Research Article
Attack-Defense Game between Malicious Programs and Energy-Harvesting Wireless Sensor Networks Based on Epidemic Modeling
Figure 8
Evolution of sensor nodes with Logistic Growth in susceptible sensor nodes. (a) The quantity of susceptible sensor nodes with controllable input; (b) the quantity of infected sensor nodes with controllable input; (c) the quantity of low-energy sensor nodes with controllable input; (d) the quantity of recovered sensor nodes with controllable input; (e) the quantity of dead sensor nodes with controllable input; (f) the quantity of susceptible sensor nodes with uncontrollable input; (g) the quantity of infected sensor nodes with uncontrollable input; (h) the quantity of low-energy sensor nodes with uncontrollable input; (i) the quantity of recovered sensor nodes with uncontrollable input; (j) the quantity of dead sensor nodes with uncontrollable input.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |