodes. The SIALS (susceptible, infected, anti-malware, low-energy, susceptible) model is first introduced here. It is assumed that the number of nodes increases at a rate Λ , where Λ is greater than 0. The nodes in the network belong to one of six possible compartments. This model describes the relationships among susceptible nodes (S), infected nodes (I), anti-malware nodes (A), low-energy and susceptible nodes (LS), low-energy and infected nodes (LI) and dysfunctional nodes (D). S nodes are vulnerable to malware, and I nodes are the nodes infected by malware nodes. A nodes clear the malware by activating anti-malware; both LS and LI nodes are at low energy levels and remain dormant. D nodes are totally out of function.
According to the knowledge of epidemic dynamics, the epidemiological coefficients of the models are not less than zero [36].
Thus, the dynamical system can be obtained:
d S t d t = Λ α 1 I t + β 1 + μ S t ,   d I t d t = α 1 S t I t α 2 + β 3 + μ + α I t , d A t d t = β 2 + μ A t + α 2 I t , d L I t d t = μ L I t + β 3 I t , d L S t d t = μ L S t + β 1 S t + β 2 A t , d D t d t = μ N t + a I t ,  
where Λ is the birth rate of susceptible nodes, α 1 is the transmission rate of infected nodes, β 1 is the wastage rate of susceptible nodes becoming low-energy susceptible nodes, μ is the mortality rate of nodes, α 2 is the clearance rate of anti-malicious nodes to infected nodes, β 3 is the wastage rate of infected nodes becoming low-energy infected nodes, α is the mortality rate of infected nodes, β 2 is the attrition rate of anti-malicious nodes becoming low-power and susceptible nodes.
We have N t = S t + I t + A t + L S t + L I t , so the supplementary equation is:
d N t d t = Λ μ N t a I t ,
As t , the feasible region is governed by L S t = N t S t A t I t L I t :
Ω = S , A , I , L I R 4 | 0 N Λ a I μ .  

2.2. A Pulse Charging Model

By introducing the pulse charging into the above SIALS model, SIALS-P can be obtained when t = n T   n = 1 , 2 , 3 ... :
S t + = S t + γ L S t ,   I t + = I t + γ L I t , A t + = A t , L I t + = 1 γ L I t , L S t + = 1 γ L S t , N t + = N t ,
where T is the pulse charging period, and γ is the charging rate. n T + is used to represent the next instant of n T ; that is, pulse charging is to charge the low-energy nodes ( L S , L I ) at a series of time points. When t   n T n = 1 , 2 , 3 ... :
d S t d t = Λ α 1 I t + β 1 + μ S t , d I t d t = α 1 S t I t α 2 + β 3 + μ + α I t , d A t d t = β 2 + μ A t + α 2 I t , d L I t d t = μ L I t + β 3 I t , d L S t d t = μ L S t + β 1 S t + β 2 A t , d N t d t = Λ μ N t a I t ,
The malware-free T -period solution is the periodic solution of T that satisfies the above system of equations when I = 0 , L I = 0 and A = 0 , where
S t + L S t = N t = N = Λ μ ,
Thus, combined with Equations (4)–(6), we can obtain:
d S t d t = Λ β 1 + μ S t ,         d L S t d t = μ L S t + β 1 S t ,   t n T ( n = 1 , 2 , 3 ) , S t + = 1 γ S t + Λ γ μ , L S t + = 1 γ L S t ,                 t = n T ( n = 1 , 2 , 3 ) .
In the time interval n T , n + 1 T , the integral of Equation (7) in the period of two concurrent pulses can be obtained:
L S t = β 1 Λ β 1 + μ μ + L S n T + β 1 Λ β 1 + μ μ e ( β 1 + μ ) t n T ,
where L S n T is the initial value at the n th pulse time. Using the stroboscopic map [37], in other words, the pulse charging cycle is taken as the stroboscope sampling interval. In the n th pulse charging cycle, the value of the state variable at the initial moment of the pulse charging cycle is used to represent the value at the end of the pulse charging cycle. Therefore, we have L S n + 1 = f L S n when L S n + 1 = L S n + 1 T + . Thus, the relationship between different cycles can be obtained:
L S n + 1 = 1 γ β 1 Λ β 1 + μ μ + L S n β 1 Λ β 1 + μ μ e ( β 1 + μ ) T ,
When the equilibrium state is reached, there is L S n + 1 = L S n between the two cycles, and the equilibrium state can be obtained:
L S * = β 1 Λ β 1 + μ μ 1 γ e ( β 1 + μ ) T 1 e ( β 1 + μ ) T 1 + γ ,
When t , from Equation (6) we have:
S * = Λ μ L S * ,  
The malware-free T-period solution can be obtained:
L S ˜ t = β 1 Λ β 1 + μ μ + L S * β 1 Λ β 1 + μ μ e ( β 1 + μ ) t n T , S ˜ t = μ L S ˜ t .
where t     n T , n + 1 T .   S ˜ t ,   L S ˜ t is the malware-free T -period solution of Equation (7).

3. Stability Analysis

The basic reproduction number R 0 is an important parameter in the early stage of malicious virus infection. It represents the expectation of the number of susceptible nodes that can be infected by an infected node in its average infection cycle after an infected node is introduced into the susceptible node. In general, R 0 = 1 can be used as a threshold to determine whether malware is dead or not.
Theorem 1.
The equilibrium states S * and L S * of Equations (10) and (11) are locally asymptotically stable and globally asymptotically stable if R 0 < 1 .
Proof of Theorem 1.
Taking the equilibrium states S * and L S * as the initial value of Equation (9), we have:
d f L S n d L S L S = L S * < 1
Therefore, the local stability of the equilibrium state L S * of Equation (10) is locally asymptotically stable according to the stability criterion of differential systems [38]. Because S * = Λ μ L S * , the local stability of the equilibrium state S * is locally asymptotically stable.
The local stability of S * and L S * means the global stability of S * and L S * . This implies that the pulse immunization operations produce the sequences of S n and L S n that converge to the equilibrium states S * and L S * . □
For the stability of a malware-free T-period solution of Equation (7), we conclude the following theorems:
Theorem 2.
The malware-free T-period solution ( S ˜ t , 0 , 0 , 0 ,   L S ˜ t ) of the system, is locally asymptotically stable if R 0 < 1 .
Proof of Theorem 2.
Let Q t be an n × n matrix. Φ t is the basic solution matrix of the linear differential system x t = Q t x t . In addition, let r Φ Q t be the spectral radius of Φ Q t . Using Floquet theory [39], the local stability of the malware-free T -period solution ( S ˜ t , 0 , 0 , 0 ,   L S ˜ t ) can be proven. Let the disturbance of the malware-free T -period solution of the system be:
x t = S t , I t , A t , L I t , L S t ,
Through the linear approximation of Equations (4)–(6), we can obtain the following impulsive differential equation:
x t = Q t x t ,                       t n T , n N , x t + = P x t ,                                 t = n T , n N ,
where
Q t = U B 0 F V ,               P = P 1 0 0 P 2 , U = β 1 + μ 0 0 0 β 2 + μ 0 β 1 β 2 μ ,               B = α 1 S * t 0 α 2 0 0 0 , F = α 1 S * t 0 0 0 ,                     V = α 2 + β 3 + μ + a 0 β 3 μ , P 1 = 1 0 γ 0 1 0 0 0 1 γ ,                 P 2 = 1 γ 0 1 γ ,
Because Φ Q t = Φ i j is the basic solution matrix of the linear differential system x t = Q t x t , then Φ   ˙ t = Φ   t Q t , where Φ   0 = E 0 ( E 0 is the unit moment matrix). The differential equation is solved, and we have:
Φ t = e U T Φ B t 0 Φ F V t ,
when t = n T , it is easy to figure out:
P Φ t = P 1 e U T P 1 Φ B t 0 P 2 Φ F V t ,
P 1 e U T = e β 1 + μ T + γ β 1 T e μ T   γ β 2 T e μ T γ e μ T 0 e β 2 + μ T 0 1 γ β 1 T e μ T         1 γ β 2 T e μ T         1 γ e μ T .
P 2 Φ F V t = e 0 T α 1 S * t α 2 + β 3 + μ + a d t + γ e β 3 T γ e μ T 1 γ e β 3 T 1 γ e μ T .
Obviously, the Floquet multipliers of Equation (18) are as follows:
ω 1 = r ( P 1 e U T ) , ω 2 = r ( P 2 Φ F V t ) ,
According to Floquet theory and pulse differential equation theory [37], the malware-free T -period solution is locally asymptotically stable if ω i < 1 , where i = 1 , 2 . It is difficult for us to see the values of ω 1 and ω 2 directly. Therefore, in the case that ω 1 is less than 1, there exists a threshold, which can be defined as:
R 0 r ( P 2 Φ F V t )
According to Floquet theory, when R 0 < 1 , the malware-free T -period solution ( S ˜ t , 0 , 0 , 0 ,   L S ˜ t ) of the system is locally asymptotically stable. Locally asymptotic stability is only for the domain where the periodic solutions are small, and the asymptotic stability of solutions with arbitrary initial values in region Ω will be proven next. □
Theorem 3.
When t , S t S ˜ t and L S t   L S ˜ t , the malware-free T-period solution of the system is globally asymptotically stable.
Proof of Theorem 3.
From Equation (2), we have: Λ μ + a N t     d N t d t     Λ μ N t . It follows that
Λ μ + a lim t i n f   N t lim t s u p   N t Λ μ ,
From Equation (23), we have:
S t + L S t lim t sup N t Λ μ ,
From Equations (7) and (24), we can obtain:
d S t d t Λ β 1 + μ S t , d L S t d t = μ L S t + β 1 S t μ + β 1 L S t + β 1 Λ μ ,   t n T , n N , S t + = 1 γ S t + Λ γ μ , L S t + = 1 γ L S t ,   t = n T , n N .
Consider the following comparison system:
x 1 t = Λ β 1 + μ x 1 t , x 2 t = μ + β 1 x 2 t + β 1 Λ μ ,   t n T , n N , x 1 t + = 1 γ x 1 t + Λ γ μ , x 2 t + = 1 γ x 2 t ,   t = n T , n N .
Through the comparison theorem of impulsive differential equations [40], it can be obtained that S t x t and L S t x t . When t , we can obtain x 1 t S t and x 2 t L S t . Then, there are ε > 0   and   t 1 > 0 . For any time t > t 1 , we have:
S t x 1 t < S ˜ t + ε , L S t x 2 t < L S ˜ t + ε ,
d I t d t α 2 μ a β 3 + α 1 S ˜ t + ε I t , d L I t d t μ L I t + β 3 I t ,   t n T , n N , I t + = I t + γ L I t , L I t + = 1 γ L I t ,   t = n T , n N .
Suppose u t = u 1 t u 2 t , we have:
F V u t = α 2 μ a β 3 + α 1 S ˜ t + ε 0 β 3 μ u 1 t u 2 t = α 2 μ a β 3 + α 1 S ˜ t + ε u 1 t μ u 2 t + β 3 u 1 t ,
Consider the following comparison system:
u t = F V u t , t n T , n N , u 1 t + = u 1 t + γ u 2 t ,   u 2 t + = 1 γ u 2 t ,     t = n T , n N .
The solution of the system can be expressed as:
u u 1 , u 1 = Φ F V t n T u n T + ,
when t = n T , u n + 1 T + = P 2 Φ F V t n T u n T + . When t , u 1 0 and u 2 0 . At this time, lim t I t = 0   and   lim t L I t = 0 . Then, there are ε 2 > 0   and   t 2 > t 1 . For any t > t 2 , we have 0 < I t < ε 2 , 0 < A t < ε 2 and 0 < L I t < ε 2 .
Thus, from Equations (7) and (24), we have:
Λ α 1 ε 2 + μ + β 1 S t d S t d t Λ μ + β 1 S t , Λ + μ + β 1 S t d L S t d t μ + β 1 L S t + β 1 Λ μ + β 2 ε 2 ,   t n T , n N , S t + = S t + γ L S t , L S t + = 1 γ L S t ,   t = n T , n N .
Then, consider the following comparison system:
y 1 t = Λ α 1 ε 2 + μ + β 1 y 1 t , y 2 t = Λ + μ + β 1 S t ,   t n T , n N , y 1 t + = S t + γ L S t , y 2 t + = 1 γ y 2 t ,   t = n T , n N .
Similar to the processing methods for Equations (4) and (5), a set of positive solutions y ˜ = y 1 ˜ , y 2 ˜ that are globally asymptotically stable for the comparison system can be obtained, and lim ε 2 0 y ˜ = S ˜ t , L S ˜ t . Through the comparison theorem of impulsive differential equations, we can obtain:
y 1 t < S t < x 1 t , y 2 t < L S t < x 2 t ,
when t , we have:
y 1 y 1 ˜ , x 1 S ˜ t , y 2 y 2 ˜ , x 2 L S ˜ t ,
Then, there is t 3 > t 2 . For ε 3 > 0 , which is small enough, we can obtain when t > t 3 :
y 1 ˜ ε 3 < S t < S ˜ t + ε 3 , y 2 ˜ ε 3 < L S t < L S ˜ t + ε 3 .
Therefore, when t , S t S ˜ t and L S t L S ˜ t . Therefore, the malware-free T-period solution of the system is globally attractive. That is, after a certain amount of time, the solution is absorbed into a bounded set through motion. □

4. Persistence of Malware Transmission

In this section, the persistence of malware transmission will be discussed. If certain conditions are met, the malware will not die out; that is, the spread of malware in WRSNs will continue, which is the persistence of malware transmission. The infected nodes (I noses) are the determinants of the persistence of malware transmission. In order to obtain this result, the following is given:
Lemma 1.
When   R 0 > 1 , there is a positive number δ to make the solution of the SIALS-P to satisfy the following inequality:
lim t s u p   I t > δ , lim t s u p   L I t > δ .
Proof of Lemma 1.
Using the proof by contradiction, if the above conclusions are not established, there is t 1 > 0 , and for any t > t 1 , we have I   t < δ . From Equations (4) and (5), we can obtain:
d S t d t Λ α 1 δ + β 1 + μ S t , d L S t d t   Λ + μ + β 1 S t + β 2 A t ,   t n T , n N , S t + = S t + γ L S t , L S t + = 1 γ L S t ,   t = n T , n N .
Consider the following comparison system:
z 1 t = Λ α 1 δ + β 1 + μ z 1 t ,   z 2 t = Λ + μ + β 1 z 1 t + β 2 A t ,   t n T , n N , z 1 t + = z 1 t + γ z 2 t , z 2 t + = 1 γ z 2 t ,   t = n T , n N .
From the comparison theorem. We can obtain:
S t z 1 t ,   L S t z 2 t .
The positive periodic solution Z ˜ = ( Z ˜ 1 , Z ˜ 2 ) of Equation (39) which is globally stable, can be obtained and l i m δ 0 Z ˜ = S ˜ , L S ˜ . Therefore, there is a positive number δ 1 and for any ε 1 > 0 and δ < δ 1 , we have Z ˜ 1 S ˜ ε 1 and z 2 * L S * ε 1 . From the comparison theorem of impulsive differential equations, we have a time variable t 2 > t 1 and a positive number ε 2 > 0 . For any time t > t 2 , the inequality system is as follows:
S t z 1 t Z ˜ 1 ε 2 S ˜ ε 1 ε 2 ,     L S t z 2 t Z ˜ 2 ε 2 L S ˜ ε 1 ε 2 .
The inequality system of Equation (41) is substituted into Equations (4) and (5). We can obtain:
    d I t d t α 2 μ a β 3 + α 1 S * ε 1 ε 2 I t , d L I t d t μ L I t + β 3 I t ,   t n T , n N , I t + = I t + γ L I t , L I t + = 1 γ L I t ,   t = n T , n N .
If ε 1 and ε 2 are small enough to approach 0, the system can be simplified as:
d I t d t α 2 μ a β 3 + α 1 S * I t , d L I t d t μ L I t + β 3 I t ,   t n T , n N , I t + = I t + γ L I t , L I t + = 1 γ L I t ,   t = n T , n N .
Through the comparison theorem, let u t = u 1 t u 2 t and construct the following system:
u t = F V u t , t n T , n N , u 1 t + = u 1 t + γ u 2 t ,         u 2 t + = 1 γ u 2 t ,           t = n T , n N .
The above system satisfies u t , n T , u n T + = ϕ F v t n T u n T + , u n + 1 T + = P 2 ϕ F v t n T u n T + . When R 0 > 1 , as t and u 1 and u 2 , we can obtain the conclusion as follows:
lim t I t = , lim t L I t = .
The above conclusion contradicts the condition I t < δ and L I t < δ which was established previously. Hence, Lemma 1 is proved. □
Through Lemma 1, we can obtain the following theorem:
Theorem 4.
When R 0 > 1 , the malware transmission is uniformly persistent, that is, there is a positive number η that makes the solution of the system satisfy the following inequality:
lim t i n f   I t > η ,   lim t i n f   L I t > η .
Proof of Theorem 4.
According to Lemma 1, there are two possible situations when the malware transmission is uniformly persistent:
(I). When the time variable T is large enough, I t > η and L I t > η ;
(II). When the time variable T is large enough, I t and L I t oscillate nearby η .
If case (I) is true, it is clear that malware transmission is uniformly persistent. Therefore, we focus on case (II). From Lemma 1, we can obtain:
lim t s u p   I t > δ , lim t s u p   L I t > δ .
Therefore, in the case of oscillation, we have:
I t 1 δ , L I t 1 δ ,   t 1 n 1 T , n + 1 T ,   I t 2 δ , L I t 2 δ ,   t 2 n 2 T , n + 1 T .
where n 2 > n 1 and when t t 1 , t 2 , it can be obtained as follows:
d L I t d t = μ L I t + β 3 I t μ L I t ,         t n T , n N , L I t + = 1 γ L I t ,               t = n T , n N .
We can obtain:
L I t L I t 1 e μ t t 1 δ e μ t t 1 δ e μ n 2 n 1 + 1 T ,
Additionally, when t = n T , we can obtain:
L I t δ 1 γ n 2 n 1 e μ n 2 n 1 + 1 T ,
Then, for I t , we have:
d I t d t = α 2 μ a β 3 + α 1 S t I t α 2 μ a β 3 I t , I t + = I t + γ L I t .
By applying the solution method similar to Equation (52), we have:
I t δ e α 2 μ a β 3 n 2 n 1 + 1 T + γ n 2 n 1 δ 1 γ n 2 n 1 e μ n 2 n 1 + 1 T ,
Let η 1 = m i n δ e α 2 μ a β 3 n 2 n 1 + 1 T + γ n 2 n 1 δ 1 γ n 2 n 1 e μ n 2 n 1 + 1 T , δ 1 γ n 2 n 1 e μ n 2 n 1 + 1 T .
Due to n 2 n 1 0 and the fact that it is bounded, η 1 cannot be infinitesimal. Hence, we can obtain I t η 1 and L I t η 1 .
For t > t 2 , there is a positive number η 2 . Therefore, we can obtain the sequence η j ,   j = 1 , 2 , k , where
η 1 = m i n { δ e α 2 μ a β 3 n 2 n 1 + 1 T + γ n 2 n 1 δ 1 γ n 2 n 1 e μ n 2 n 1 + 1 T , 1 γ n 2 n 1 e μ n 2 n 1 + 1 T } ,
When t t k , t k + 1 , the inequality can be derived as follows where t k n k T , n k + 1 T and t k + 1 n k + 1 T , n k + 1 + 1 T :
I t η k > 0 , L I t η k > 0 .
Let η * = min   η j . For any t > t 1 , there is I t η * > 0 and L I t η * > 0 . Therefore, Theorem 4 is proven. □

