Mixed and Continuous Strategy Monitor-Forward Game Based Selective Forwarding Solution in WSN

Wireless sensor networks are often deployed in unattended and hostile environments. Due to the resource limitations and multihop communication in WSN, selective forwarding attacks launched by compromised insider nodes are a serious threat. A trust-based scheme for identifying and isolating malicious nodes is proposed and a mixed strategy and a continuous strategy Monitor-Forward game between the sender node and its one-hop neighboring node is constructed to mitigate the selective dropping attacks in WSN. The continuous game will mitigate false positives on packet dropping detection on unreliable wireless communication channel. Simulation results demonstrate that continuous Monitor-Forward game based selective forwarding solution is an efficient approach to identifying the selective forwarding attacks in WSN.


Introduction
Wireless sensor networks have been used in a wide range of applications such as military provision, environment monitoring, and man-unreachable circumstances [1][2][3]. Due to their shared medium, multihop relay, and lack of physical protection, nodes are vulnerable to various routing attacks, such as selective forwarding, black hole, wormhole, and sinkhole attacks. In these attacks, selective forwarding of packets [4] becomes an increasingly important concern as it is difficult to do with many current techniques in WSNs. As continuously misbehaving nodes in WSN will be distrusted and excluded from the network soon, a rational potential attacker will act normally most of the times, occasionally dropping packets. A number of literatures [5][6][7][8][9] are proposed to overcome this problem. However, this literalness focuses on cooperation among nodes in a WSN. In these researches, selfish nodes drop packets only to conserve their resources but not to damage the whole networks. References [10][11][12][13][14][15][16][17][18][19][20][21] proposed multipath schemes to eliminate the selective forwarding attack and enable energy to be balanced among these paths in a WSN. However, the adversary can overhear the communication between nodes in WSN and can modify routing control packets affecting the discovery of alternative paths and creating routing loops and dead ends. Multipath incurs more energy consumption than single-path routing. In particular, when a node is captured and compromised, all information of the node, including any security keys, becomes available to the attackers, and the adversary will have full control of the node. Game theory [22] is one of the effective mathematical methods to solve the attacker-defender interaction problems. And there is growing interest in using game to solve selective forwarding attack analysis problems. In [23], they analyze the collusion in selective forwarding attacks and propose a multiattacker repeated colluding game. They think the colluding attackers form a malicious group and the punishment to each colluding attacker is strongly related to the overall performance of this malicious group. In [24], the mixed strategy Nash equilibrium of the game provides the probability that the flooding packet would be forwarded by the receiver node. Here node needs to make a decision whether to forward or not. The number of players of the game is the number of nodes that receive . Only a limited number of neighbors of the source node participate 2 International Journal of Distributed Sensor Networks in forwarding. In [25], a stationary Markovian game model is utilized to optimize system performance in terms of throughput, delay, and power consumption cost. However, in Markov games, actions of players are determined based on the current state of the game, instead of considering the complete game history. In [26], they present a systematic study of collusionresistant routing in noncooperative wireless ad hoc networks. In their model, each node in a path receives a payment from source node S for each forwarded packet. A central authority collects payments from the source node and guarantees secure distribution of payments to the forwarding nodes. And they assume that packet discarding and standby consume much less energy. However, this centralized mechanism and the above assumption are not suitable in WSN. Literature [27] proposed a generalized two-hop -cast relay for packet routing, where is replicated packet redundancy limit. They explore possible maximum throughput capacity of a node and determine the corresponding optimal setting of to achieve it. Node's payoff is the achievable throughput capacity of its own traffic. And all nodes play the symmetric strategy profiles. Literature [6] proposes a model based on game theory and graph theory to investigate equilibrium conditions of packet forwarding strategies. In [28], they combine downstream assessments and end-to-end assessments to detect and mitigate collaborative Grey hole attacks. And a two-hop acknowledgment mechanism is integrated with forwarding assessments. However, in [6,28], they assume the channel is error-free wireless and no per-link encryption. This does not meet the actual situation of most WSNs. In literature [29], they develop a channel aware detection (CAD) algorithm that can effectively identify the selective forwarding misbehavior from the normal channel losses. In [30], the authors proposed a packet forwarding framework based on each node's own past actions and its observation of other nodes. However, their objective is to maximize the node's own payoff, not to cause damage to other nodes. In literature [31], to obtain the trust value of the insider nodes along the route , after every data packets, the sender will generate a check packet and send it to destination node thought the route . As this check packet passes through the route , each insider node in will attach its opinions about its upstream and downstream neighbors to the check packet. However, this mechanism cannot solve bad mouthing attack when nodes attach their opinions to the check packets. Selective dropping attack launched by insider node is still a problem that needs to be solved.
A repeated continuous noncooperative game based neighbor monitoring system to detect compromised nodes in selective forwarding attack in WSN is proposed in this paper. Based on the monitoring results, we can select more reliable cluster heads having sufficient residual energy and high trust level for data forwarding and data aggregation.
The rest of this paper is organized as follows. Game theory is introduced in Section 2. In Section 3, a mixed strategy Monitor-Forward game in WSN is constructed and simulated. In Section 4, a game with continuous strategy to mitigate false positives on packet dropping detection on unreliable wireless communication channel is constructed and simulated. Routing protocol without monitor mechanism and routing protocol with mixed strategy Monitor-Forward game and with continuous strategy Monitor-Forward game in a clustered WSN are all simulated and compared in Section 5. Finally, conclusions are drawn in Section 6.

