Research Article

Attack-Defense Game between Malicious Programs and Energy-Harvesting Wireless Sensor Networks Based on Epidemic Modeling

Figure 4

Evolution of sensor nodes under 3 charging strategies. (a) Susceptible state; (b) infected state; (c) low-energy state; (d) recovered state; (e) dead state.
(a)
(b)
(c)
(d)
(e)