5. Optimal Control

In the optimal control theory of epidemic dynamics, the primary goal is to minimize the number of infections while minimizing the cost of vaccination [41].
The probability that the infected node becomes the anti-malware node after receiving information from the anti-malware node is α 2 . In the process of constructing the minimum objective function, α 2 is selected as the control variable that changes over time between the pulse points and is represented by α 2 t , and 0 α 2 t 1 . Control variable α 2 t is constantly changing over time. Unlike α 2 t , v n T is the control variable of the pulse point and a targeted therapy strategy to reduce infected nodes, and 0 v n T 1 .
In this section, the ultimate goal of optimal control is to minimize the number of infected nodes and minimize the cost of activating anti-malware and detecting and killing malware. Thus, in the SIALS-P model, we can construct the minimized objective function as:
J g i t , v i n T = 0 δ T ( A 1 I t + A 2 L I t + A 3 2 α 2 2 t ) d t + i = 1 η B 2 v 2 n T ,
where δ T represents the duration of optimal control and δ N . A 1 and A 2 are the monitoring costs of I nodes and L I nodes, respectively. A 3 and B are the costs of implementing control strategies.
Introduce control variables α 2 and v n T into Equations (4) and (5). The objective function subject is:
d S t d t = Λ α 1 I t + β 1 + μ S t , d I t d t = α 1 S t I t α 2 t + β 3 + μ + α I t d A t d t = β 2 + μ A t + α 2 t I t , d L I t d t = μ L I t + β 3 I t , d L S t d t = μ L S t + β 1 S t + β 2 A t ,     t n T ,   n N S t + = S t + γ L S t + v n T I t , I t + = I t + γ L I t v n T I t , A t + = A t , L I t + = 1 γ L I t , L S t + = 1 γ L S t , t = n T ,   n N
In order to achieve the optimal control objective, the Hamiltonian H without control as the function is constructed as:
H = A 1 I t + A 2 L I t + A 3 2 α 2 2 t + λ 1 t S i t ˙ + λ 2 t I i   t ˙ + λ 3 t A   t + ˙ λ 4 t L I   t + ˙ λ 5 t L S   t ˙
We construct the impulse Hamiltonian function H P defined as:
H P = B 2 v 2 n T + γ λ 1 n T + L S t + v λ 1 n T + I t + γ λ 2 n T + L I t v λ 2 n T + I t γ λ 4 n T + L I t γ λ 5 n T + L S t
We use the Pontryagin maximum principle to obtain the necessary conditions for optimal control.
Theorem 5.
Introduce optimal controls α 2 * t and v * n T , and solutions S * t , I * t , A * t , L I * t and L S * t into Equation (57). There exist adjoint variables λ k t , k = 1 ,   2 ,   3 ,   4 . t n T provides an optimal control α 2 * t . The adjoint variables λ k t satisfy the following adjoint differential system.
d λ 1 t d t = H S = λ 1 t α 1 I t + β 1 + μ + α 1 λ 2 t I t + β 1 λ 5 t , d λ 2 t d t = H I = A 1 + α 1 S t ( α 2 t + β 3 + μ + α λ 2 t + α 2 t λ 3 + β 3 λ 4 ) , d λ 3 t d t = H A = ( β 2 + μ   λ 3 + β 2 λ 5 ) , d λ 4 t d t = H L I = A 2 μ λ 4 , d λ 5 t d t = H L S = μ λ 5 ,
Transversality conditions are λ k δ T = 0 , and the optimal control α 2 * t can be solved as H α 2 t = 0 . Thus, we have the optimal control of the continuous part as follows:
α 2 * t = λ 2 t λ 3 t I * t A 3 ,
t = n T provides the impulse optimal control v * n T . There exist adjoint variables λ k n T , k = 1 ,   2 ,   3 ,   4 and we have:
λ 1 n T = λ 1 n T + , λ 2 n T = λ 2 n T + v λ 2 n T + + v λ 1 n T + , λ 3 n T = λ 3 n T + , λ 4 n T = λ 4 n T + γ λ 4 n T + + γ λ 2 n T + , λ 5 n T = λ 5 n T + γ λ 5 n T + + γ λ 1 n T + ,
The optimality condition at v n T = v * n T implies that H P v n T = 0 . Therefore, the optimal control in any impulse point is obtained.
v * n T = λ 2 n T + λ 1 n T + I * t B ,
S * t , I * t , A * t , L I * t and L S * t are the solutions for Equation (57) to perform optimal control. Let x t = S t , I   t , A   t , L I t , L S t , which is left-continuous on 0 , T and x i n T = x i n T . We can solve the optimal level the pulse intensity v when the sequences of impulse point n T are fixed. Let x t = x * t , the optimal controls are as follows:
α 2 * t = 1 , λ 2 t λ 3 t I * t A 3   1 λ 2 t λ 3 t I * t A 3 , 0 < λ 2 t λ 3 t I * t A 3 < 1 0 , λ 2 t λ 3 t I * t A 3   0
and
v * n T = 1 , λ 2 n T + λ 1 n T + I * t B 1 λ 2 n T + λ 1 n T + I * t B , 0 < λ 2 n T + λ 1 n T + I * t B < 1 0 , λ 2 n T + λ 1 n T + I * t B 0 .
The optimal control functions can also be simplified as:
α 2 * t = m i n m a x 0 , λ 2 t λ 3 t I * t A 3 , 1 ,
and
v * n T = m i n m a x 0 , λ 2 n T + λ 1 n T + I * t B , 1 .

6. Simulation

The purpose of this section is to further verify the correctness and practicability of our theory by numerical simulation. We compared the relationship between the pulse charging model, the continuous charging model and the non-charging model. Thus, the advantage of pulse charging over the other two models is received. In Section 6.1, we use the Runge–Kutta [42] method to analyze the stability of pulse charging in MATLAB and compare it with the other two models. The effects of various control parameters on the basic reproduction number of three charging models are analyzed in Section 6.1.

6.1. Stable Analysis When R 0 < 1

This subsection verifies the stability of the basic reproduction number of the three charging models R i < 1   ( i   =   0 , 1 , 2 ) , where, R 0 is the basic reproduction number of the pulse charging model, R 1 is the basic reproduction number of the continuous charging model and R 2 is the basic reproduction number of the non-charging model. Parameters are set as Λ = 0.2 , μ = 0.004 , β 1 = 0.005 , β 2 = 0.005 , β 3 = 0.008 , α 1 = 0.0001 , α 2 = 0.001 , γ = 0.05 , a = 0.005 , T = 10 . It is assumed that N t = S t + I t + A t + L S t + L I t 50 , S 0 = 48 ,   I 0 = 2 ,   A 0 = 0 ,   L S 0 = 0 and L I 0 = 0 .
Because R 0 r ( P 2 Φ F V t ) , we can obtain R0 = 0.4828 < 1. Therefore, there will be a malware-free T-period solution ( S ˜ ,0,0,0, L S ˜ ). In Figure 1, all nodes will approach stability. When T is approaching infinity, the I and LI nodes are almost zero, while the S and LS nodes will be stable at non-zero values. The basic reproduction number of the other two models are calculated by:
R 1 = α 1 Λ γ + μ 2 β 1 + μ γ + μ γ β 1 α 2 + β 3 + μ + a γ + μ γ β 3 , R 2 = α 1 Λ α 2 + β 3 + μ + a β 1 + μ .
It is easily obtained that R 1 = 0.4320 < 1 , R 2 = 0.1481 < 1 . Thus, the two models both have a global stable malware-free equilibrium point S t , 0 , 0 , 0 , L S t . As can be seen in Figure 2 and Figure 3, for the continuous charging model and the non-charging model, when t = 1200 , the number of S are 45.72 and 22.22, respectively. Compared with the pulse charging model in Figure 1, S = 31.84 when t = 1200. It can clearly be seen that the number of S under the pulse charging model is lower than that under the continuous charging model but is higher than that of the non-charged model. However, the relationship among the number of L S is opposite to that among the number of S . Therefore, the pulse charge can better improve the utilization rate of energy and the work efficiency of WRSNs.