Game Theory
Game theory is the study of problems of conflict and cooperation among independent decision-makers. Game theory is one of the effective mathematical methods to solve the attacker-defender interaction problems in WSN. In game theory, pure strategy means that the players choose strategies determinedly. However, in the real case, the rational node will change its strategy over time. In action decision of WSN, if the suspicious node always drops the packets, the attack will be detected quickly. If the monitoring node always monitors his neighbor node, too much energy will be consumed. As a result, rational suspicious node will selectively drop the packets it received with certain probability and pretends to be legitimate sometimes and the monitoring node will monitor its next hop node with certain probability also.

Mixed Strategy Nash Equilibrium.
Mixed strategy allows a player to randomly select a pure strategy. We first construct the Monitor-Forward game as a mixed strategy game, in which the node's strategy is probability distribution over its pure strategy set. A pure strategy can be regarded as a degenerate case of a mixed strategy, in which that particular pure strategy is selected with probability 1 and every other strategy with probability 0.
A Nash equilibrium for a mixed strategy game is stable if a small change in probabilities for one player leads to a situation where two conditions hold: (i) The player who did not change has no better strategy in the new circumstance.
(ii) The player who did change is now playing with a strictly worse strategy.

Continuous Strategy Game.
A continuous game allows more general sets of pure strategies, which may be uncountable infinite. It extends the notion of a discrete game, where the players choose from a finite set of pure strategies. In general, a game with uncountable infinite strategy sets will not necessarily have a Nash equilibrium solution. If, however, the strategy sets are required to be compact and the utility functions continuous, then a Nash equilibrium will be guaranteed. The existence of a Nash equilibrium for any continuous game with continuous utility functions can be proven using Irving Glicksberg's generalization of the Kakutani fixed point theorem.

Repeated Game and QRE of a Repeated Game.
In game theory, a repeated game is a special case of dynamic game which consists in some number of repetitions of some base game (called a stage game). It captures the idea that a player will have to take into account the impact of his current International Journal of Distributed Sensor Networks 3 action on the future actions of other players; this is called his reputation.
The stage game in our repeated game in WSN is the 2-person games played by the suspicious node and the monitoring node . The formal definition is as follows.
Formal Definition. For -period repeated game, at each period , the moves during periods 1, . . . , − 1 are known to every player. Suppose is the discount factor. The total discounted payoff for each player is computed by where ( ) denotes the payoff to player in period . If = ∞, the game is referred to as the infinitely repeated game. The average payoff to player is then given by In our model, is player 1 and is player 2. The player will get punishment from other players in the near future if it acts greedily. Therefore, the player (node and node ) will focus more on the long-term overall utility than the oneshot utility on one stage of the game. From Folk Theorem, for an infinitely repeated game, if a feasible outcome gives each player better payoff, the Nash equilibrium can be obtained.
However, because of the limited energy of nodes in WSN, the Monitor-Forward game is indeed a random ended repeated Monitor-Forward game. Random repeated game is very different from finite games with definite end time in action or strategy choosing. But it is very similar to infinite games in strategy choosing. So, we can treat this game as infinite games in strategy analysis process.
In a multiround repeated game, the nodes will focus more on the long-term overall utility. Since the game is ended randomly, node's lifetime which is decided by the residual battery energy is important in the strategy choosing. Suppose denotes how long the suspicious node and monitoring node believe the repeated Monitor-Forward game will last. is denoted by a real number that lies in the interval (0, 1). 0 is a threshold in the interval (0, 1). In each stage of the repeated game, (1) if > 0 -that is, the suspicious node and the monitoring node believe that the game will repeat for many stages-each node will always choose its mixed strategy based Nash equilibrium * , * to maximize the long-term overall utility in the future.
(2) if < 0 , we think the residual battery energy of monitoring node or is not enough and Cluster Rotation Algorithm will be executed soon. To maximize its profit, will be violated from the Nash equilibrium strategy and choose to drop the packet fearlessly to maximize its one-shot utility in the current stage.

Quantal Response Equilibrium.
With the Monitor-Forward game repeats, the nodes obtains more and more information of the other's misbehavior. We can obtain the Quantal response equilibrium (QRE) by utilizing the method in [32]. Players make choices based on a quantal-choice model and assume other players do so as well.
Quantal response equilibrium (QRE) is a solution concept in game theory. First introduced by Richard McKelvey and Thomas Palfrey, it provides an equilibrium notion with bounded rationality. In a quantal response equilibrium, players are assumed to make errors in choosing which pure strategy to play. The probability of any particular strategy being chosen is positively related to the payoff from that strategy. Quantal responses are smoothed-out best responses, in the sense that players are more likely to choose better strategies than worse strategies but do not play a best response with a probability one.
By far the most common specification for QRE is logit equilibrium (LQRE) [32]. In a logit equilibrium, player's strategies are chosen according to the probability distribution: where (i) is the probability of player choosing strategy ; (ii) EU ( − ) is the expected utility to player of choosing strategy given other players are playing according to the probability distribution − ; (iii) is a rationality parameter which is nonnegative (sometimes written as 1/ ). As → 0, players become "completely irrational" and play each strategy with equal probability. As → ∞, players become "perfectly rational" and play approaches a Nash equilibrium. So LQRE will always be at least as good a fit as Nash equilibrium. Changes in the parameter can result in large changes to equilibrium behavior.

A Monitoring Based Trust
System. In WSNs, compromised nodes have legitimately registered into the network and the attackers can bypass the public key and private key system. A reputation-based trust system which maintains information about nodes' history behaviors is a necessary complement to the existing security mechanism. Trust is a particular level of the subjective probability with which an agent assesses another node in a context such as data integrity, honesty, and packet forwarding. In this paper, we suppose that in a clustered wireless sensor network, the cluster heads aggregate and compress the data from the sensor nodes in the cluster and forward it to its next-hop cluster head or the base station and only the trust on selective forwarding context is considered in the Monitor-Forward game. Cluster heads are also in charge of trust values on 4 International Journal of Distributed Sensor Networks data reliability of sensor nodes in these clusters. A distributed watch dog runs on every cluster head in WSN to monitor and record the packet forwarding behaviors of its next hop cluster head in the route to destination. Each cluster head node in WSN maintains its own neighbor set and a set of neighbor nodes towards the sink FN. FN is a subset of . It will select a node in FN with highest trust value on packet forwarding. If the suspicious node forwards the packet correctly, its trust value stored in the monitoring node will increase. Nodes with low trust value will then be excluded from the network. Node transceivers are supposed to be omnidirectional and neighboring overhearing is feasible in our model.
Each cluster head executes the trust model by monitoring its neighboring nodes' participation in the packet forwarding mechanism. If the node forwards the packet, it confirms that the node has acted in a benevolent manner and so its direct trust counter is incremented. If the forwarding node does not transmit the packet, its corresponding direct trust measure is decremented. In [33], after transmitting the packet, sending node must wait a trust update interval until the time it overhears the retransmission by its neighbor or the trust update interval has expired. This interval is related to the mobility and traffic of the network and can be set accordingly. If during the TUI the node is able to overhear its neighboring node retransmit the same packet, the sending node increases the trust value for that neighbor. In case no retransmission is heard and a time-out occurs when the TUI expires, the trust value for that neighbor is decremented. However, after transmitting the packet, the persistent monitoring of sending node would cost too much energy. In order to solve this problem, we propose a low cost game based monitoring mechanism to detect the compromised node.

A Monitor-Forward Game Based Monitoring Mechanism in WSN.
In WSN, the sensor node consumes power for sensing, communicating, and data processing. More energy is required for communication than any other process. The transceiver of a node has four operational states that are transmit, receive, idle, and sleep. Most transceivers operating in idle mode consume almost equal power to operate in receive mode [34]. Thus, in a lot of literature, the transceiver is completely shut down when it is not transmitting or receiving rather than being in the idle or listening mode. In [33], to monitor the neighbor node, after transmitting the packet, sending node will not go to sleep but waits a trust update interval until it overhears the retransmission by its neighbor or the trust update interval has expired. However, if the trust update interval is too short, the transmission of its neighbor will be missed; if trust update interval is long, the persistent monitoring of node will cost a lot of energy.
By traffic analysis and statistical analysis executed in end nodes of a path [35], we can detects anomalies in network traffic and calculate probability of occurrence of attack on the path. However, which node in this path is malicious is not known. Nodes with monitoring mechanism can detect selective dropping attack of their neighboring node.  (ii) denotes the strategy set for the monitoring node; (iii) denotes the strategy set for the suspicious node; (iv) = × is the set of strategy profiles of the game; (v) = ( ( ), ( )) is the payoff function for ∈ , where = ( , ), ∈ , and ∈ .
Let be a strategy profile of node and let be a strategy profile of node . Node will obtain payoff ( ) when it chooses strategy and chooses strategy resulting in strategy profile = ( , ).
A strategy profile * ∈ is a Nash equilibrium (NE) if each rational node selects its best possible response to the other node's strategies provided that neither node can increase its utility by unilaterally changing its own strategy. That is, By traffic analysis and statistical analysis executed in end nodes of a path [36], we can detect anomalies in network traffic and calculate probability of occurrence of attack on the path. However, if the neighboring node forwards the packet to its coconspirators, monitoring mechanism without collusion considering will not detect this attack. Thus, nodes with normal reputation in a path whose attack probability is greater than a certain threshold will use two-stage dynamic game with collusion considering. Considering the larger cost of collusion attack monitoring, the nodes in the path whose attack probability is below the threshold will play a simpler static game without collusion considering. We begin with the simpler Monitor-Forward game without collusion considering.   : : the probabilities of the monitoring node to adopt strategy Monitor time ( ) and Sleep ( ), respectively. The payoff matrix of the game is shown in Table 1. In each cell of the matrix, the first number represents the payoff to the monitoring node, and the second number represents the payoff to the suspicious node.
We define monitor to be the battery power consumption of to monitor its next hop node for one RTT and to be the multiple of average RTT of one hop transmission in WSN. Here, we set = 1. Define forward to be the energy consumption of to forward the packet it received to its next hop; to be the punishment for the dropping packet of the , and to be the adversary reward which means the suspicious node's illegal gain from the adversary of the network which has compromised these inside attackers. Generally, set > .
The utility mm received by the monitoring node when it chooses monitoring strategy is as follows: The utility received by the monitoring node when it chooses to sleep after transmitting is denoted by ms : Let ms = mm ; we can obtain the value of . Similarly, the utility SF received by the suspicious node if it forwards received packet is as follows: The utility received by the suspicious node if it drops its received packet is Let SF = SD ; can be derived.
The mixed strategy allows a player to randomly select a pure strategy. And the Nash equilibrium of the game indicates the outcome in which neither suspicious node nor the monitoring node wants to unilaterally change its strategy.

Result of Simulation.
As we have known, is the multiple of average RTT of one hop transmission in WSN and we suppose = 1 in the static game. For simplicity, we set monitor = 2; forward = 1. Figure 1 shows the payoff matrix of the Monitor-Forward game.  If we set = = 5, the loss of the suspicious node is the same as the gain of the monitoring nodes; we call this game is a zero-sum game. Figure 1(c) shows the payoff matrix with = = 5. This is a zero-sum game too.
The Nash equilibrium is as follows:   From the above simulation results, we can see that higher punishment will lead to smaller monitoring probability of the monitoring node and smaller expected payoffs of the suspicious node . However, in the real case, packet loss, data corruption, and variable propagation delays will lead to large amounts of false positives on packet dropping detection that rely on strict timing. Thus, too large is not suitable for the unreliable wireless communication channel in WSN. The parameter setting should take the real-time channel quality into account. A balance between the severe punishment and avoiding false positives on packet dropping detection is needed.

QRE Simulation Result of the Repeated Game.
We conducted an experiment with monitor = 2, forward = 1, = 1, = 5, and = 5, where nodes played the Monitor-Forward game without collusion consideration illustrated in Figure 1(c); the QRE of repeated game is shown in Figure 2.
The experiment parameters are monitor = 2, forward = 1, = 1, = 7, and = 5, where nodes played the Monitor-Forward game without collusion consideration illustrated in Figure 1(d) firstly. The QRE of the repeated game is shown in Figure 3. By using the method described in detail in [32], we can obtain predicted frequencies of moves at each information set for any parameter, , of the AQRE model. Given a data set from the particular experimental game, the estimate,̂, is the value of that maximizes the likelihood of that data set.

Unreliable Communication Channel.
Because of the unreliable wireless communication channel in WSN, packet loss, data corruption, and variable propagation delays will lead to large amounts of false positives on packet dropping detection that rely on strict timing. Normal loss events such as medium access collision or bad channel quality will lead to normal loss rates which are not caused by malicious act. The normal loss rates can be computed by the following formula: where denotes the packet loss rate due to bad channel quality and denotes the packet loss rate due to medium access collisions. The detail computing of and can be found in literature [37]. Nodes may be considered to be compromised due to a packet propagation delay or normal packets loss. However, if the monitoring time is set as twice the RTT or longer, the power consumption will be significant. So, we construct a continuous game which allows players to choose a strategy from a continuous strategy set. Monitoring node has numerous possible actions to choose from in this continuous game.

Continuous Monitor-Forward Game in WSN.
As previously mentioned, a mixed strategy Nash equilibrium is equilibrium where at least one player is playing a mixed strategy. In the continuous Monitor-Forward game = ⟨ , , ⟩, suspicious node has two pure strategies: Forward Packet ( ) and Drop Packet ( ). That is to say, the strategies set of is = { , }. The monitoring node 's strategy is monitoring time which is denoted by ( ), where ( ) is continuous strategy. denotes the average round-trip time (RTT) of one hop distance in WSN and is the multiple of RTT. ∈ [0, ], where is the upper limit of .
We should take into account of normal packet losses due to poor channel quality and medium access collisions by setting different in the Monitor-Forward game. As wireless loss probability due to bad channel quality varies with the network status changing, is dynamically adjusted with the normal loss rates in the game every time the game is played.
By the continuous game theory, we know that the utility functions of a player with continuous strategy are often expressed by a quadratic equation of a variable. As monitor is International Journal of Distributed Sensor Networks 7 the energy consumption of node monitoring its next hop last for one RTT, the utility of node due to monitoring is − 2 * monitor . If forwarded the packet, node will gain forward * , which is lost by node . If dropped the packet, node will punish with and will obtain from the opponent of . The gain of node from the punishment is in direct proportion to 2 / and the utility of from its opponent's award to is * . So, we can define the utility function ( ), which is ( , ), of the monitoring node as where variables , 1− are the probabilities for the suspicious node adopting Forward Packet ( ) and Drop Packet ( ), respectively. As we can see from this formula, the gain for monitoring is in proportion to the length of monitoring time and the loss for short monitoring is in inverse proportion to . When → , we think the false positives on packet dropping detection are negligible; ⋅ 2 / → . Define the utility functions ( , ) of as

Best Response Function of the Continuous Game.
A best response is the point at which each player in a game has selected the best response (or one of the best responses) to the other players' strategies. To achieve a strategy Nash equilibrium, set In this continuous game, the best response of to 's strategies is setting monitoring time which meets = max( ) and this can be substituted into its maximization problem.
If > 1 − monitor ⋅ / , set the first partial derivative of the payoff function to be equal to zero with respect to 's strategy variable : And we can find that 's best response function is For which have two discrete strategies, set ( ) = ( ). That is, Solve this equation: * = ( ⋅ ( forward + √ 2 forward + 4 ⋅ ⋅ )) (2 ⋅ ) .
Feeding * into 's best response function, ( * , * ) is the Nash equilibrium of this continuous game.

Simulation of the Continuous Monitor-Forward Game.
In this continuous game, we have known that = − 2 monitor + ⋅ ( forward ) ⋅ + (1 − ) ⋅ ( ⋅ 2 / − ⋅ ). Set monitor = 2, forward = 1, = 7, = 5, and = 2; The payoff function of the monitoring node is illustrated as in Figure 4. 's payoff (in the -axis) is a function of the length of monitoring time that last (in the -axis). Figures 4(a)-4(d) graphs this payoff function of on different forward probability of the suspicious node to its next hop. 's best response function ( ) = ( ⋅ forward )/(2 * ( monitor − / + ⋅ / )) is shown in Figure 5. The line in Figure 5 shows the length of monitoring time that last (in the -axis), as a function of the probability that plays "Forward" (shown in the -axis).
As we can see, if the punishment is small, the game will result in an equilibrium with low forward probability of .