6.2. Influence of Parameters on the Basic Reproduction Number

Parameters are set as μ = 0.004 , β 1 = 0.005 , β 3 = 0.008 , α 1 = 0.0001 , α 2 = 0.001 , γ = 0.05 , a = 0.005 , T = 10 , Λ   0 ,   0.4 , β 2 0 ,   0.05 .
As shown in Figure 4, the basic reproduction number will increase with the increase in Λ . It is obvious that β2 under the pulse charging model has greater influence than that under the other two models on the basic reproduction number. It can be seen that some values of the basic reproduction number under the pulse charging model are located between those under the other two models.
A set of parameters is set as Λ = 0.2 , μ = 0.004 , β 1 = 0.005 , β 3 = 0.008 , α 2 = 0.001 , γ = 0.05 , a = 0.005 , T = 10 , β 2 0 ,   0.05 , α 1   0 ,   1 . As shown in Figure 5, it is obvious that the increase in α 1 increases the basic reproduction number more significantly than that of Λ , and β 2 the influence on the basic reproduction number is almost the same as the change in Figure 4. Thereby determining that β 2 only has a significant impact on the pulsed charging model.
A set of parameters is set as Λ = 0.2 , μ = 0.004 , β 1 = 0.005 , β 2 = 0.005 , β 3 = 0.008 , α 1 = 0.0001 , α 2 = 0.001 , T = 10 , γ 0 ,   0.05 , a   0 ,   0.1 . As shown in Figure 6, the basic reproduction number will decrease with the increase in a , and the basic reproduction number will increase with the increase in γ . It is obvious that a has greater influence than γ on the basic reproduction number.

6.3. Sensitivity Analysis

In this section, we carefully study the sensitivity of the SIALILS model threshold by evaluating PRCC (partial correlation coefficient). Evenly distributed sampling is carried out for each input parameter of the model, where the maximum value of each parameter is 120% of the sampling baseline value, and the minimum value is 80% of the baseline value. As we know, when the absolute value of PRCC is less than 0.2, the correlation between input parameters and output variables is not significant [43], the absolute value is moderately correlated between 0.2 and 0.4 and highly correlated when the absolute value is greater than 0.4. The distribution interval of each parameter and its corresponding PRCC are shown in Table 3.
From Figure 7, it is obvious that the birth rate λ and metastasis rate of α 1 are related to the threshold R 0 . However, death rate μ , metastasis rate β 1 , β 2 and γ are correlated with threshold R 0 is significantly negatively correlated, and the remaining parameters are not correlated. This means that if we want to lower the threshold R 0 , we can lower the birth rate λ and metastasis rate α 1 , or increase the death rate μ, transfer rate β 1 , β 2 and γ . Conversely, we can increase the threshold R 0 by increasing the birth rate λ and metastasis rate α 1 , or decreasing mortality rate μ , metastasis rate β 1 , β 2 and γ . From Figure 8, it can be easily learned that within the range of parameters specified by us, the threshold R 0 is only between 0.1 and 0.35, and most of them are between 0.15 and 0.25. It can be seen that within this range, the threshold R 0 have limited changes.

6.4. Optimal Control Strategy

In this section, considering the treatment cost of infected nodes, control factors are designed. Four control strategies (MAX control, MIN control, average control, optimal control) are applied to the pulse charging model, and the optimal control problem is numerically simulated. The superiority and effectiveness of the optimal control strategy are verified by comparing the number of nodes in each state and the control cost. Parameters of the four control policies are set as shown in Table 4. The parameters and weight parameters settings of the proposed model are shown in Table 5, where A 1 ,   A 2 ,   A 3   and   B are the weight parameters.
We set the initial node number as S 0 = 40 ,   I 0 = 10 ,   A 0 = 0 ,   L S 0 = 0 and L I 0 = 0 . The control time is set as 2 0 days. In Figure 9, the change of the number of nodes of each control strategy over time is shown. Under the MAX control, v n T = 1 , the number of I nodes will change greatly at the pulse time to reduce the number of I nodes and increase the number of S nodes so that the model can operate efficiently. In MIN control,   v n T = 0 , the number of I nodes will greatly increase at the pulse time, and the number of L I nodes will also increase accordingly. Under this control, the number of A nodes is always 0, resulting in the failure of anti-malware A to run normally; the number of S and L S nodes will decrease rapidly. Obviously, MIN control strategy finds it difficult to suppress the spread of malware, leading to the normal operation of anti-malware A , and the number of S and L S nodes will decrease rapidly. Obviously, the MIN control strategy finds it difficult to suppress the spread of malware. On the whole, the number of the S node decreases most obviously under the minimum control strategy, while the number of the I node is completely opposite. The rising rate of the number of the I node under the MIN control strategy is far higher than that of the other three control strategies. It can determine that the MIN control strategy control effect is poorer and the spread of the virus is difficult to control. In the case of the four control strategies, regardless of cost, the Max control strategy effect is the best because it can maintain the high-energy operation of the S nodes and rapidly reduce the number of I nodes to make the system run efficiently. The control effect of the optimal control strategy follows closely.
Then, the number of nodes in the model under the four control strategies is further analyzed. According to Figure 10, it can be seen that the number of I nodes rapidly decreases to 0 in optimal control, MAX control and average control, and the number of L I nodes hardly changes. However, under MIN control, the number of I nodes occupy the majority, and the number of L I nodes and increases accordingly. It is surprising that the number of nodes under optimal control is almost the same as that under MAX control, which further verifies the superiority of the optimal control strategy.
Finally, the cost of the four control strategies is numerically simulated. It is obvious from Figure 11 that MIN control has the highest cost, while the optimal control has the lowest cost. The cost of the four control strategies is compared as follows:   Cos t M I N >   Cos t M A X >   Cos t A V E R A G E >   Cos t O P T I M A L . The effectiveness of the optimal control is verified.

7. Conclusions

In this paper, a novel model of the epidemic based on pulse charging (SIALS-P) for WRSNs is proposed. In each periodic pulse point, the low energy states ( L S nodes, L I nodes) are converted into the normal energy states ( S nodes, I nodes). The stability of the model is analyzed, and the local and global stability of the malware-free T-period solution is also proven. Additionally, the comparison theorem is used to prove the persistence of malware transmission. In order to reduce the model control cost, we propose an optimal control strategy for the proposed model based on the Pontryagin maximum principle. Finally, in the numerical simulation part, we use the Runge–Kutta method to further verify the correctness of the theory and compare the model with the non-charging and continuous charging models. The simulation results show that the number of nodes in pulse charging mode is between those in the other two modes. This suggests that the pulse charging model is more energy-saving when compared with the continuous charging model and has higher working efficiency compared with the non-charging model. The influence of each parameter on the basic reproduction number is given by simulation. PRCC is used to analyze the sensitivity of threshold parameter R 0 and the feasibility and superiority of optimal control are further verified.
Of course, the study in this paper also has limitations. For example, the simulation results of its periodic or chaotic solutions are unknown. In addition, if a node has an incubation period after infection, it can lead to more complex system behavior (for example, repeated outbreaks, etc.).

Author Contributions

Conceptualization, G.L., X.Z. and Z.L.; methodology, X.S., F.H. and X.W.; software, X.S. and Z.H.; validation, X.S. and F.H.; formal analysis, X.S. and F.H.; investigation, G.L., X.S., F.H., Z.L., X.Z., X.W. and Z.H.; resources, G.L. and X.S.; data curation, X.S. and F.H.; writing—original draft preparation, X.S. and F.H.; writing—review and editing, X.S. and F.H.; visualization, X.S.; supervision, G.L.; funding acquisition, G.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by National Natural Science Foundation of China (51975136, 61403089), Guangzhou University Research Project (YJ2021002); the 2020 Department of Education of Guangdong Province Innovative and Strong School Project (Natural Sciences)—Young Innovators Project (Natural Sciences) under Grant 2020KQNCX054; the National Key Research and Development Program of China (2018YFB2000501); the Science and Technology Innovative Research Team Program in Higher Educational Universities of Guangdong Province (2017KCXTD025); the Innovative Academic Team Project of Guangzhou Education System (1201610013); the Special Research Projects in the Key Fields of Guangdong Higher Educational Universities (2019KZDZX1009); the Science and Technology Research Project of Guangdong Province (2017A010102014, 2016A010102022); the Guangzhou University Research Project (YJ2021002); and the Science and Technology Research Project of Guangzhou (201707010293).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors acknowledge funding received from the science foundations. They are appreciated for supporting this work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Xie, H.; Yan, Z.; Yao, Z.; Atiquzzaman, M. Data collection for security measurement in wireless sensor networks: A survey. IEEE Internet Things J. 2019, 6, 2205–2224. [Google Scholar] [CrossRef] [Green Version]
  2. Han, G.; Jiang, J.; Zhang, C.; Duong, T.Q.; Guizani, M.; Karagiannidis, G.K. A survey on mobile anchor node assisted localization in wireless sensor networks. IEEE Commun. Surv. Tutor. 2016, 18, 2220–2243. [Google Scholar] [CrossRef]
  3. Butun, I.; Osterberg, P.; Song, H. Security of the internet of things: Vulnerabilities, attacks, and countermeasures. IEEE Commun. Surv. Tutor. 2020, 22, 616–644. [Google Scholar] [CrossRef] [Green Version]
  4. Sajan, R.I.; Jasper, J. A secure routing scheme to mitigate attack in wireless adhoc sensor network. Comput. Secur. 2021, 103, 102197. [Google Scholar]
  5. Ge, C.; Yin, C.; Liu, Z.; Fang, L.; Zhu, J.; Ling, H. A privacy preserve big data analysis system for wearable wireless sensor network. Comput. Secur. 2020, 96, 101887. [Google Scholar] [CrossRef]
  6. Rashid, B.; Rehmani, M.H. Applications of wireless sensor networks for urban areas: A survey. J. Netw. Comput. Appl. 2016, 60, 192–219. [Google Scholar] [CrossRef]
  7. Yetgin, H.; Cheung, K.T.K.; El-Hajjar, M.; Hanzo, L.H. A Survey of network lifetime maximization techniques in wireless sensor networks. IEEE Commun. Surv. Tutor. 2017, 19, 828–854. [Google Scholar] [CrossRef] [Green Version]
  8. Panatik, K.Z.; Kamardin, K.; Shariff, S.A.; Yuhaniz, S.S.; Ahmad, N.A.; Yusop, O.M.; Ismail, S. Energy harvesting in wireless sensor networks: A survey. In Proceedings of the 2016 IEEE 3rd International Symposium on Telecommunication Technologies, Kuala Lumpur, Malaysia, 28–30 November 2016; pp. 53–58. [Google Scholar]
  9. Shu, Y.; Yousefi, H.; Cheng, P.; Chen, J.; Gu, Y.J.; He, T.; Shin, K.G. Near-optimal velocity control for mobile charging in wireless rechargeable sensor networks. IEEE Trans. Mob. Comput. 2016, 15, 1699–1713. [Google Scholar] [CrossRef] [Green Version]
  10. Wu, P.; Xiao, F.; Sha, C.; Huang, H.; Sun, L. Trajectory optimization for UAVs’ efficient charging in wireless rechargeable sensor networks. IEEE Trans. Veh. Technol. 2020, 69, 4207–4220. [Google Scholar] [CrossRef]
  11. Mo, L.; Kritikakou, A.; He, S. Energy-aware multiple mobile chargers coordination for wireless rechargeable sensor networks. IEEE Internet Things J. 2019, 6, 8202–8214. [Google Scholar] [CrossRef] [Green Version]
  12. Piqueira, J.R.C.; Cabrera, M.A.M.; Batistela, C.M. Malware propagation in clustered computer networks. Phys. A Stat. Mech. Its Appl. 2021, 573, 125958. [Google Scholar] [CrossRef]
  13. Guillén, J.H.; del Rey, A.M. A mathematical model for malware spread on WSNs with population dynamics. Phys. A Stat. Mech. Its Appl. 2020, 545, 123609. [Google Scholar] [CrossRef]
  14. Huang, D.-W.; Yang, L.-X.; Yang, X.; Wu, Y.; Tang, Y.Y. Towards understanding the effectiveness of patch injection. Phys. A Stat. Mech. Its Appl. 2019, 526, 120956. [Google Scholar] [CrossRef]
  15. Liu, G.; Peng, B.; Zhong, X. A novel epidemic model for wireless rechargeable sensor network security. Sensors 2021, 21, 123. [Google Scholar] [CrossRef]
  16. Liu, G.; Huang, Z.; Wu, X.; Liang, Z.; Hong, F.; Su, X. Modelling and analysis of the epidemic model under pulse charging in wireless rechargeable sensor networks. Entropy 2021, 23, 927. [Google Scholar] [CrossRef]
  17. Liu, G.; Li, J.; Liang, Z.; Peng, Z. Analysis of time-delay epidemic model in rechargeable wireless sensor networks. Mathematics 2021, 9, 978. [Google Scholar] [CrossRef]
  18. Liu, G.; Li, J.; Liang, Z.; Peng, Z. Dynamical behavior analysis of a time-delay SIRS-L model in rechargeable wireless sensor networks. Mathematics 2021, 9, 2007. [Google Scholar] [CrossRef]
  19. Liu, G.; Peng, B.; Zhong, X. Epidemic analysis of wireless rechargeable sensor networks based on an attack–defense game model. Sensors 2021, 21, 594. [Google Scholar] [CrossRef]
  20. Liu, G.; Peng, B.; Zhong, X.; Cheng, L.; Li, Z. Attack-defense game between malicious programs and energy-harvesting wireless sensor networks based on epidemic modeling. Complexity 2020, 2020, 3680518. [Google Scholar] [CrossRef]