Simulation of a Routing Protocol with
Monitor-Forward Game in a Clustered WSN Initial energy of each node is set to 0.5 joules. The election probability of a node to become cluster head is 0.1. The battery power consumption of to monitor its next hop node for one RTT is monitor = 0.0000001 joules. The energy consumption of to forward the packet it received to its next hop is forward = 0.00000005 joules. The punishment for the dropping packet of is set to 0.00000035 and the suspicious node's illegal gain from the adversary of the network which has compromised inside attackers is 0.00000025. The game is repeated 9999 rounds. The traffic is generated randomly.

Simulation Numerical Analysis.
The initial deployment of the routing protocol without monitor mechanism (WMM) is shown as in Figure 6(a). 100 nodes are randomly distributed in an area of 100-by-100 meters and the base station is set in the center of the area. denotes the packet transmitting round in WSN. As we can see in Figure 6, the first node died in the round = 999 and all nodes in the area died in the round = 4500.
International Journal of Distributed Sensor Networks  In the ideal case without normal loss, 15% of the cluster head nodes are randomly chosen as selective dropping attackers in the forwarding paths between source and destination pairs. The network lifetime using different protocols is illustrated in Figure 7.
The simulation results indicate that lifetimes of networks using MSMFM and CSMFM are shorter than WMM as they have monitor mechanism which consumes much energy. Compared with MSMFM, CSMFM which use continuous strategy extends the lifetime of the network, delays the first node's death time, and enhances the energy efficiency.
The packet forward probability without normal packet loss is shown in Figure 8. The Packet Delivery Radio of CSMFM and MSMFM is improved compared to WMM because they detect and isolate the attacker and forward the packets to the destination through a different secure path. Using WMM which have no monitor mechanism, there is a significant degradation in the Packet Delivery Radio with selective dropping attacks. Using MSMFM, the Packet Delivery Radio is improved to 85% in the case of 20% dropping and 65% in case of 50% dropping. Using CSMFM, the Packet Delivery Radio is improved to 88% in the case of 20% dropping and 70% in case of 50% dropping.
The curves in Figure 9 illustrate the performance of CSMFM, MSMFM, and WMM in the presence and absence of attacker(s) with normal losses. As the sum of false alarm and missed detection probabilities of CSMFM is degraded compared to MSMFM, the Packet Delivery Radio of CSMFM is increased. And the increased channel loss rate does cause more packet loss. against insider attacks. To mitigate selective forwarding attacks launched by insider nodes in multihop communication, a repeated mixed strategy and an energy-efficient continuous strategy Monitor-Forward game between the sender node and its one-hop neighboring node in a cluster WSN are proposed and simulated. We propose a trust management mechanism to identify and isolate malicious nodes for the cluster wireless sensor networks. A distributed watch dog runs on every cluster head in WSN to monitor and record the packet forwarding behaviors of its next hop cluster head node. By this trust model, we can select more reliable cluster heads having sufficient residual energy and high trust level. The main contributions of our work are as follows:

Conclusion
(1) We constructed and simulated a mixed strategy Monitor-Forward game, analyze the payoff matrix and mixed strategy Nash Equilibrium of the game with different parameters: B and C. The random ended repeated mixed strategy game and its quantal response equilibrium are discussed. (2) Because of the unreliable wireless communication channel in WSN, packet loss, data corruption, and variable propagation delays will lead to large amounts of false positives on packet dropping detection that rely on strict timing. We constructed and simulated a continuous game which allows players to choose a strategy from a continuous strategy set. (3) Routing protocol without monitor mechanism, routing protocol with mixed strategy Monitor-Forward game, and routing protocol with continuous strategy Monitor-Forward game in a clustered WSN are all simulated and analyzed with Matlab in various setups. Game analyzing and simulation results demonstrate that game theory based framework is an efficient approach to identifying the selective forwarding attacks and increase the packets forward probability of the networks. Continuous strategy game will consume less battery energy and have less false alarms than mixed strategy game on unreliable channels.