  21. Liu, G.; Peng, B.; Zhong, X.; Lan, X. Differential games of rechargeable wireless sensor networks against malicious programs based on SILRD propagation model. Complexity 2020, 2020, 5686413. [Google Scholar] [CrossRef]
  22. Liu, G.; Peng, Z.; Liang, Z.; Li, J.; Cheng, L. Dynamics analysis of a wireless rechargeable sensor network for virus mutation spreading. Entropy 2021, 23, 572. [Google Scholar] [CrossRef] [PubMed]
  23. Shen, S.; Zhou, H.; Feng, S.; Liu, J.; Zhang, H.; Cao, Q. An epidemiology-based model for disclosing dynamics of malware propagation in heterogeneous and mobile WSNs. IEEE Access 2020, 8, 43876–43887. [Google Scholar] [CrossRef]
  24. Ojha, R.P.; Srivastava, P.K.; Sanyal, G.; Gupta, N. Improved model for the stability analysis of wireless sensor network against malware attacks. Wirel. Pers. Commun. 2021, 116, 2525–2548. [Google Scholar] [CrossRef]
  25. Hosseini, S.; Azgomi, M.A. The dynamics of an SEIRS-QV malware propagation model in heterogeneous networks. Phys. A Stat. Mech. Its Appl. 2018, 512, 803–817. [Google Scholar] [CrossRef]
  26. D’Onofrio, A. Stability properties of pulse vaccination strategy in SEIR epidemic model. Math. Biosci. 2002, 179, 57–72. [Google Scholar] [CrossRef]
  27. Zhang, D.; Zhang, Y.; Xu, B.; Yang, Z. Pulse vaccination control of an SIR epidemic model with distributed delays. Adv. Appl. Math. 2020, 9, 359–365. [Google Scholar] [CrossRef]
  28. Zhou, A.; Sattayatham, P.; Jiao, J. Dynamics of an SIR epidemic model with stage structure and pulse vaccination. Adv. Differ. Equ. 2016, 2016, 700. [Google Scholar] [CrossRef] [Green Version]
  29. Yu, D.; Gao, S.; Luo, Y.; Xie, F. Pulse vaccination strategy in an SIVS epidemic model with general nonlinear incidence rate. Adv. Anal. 2016, 1, 80–88. [Google Scholar] [CrossRef]
  30. Wang, S.; Li, D.; Wu, Y. Stability analysis of a SEIQR epidemic model with pulse vaccination. J. Harbin Univ. Sci. Technol. 2017, 22, 72–77. [Google Scholar]
  31. Zhao, Z.; Pang, L.; Chen, Y. Nonsynchronous bifurcation of SIRS epidemic model with birth pulse and pulse vaccination. Nonlinear Dyn. 2015, 79, 2371–2383. [Google Scholar] [CrossRef]
  32. Wang, X.; He, Z.; Zhang, L. A pulse immunization model for inhibiting malware propagation in mobile wireless sensor networks. Chin. J. Electron. 2014, 23, 810–815. [Google Scholar]
  33. Al Kindi, A.; Al Abri, D.; Al Maashri, A.; Bait-Shiginah, F. Analysis of malware propagation behavior in Social Internet of Things. Int. J. Commun. Syst. 2019, 32, e4102. [Google Scholar] [CrossRef]
  34. Gao, S.J.; Zhong, D.M.; Zhang, Y. Analysis of novel stochastic switched SILI epidemic models with continuous and impulsive control. Phys. A Stat. Mech. Its Appl. 2018, 495, 162–171. [Google Scholar] [CrossRef]
  35. Srivastava, P.K.; Pandey, S.P.; Gupta, N.; Singh, S.P.; Ojha, R.P. Modeling and analysis of antimalware effect on wireless sensor network. In Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, Singapore, 23–25 February 2019; pp. 639–643. [Google Scholar] [CrossRef]
  36. Ma, Z.; Zhou, Y.; Wu, J. Modeling and Dynamics of Infectious Diseases; World Scientific Publishing Company: Singapore, 2009. [Google Scholar] [CrossRef]
  37. Gao, J.-Z.; Zhang, T.-L. An SIRS epidemic model with pulse vaccination, birth pulse and logistic death rate. Commun. Math. Res. 2019, 35, 247–263. [Google Scholar]
  38. Verhulst, F. Nonlinear Differential Equations and Dynamical Systems; Springer: Berlin/Heidelberg, Germany, 1990. [Google Scholar]
  39. Kulev, G.; Bainov, D. Application of lyapunov’s direct method to the investigation of the global stability of the solutions of systems with impulse effect. Appl. Anal. 1988, 26, 255–270. [Google Scholar] [CrossRef]
  40. Yin, Y.; Cao, Y.; Yao, L.-Q. A new meshless method based on 2D-EFG for the analysis of piezoelectric laminated Timoshenko beam. In Proceedings of the Symposium on Piezoelectricity, Acoustic Waves and Device Applications (SPAWDA), Shenzhen, China, 9–11 December 2011. [Google Scholar] [CrossRef]
  41. Abouelkheir, I.; El Kihal, F.; Rachik, M.; Elmouki, I. Optimal impulse vaccination approach for an SIR control model with short-term immunity. Mathematics 2019, 7, 420. [Google Scholar] [CrossRef] [Green Version]
  42. Zhang, G.; Song, M. Asymptotical stability of Runge–Kutta methods for advanced linear impulsive differential equations with piecewise constant arguments. Appl. Math. Comput. 2015, 259, 831–837. [Google Scholar] [CrossRef]
  43. Zhang, Y.H.; Xiao, Y.N. Modeling and analyzing the effects of fixed-time intervention on transmission dynamics of echinococcosis in Qinghai province. Math. Methods Appl. Sci. 2021, 44, 4276–4296. [Google Scholar] [CrossRef]
Figure 1. The nodes’ numbers under the pulse charging model with R 0 < 1 .
Figure 1. The nodes’ numbers under the pulse charging model with R 0 < 1 .
Entropy 24 00302 g001
Figure 2. The nodes’ numbers under the continuous charging model with R 1 < 1 .
Figure 2. The nodes’ numbers under the continuous charging model with R 1 < 1 .
Entropy 24 00302 g002
Figure 3. The nodes’ numbers under the non-charging model with R 2 < 1 .
Figure 3. The nodes’ numbers under the non-charging model with R 2 < 1 .
Entropy 24 00302 g003
Figure 4. Λ and β 2 relationships with the basic reproduction number.
Figure 4. Λ and β 2 relationships with the basic reproduction number.
Entropy 24 00302 g004
Figure 5. α 1 and β 2 relationships with the basic reproduction number.
Figure 5. α 1 and β 2 relationships with the basic reproduction number.
Entropy 24 00302 g005
Figure 6. a and γ relationships with the basic reproduction number.
Figure 6. a and γ relationships with the basic reproduction number.
Entropy 24 00302 g006
Figure 7. PRCCs of R 0 .
Figure 7. PRCCs of R 0 .
Entropy 24 00302 g007
Figure 8. The distribution of the values of R 0 .
Figure 8. The distribution of the values of R 0 .
Entropy 24 00302 g008
Figure 9. The number of nodes changes with time under the four control strategies.
Figure 9. The number of nodes changes with time under the four control strategies.
Entropy 24 00302 g009
Figure 10. The number of nodes of the four control strategies.
Figure 10. The number of nodes of the four control strategies.
Entropy 24 00302 g010
Figure 11. Cost comparison of the four control strategies.
Figure 11. Cost comparison of the four control strategies.
Entropy 24 00302 g011
Table 1. Recent related studies on stability analysis of epidemic models in wireless sensor networks (WSNs).
Table 1. Recent related studies on stability analysis of epidemic models in wireless sensor networks (WSNs).
AuthorsModelGoal
J.D. Hernández Guillén et al. [13]Susceptible–Carrier–Infectious–Recovered–Susceptible (SCIRS)Exploring local and global stability of malware-free and epidemic points by analyzing carrier state.
D.W. Huang et al. [14]Susceptible–Infected–Patched–Susceptible (SIPS)Through the mechanism of patch injection, analyze local and global stability of epidemic point.
G.Y. Liu et al. [15,16,17,18,19,20,21,22]Low–Energy–Node (SILS, SILS-P, SISL, SIRS-L, SIALS, ΛSILRD, SILRD, SI1I2L) modelsThrough the introduction of low-energy nodes, analyze local and global stability of malware-free and epidemic points
S.G. Shen et al. [23]Vulnerable–Compromised–Quarantined–Patched–Scrapped (VCQPS)By analyzing the heterogeneity and mobility of sensor nodes in the model, the local and global stability of malware-free points is explored.
R.P. Ojha et al. [24]Susceptible–Exposed–Infectious–
Quarantine–Recovered–Vaccinated
(SEIQRV)
By introducing analytical quarantine and inoculation technology, analyze local and global stability of worm-free points.
S. Hosseini et al. [25]Susceptible–Exposed–Infected–Recovered–Susceptible with Quarantine and Vaccination (SEIRS-QV)Through the diversification of nodes configuration, analyze local and global stability of malware-free points.
Table 2. Research on application of pulse effect in epidemic models.
Table 2. Research on application of pulse effect in epidemic models.
AuthorsModelApplication AreaGoal
A. d’Onofrio et al. [26]Susceptible–Exposed–Infected–Recovered (SEIR)Anthroponosis Pulse inoculation and pulse birth were introduced to analyze the malware-free periodic solution and stability of the malware-free periodic solution. Finally, to prove that PVS (pulse vaccination strategy) is more effective than other vaccination strategies.
D. Zhang et al. [27]Susceptible–Infected–Removed (SIR)AnthroponosisThrough the impulsive comparison theorem and analysis technique, prove the existence and stability of the malware-free periodic solution.
Airen Zhou et al. [28]Susceptible–Infected–Removed (SIR)AnthroponosisAccording to impulsive vaccination occurring at different moments, prove the existence and stability of malware-free periodic solution by using a stroboscopic map.
D. Yu et al. [29]Susceptible–Infected–Vaccinated–Susceptible (SIVS)AnthroponosisUsing the impulsive comparison theorem and stroboscopic map, prove the existence and stability of malware-free periodic solution and permanence of the disease.
S.Z. Wang et al. [30]Susceptible–Infected––Quarantined–Removed–Susceptible (SIQRS)AnthroponosisConsidering the periodic inoculation of the susceptible population, the stability of the malware-free periodic solution and the persistence of the disease were analyzed using the impulsive comparison theorem.
Z. Zhong et al. [31]Susceptible–Infected–Removed–Susceptible (SIRS)ZoonosisAccording to birth pulse and impulsive vaccination occurring at different moments, prove the existence and stability of malware-free periodic solution by using the Poincaré map. Through means of the bifurcation theory, discuss the existence of nontrivial periodic solution bifurcated.
X.M. Wang et al. [32]Susceptible–Infected–Removed (SIR)Mobile wireless sensor networks (MWSNs)Based on the pulse differential equation, immune operation is achieved on the susceptible nodes in pulse mode. Additionally, prove the existence and stability of malware-free periodic solutions and obtain the maximum immunization period of time.
Table 3. PRCCs values.
Table 3. PRCCs values.
ParametersRangePRCC
λ U   0.32 ,   0.48 0.9515
μ U   0.24 ,   0.36 0.9583
β 1 U   0.032 ,   0.048 0.5192
β 2 U   0.032 ,   0.048 0.5406
β 3 U   0.0004 ,   0.0005 0.0136
α 1 U   0.0032 ,   0.0048 0.9524
α 2 U   0.008 ,   0.012 0.1737
γ U   0.12 ,   0.18 0.5593
a U   0.004 ,   0.006 0.0263
Table 4. Parameters setting of four control strategies.
Table 4. Parameters setting of four control strategies.
CaseControl Strategy α 2 vJ
1Optimal control α 2 * t v * n T 0 δ T ( A 1 I t + A 2 L I t + A 3 2 α 2 2 t ) d t + i = 1 η B 2 V 2 n T
2MIN control 0 0
3MAX control 1 1
4AVERAGE = control α 2 * t = 0 T α 2 * t T = 0.5720 v * n T = 1 δ v * n T δ = 0.0587
Table 5. Parameters setting.
Table 5. Parameters setting.
NotationValueNotationValue
λ 0.4 a 0.005
μ 0.04 T 4
β 1 0.05 A 1 0.6
β 2 0.05 A 2 0.01
β 3 0.005 A 3 0.05
α 1 0.03 B 0.05
γ 0.2
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Liu, G.; Su, X.; Hong, F.; Zhong, X.; Liang, Z.; Wu, X.; Huang, Z. A Novel Epidemic Model Base on Pulse Charging in Wireless Rechargeable Sensor Networks. Entropy 2022, 24, 302. https://doi.org/10.3390/e24020302

AMA Style

Liu G, Su X, Hong F, Zhong X, Liang Z, Wu X, Huang Z. A Novel Epidemic Model Base on Pulse Charging in Wireless Rechargeable Sensor Networks. Entropy. 2022; 24(2):302. https://doi.org/10.3390/e24020302

Chicago/Turabian Style

Liu, Guiyun, Xiaokai Su, Fenghuo Hong, Xiaojing Zhong, Zhongwei Liang, Xilai Wu, and Ziyi Huang. 2022. "A Novel Epidemic Model Base on Pulse Charging in Wireless Rechargeable Sensor Networks" Entropy 24, no. 2: 302. https://doi.org/10.3390/e24020302

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop