<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Investigating the Effect of Uniform Random Distribution of Nodes in Wireless Sensor Networks using an Epidemic Worm Model</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Virginia E. Ejiofor</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>ChukwuNonso H. Nwokoye</string-name>
          <email>explode2kg@yahoo.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ikechukwu Umeh</string-name>
          <email>ikumeh1@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rita Orji</string-name>
          <email>purity.rita@gmail.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Njideka N. Mbeledogu</string-name>
          <email>njidembeledogu@yahoo.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Wireless Sensor Network; Worm; Epidemic Model; Uniform</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Nnamdi Azikiwe University</institution>
          ,
          <addr-line>Awka</addr-line>
          ,
          <country country="NG">Nigeria.</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Nnamdi Azikiwe, University</institution>
          ,
          <addr-line>Awka</addr-line>
          ,
          <country country="NG">Nigeria.</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Waterloo</institution>
          ,
          <country country="CA">Canada.</country>
        </aff>
      </contrib-group>
      <fpage>58</fpage>
      <lpage>63</lpage>
      <abstract>
        <p>The emergence of malicious codes that attack Wireless Sensor Networks (WSN) made it necessary to direct research attention to security. These attacks arising from worms pose devastating threats to networks which can lead to substantial losses or damages. However, recent models developed for the purpose of understanding worm transmission patterns and ensuring its containment did not account for the effect of uniform random deployment of sensor nodes on the Exposed and the Vaccinated compartments. Therefore, in this paper we present a modified Susceptible-Exposed-Infectious-Recovered-Susceptible with Vaccination (SEIRS-V) model for worm propagation dynamics in sensor networks. Our model applies the expression for uniform distribution deployment of sensor nodes so as to study the effect of distribution density and transmission range on the characterized compartments. Furthermore, we presented solutions for the equilibrium points, the reproduction number and proof of stability. Finally, we employed numerical methods to solve and simulate with real values the developed system of differential equations.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>CCS Concepts</title>
      <sec id="sec-1-1">
        <title>Computer systems organizations</title>
      </sec>
      <sec id="sec-1-2">
        <title>Embedded and cyber</title>
        <p>physical systems Sensor networks. • Security and privacy</p>
      </sec>
      <sec id="sec-1-3">
        <title>Intrusion/anomaly detection and malware mitigation</title>
      </sec>
      <sec id="sec-1-4">
        <title>Malware and its mitigation. • Mathematics of computing</title>
      </sec>
      <sec id="sec-1-5">
        <title>Mathematical analysis</title>
      </sec>
      <sec id="sec-1-6">
        <title>Differential equations</title>
      </sec>
      <sec id="sec-1-7">
        <title>Ordinary</title>
        <p>differential equations. •</p>
      </sec>
      <sec id="sec-1-8">
        <title>Computing</title>
      </sec>
      <sec id="sec-1-9">
        <title>Methodologies</title>
        <p>modeling and simulation</p>
      </sec>
      <sec id="sec-1-10">
        <title>Model development and analysis,</title>
      </sec>
      <sec id="sec-1-11">
        <title>Simulation support systems.</title>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>1. INTRODUCTION</title>
      <p>
        In recent times, Wireless Sensor Networks (WSNs) has enjoyed
considerable use in civilian applications for precision farming
[17] and the provision of smart and quality healthcare. In the
military, WSNs are used to monitor rebel activities and to detect
enemy movements etc. It consists of large number of
communicating devices which are randomly deployed in
unreachable territories without an engineered or predetermined
position for the nodes [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. These territories are basically
unfriendly and unguarded.
      </p>
      <p>The sensor nodes are distributed in a sensor field where they are
wirelessly connected to the sink. Although they have minimal
battery capacity they are able to monitor and collect data about a
given area. The data and information can be territorial
parameters like pressure, position/condition of objects/humans,
humidity, temperature etc. The collected data and information
are sent back to the local sink through transmission between
neighboring nodes. This transmission is basically done in a
“multihop infrastructureless” manner. Subsequently, analyses
are performed on the collated data accessed by a remote user
through the internet for suitable decision making.</p>
      <p>The constrained nature of sensor resources that gives rise to frail
protective potential makes them suitable prey for self-replicating
malevolent codes (such as worms) that spread without human
involvement. In addition, these worms often tamper with the
confidentiality, integrity and availability measures of
neighboring sensor nodes due to its distributed nature.
With the proliferation of the use of network technologies,
increasing efforts have been focused on developing appropriate
cyber protection structure in order to secure both stationary and
moving information. Wireless Sensor Network research believes
that achieving this objective is overly expedient. As a result,
several continuous (and discrete) equation-based models that
characterize, investigate and aid better comprehension of the
behavioral tendencies of worm variants have been developed.
Predictions of worm behavior are largely dependent on the
presuppositions of the model characterization and analysis.</p>
    </sec>
    <sec id="sec-3">
      <title>2. RELATED WORKS</title>
      <p>
        It is unarguably true that propagation of malicious agents in
cyberspace is similar to the spread of epidemic in the biological
world. Therefore, modeling and analysis enhance optimized
containment by providing better understanding of the factors
that aid faster propagation of malicious codes in networks. The
Susceptible-Infectious-Recovered (SIR) model by [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] initiated the journey into developing mathematical models
for worm/virus propagation. Building on the SIR model, other
extensions such as Susceptible-Exposed-Infectious-Recovered
(SIER) [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], Susceptible-Exposed-Infectious-Vaccinated
(SIEV) [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ],
Susceptible-Exposed-Infectious–RecoveredVaccinated (SEIR-V) [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] etc., were developed to address several
concerns arising in a real world network environment.
      </p>
      <p>
        In this paper we modify the Susceptible–Exposed–Infectious–
Recovered–Susceptible with a Vaccination compartment
(SEIRS-V) epidemic model of [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] by applying [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] expression
for uniform random distribution of sensor nodes with the aim of
investigating the effect of both distribution density (σ) and
transmission range ( ) on the characterized compartments. We
discovered that though [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] represented distribution density and
transmission range their SIR model did not include analyses for
the Exposed and the Vaccinated compartments. On the other
hand, though [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] included these two compartments their
analyses did not involve distribution density and transmission
range. Wang and Yang [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] also applied Tang and Mark’s
formulation but their model used the Susceptible-Infectious (SI)
compartments for their analyses; and didtnd’iscuss the Exposed
and Vaccinated compartments. Considering the argument by [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]
that standard incidence “presents a more reasonable and
practical scenario of contact than the simple mass action
incidence”, we would modify the above model using the former.
In epidemiology, the Exposed class contains nodes that are
infected but not infectious. These nodes which are in a latent
phase possess different infectivity rate when compared to the
Infectious nodes. Common symptom for nodes in this latent
stage is slow data transmission speed [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. On the hand,
vaccination (or immunization) is a known countermeasure in
epidemiology. It is aimed at fortifying a fraction of the total
sensor node population prior to the outset of an epidemic. This
study is necessary since there is a strong likelihood that sensor
nodes can exist in the latent stage and that network managers
can employ vaccination strategies to ensure security. In addition,
the analyses of distribution density and transmission range using
worm models can positively impact sensor deployment activities
for institutions.
      </p>
    </sec>
    <sec id="sec-4">
      <title>3. METHODOLOGY</title>
      <p>
        In this study, we basically perform modeling and simulation.
Specifically, we employ a widely applied method for
investigating network epidemic [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] and [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] etc. This
method is called modeling and analysis of dynamical systems.
Here, the WSN is treated like a dynamical system and
equilibrium positions are studied. The methodology starts with;
a. model formulation (and optionally drawing the schematic
diagram); b. finding the equilibrium states (for the worm-free
and the endemic states); and c. deriving the Reproduction
number. Subsequent stages include; d. proof of stability and e.
simulations experiments using software such as MatLab, Maple
etc.
      </p>
      <p>During model formulation, the analyst presents the equations
that represent a real world phenomenon (in this case worm
propagation in WSNs). Some authors also present a conceptual
(or schematic) diagram at this point. Next, the analyst will
derive the equilibrium points by equating the model (or system
of differential equation) to zero. The Reproduction number is
then derived to establish a threshold for disease/infection
extinction in the network. Furthermore, stability analyses (using
several renowned methods in literature) and simulation
experiments are performed. The simulations experiments are
more like sensitivity analyses. They are done by first solving the
proposed model using a numerical method and applying real
values for the simulation. Depending on the modeler’s intention
the method can take different turns for analyses. But stages such
as model formulation and simulation experiments are
significantly part of this methodology.</p>
    </sec>
    <sec id="sec-5">
      <title>3.1 The Modified SEIRS-V Model</title>
      <p>We characterize worm attack in wireless sensor network using
the Susceptible–Exposed–Infectious–Recovered–Susceptible
with a Vaccination compartment (SEIRS-V). Our assumptions
include addition of nodes in the network and removal (i.e. death)
of nodes as a result of worm attack or due to hardware/software
failure. All sensor nodes are susceptible to potential of worm
attack and with time (probably) get infected (i.e. forming nodes
in the Infectious compartment). Some sensor nodes before
becoming infectious exists in the Exposed stage where the worm
is latent and the nodes cannot transmit the infection. A symptom
of this stage is slower data transmission for affected nodes.
However, due to the existence of several worm variants in
cyberspace the sensor nodes never acquire a permanent
immunity i.e. they become susceptible to worm infection with
time.</p>
      <p>The total population N (t) represents the nodes in the Wireless
Sensor Network which is subdivided into Susceptible, Exposed
(latent), Infectious (contagious), Recovered (temporarily
immune), Vaccinated (immunized) denoted by S( t), E(t), I(t),
R(t) and V(t). This implies that S (t) + E (t) + I (t) + R (t) + V
(t) = N (t).</p>
      <p>
        Specifically, the sensor nodes are uniformly and randomly
deployed with a distribution density of σ and a transmission
range of , this implies that the effective contact with an
infected node for transfer of infection is in the order of .
Other parameters include which is the inclusion rate of nodes
into the sensor network population, is the Infectivity contact
rate, is the mortality or the death rate of nodes due to hardware
or software failure, is the crashing rate due to attack of
malicious objects (in this case worm), is the rate at which
exposed nodes become infectious, is the recovery rate, is the
rate at which recovered nodes become susceptible to infection,
is the rate of vaccination for susceptible sensor nodes and is
the rate of transmission from the Vaccinated compartment to the
Susceptible compartment.
(
(
(
(
(
(
(
)
)
)
 



E

 V
S

[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] but modified to capture distribution density and transmission
The modified SEIRS-V model is represented using the following
system of differential equations;
      </p>
    </sec>
    <sec id="sec-6">
      <title>3.2 Solutions of Equilibrium Points</title>
      <p>We equate the modified system of differential equations (1) to
zero i.e.
solutions which are the Worm-free equilibrium and the Endemic
equilibrium points. The Worm-free equilibrium describes the
absence of worms while the Endemic equilibrium describes the
presence of worms in the</p>
      <p>Wireless Sensor Network using
formulated mathematical model.</p>
      <p>
        The solutions of equilibrium points are Worm-free equilibrium
;
to
obtain
two
) i.e.
and Endemic equilibrium
= ( ,
(3)
A cursory look at the symbolic solutions of the endemic
equilibrium in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] shows the differences. It is observed here that
the expression for uniform distribution deployment formed part
of the solutions; this is absent in the solutions of [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
3.3
The
      </p>
    </sec>
    <sec id="sec-7">
      <title>The Basic Reproduction Number</title>
      <p>
        Reproduction number commonly denoted as
threshold quantity defined as “the expected number of secondary
cases produced in a completely susceptible population, by a
typical infective individual” [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] or the spectral radius which can
also be referred to as thdeom“inant eigenvalue of the matrix G
= FV-1” [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Some authors also refer to it as the inverse of
the susceptible (
      </p>
      <p>
        ) at the endemic equilibrium [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. The
Reproduction
number
(
)
is
(4)
(
)(
is a
)
Therefore the worm free equilibrium is locally asymptotically
stable.
      </p>
    </sec>
    <sec id="sec-8">
      <title>4. NUMERICAL RESULTS AND</title>
    </sec>
    <sec id="sec-9">
      <title>DISCUSSION</title>
      <p>
        We solved the system of differential equation using a numerical
method i.e. Runge-Kutta Fehlberg method of order 4 and 5.
Subsequently we performed simulation experiments using this
following initial values for the Wireless Sensor network: S=100;
E=3; I=1; R=0; V=0. Other values used for the simulation
include =0.33; =0.003; =0.07; =0.25 =0.4;
=0.3; =0.3 =0.06; adapted from the time history of [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. We
compared our results with the results of similar models in
literature for the purposes of verification and validation.
I R V
The effect of both density and range was again evident in the
third response (i.e. 0.7 and 2.5 for density and range
respectively) depicted with blue when compared with the first
response where 0.3 and 2.0 for density and range respectively.
      </p>
      <p>
        Infectious Sensor Nodes against Time
From our simulation experiments we noticed that at transmission
range of 1 and density of 0.3 depicted in Figure 8 the dynamical
responses were close to Figure 3 of [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] for the Exposed and
Vaccinated compartments. Increasing the range to 2 (as evident
in Figure 2) visibly changed the behavior of the compartments
(most especially Exposed and the Vaccinated). The Exposed
nodes moved from above 30 nodes to above sixty nodes while
Vaccinated nodes reduced to slightly above 20 nodes from
above 40 nodes.
      </p>
    </sec>
    <sec id="sec-10">
      <title>5. CONCLUSION AND FUTURE</title>
    </sec>
    <sec id="sec-11">
      <title>DIRECTION</title>
      <p>
        In this study, we discovered that the increase in density and
transmission range increased the Exposed and Infectious
compartments and decreased and Vaccinated compartments.
This study is consistent with [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] and [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] that employed similar
expression for uniform random distribution i.e. the increase in
the number of Infectious sensor nodes with the increase in both
the node density and communication range.
      </p>
      <p>Due to the effect of uniform random distribution on Vaccinated
sensor nodes, it is only wise that the rate at which nodes are
immunized is increased as density and range increase in order to
reduce high susceptibility to infection. In future we would focus
our analyses on how to achieve increased vaccination rate for
vulnerable sensor nodes (to ensure reduced susceptibility to
infection) in the light of increased density and increased
communication/transmission range.</p>
      <p>
        Furthermore, we would also perform analysis and simulation
experiments to observe the effect of uniform random distribution
on Quarantine models. In addition, pursuit of other mathematical
objectives such as extending analyses to the global stability at
the endemic equilibrium using the geometrical approach of [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]
etc. can ensue; since the symbolic solutions at the endemic
equilibrium have been provided by this study. To creatively
protect the interchange of data and information the generalized
form of the analytical model (that characterizes other worm
variants) will be integrated into the cyberspace defense structure
of organization(s) that use Wireless Sensor Networks for
monitoring rebel activities, detecting enemy movements, and
providing smart healthcare etc.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Diekmann</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heesterbeek</surname>
            ,
            <given-names>J. A P</given-names>
          </string-name>
          and
          <article-title>Metz</article-title>
          ,
          <string-name>
            <surname>J. A J.</surname>
          </string-name>
          <year>1990</year>
          .
          <article-title>On the definition and the computation of the basic reproduction ratio R0 in models for infectious diseases in heterogeneous populations</article-title>
          .
          <source>Journal of Mathematical Biology</source>
          <volume>28</volume>
          ,
          <issue>4</issue>
          :
          <fpage>365</fpage>
          -
          <lpage>382</lpage>
          . http://doi.org/10.1007/BF00178324
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Driessche</surname>
            ,
            <given-names>P. V. D.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Watmough</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <year>2002</year>
          .
          <article-title>Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission</article-title>
          .
          <source>Mathematical Biosciences</source>
          <volume>180</volume>
          :
          <fpage>29</fpage>
          -
          <lpage>48</lpage>
          . http://doi.org/10.1016/S0025-
          <volume>5564</volume>
          (
          <issue>02</issue>
          )
          <fpage>00108</fpage>
          -
          <lpage>6</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Hethcote</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhien</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Shengbing</surname>
            ,
            <given-names>L .</given-names>
          </string-name>
          <year>2002</year>
          .
          <article-title>Effects of quarantine in six endemic models for infectious diseases</article-title>
          .
          <source>Mathematical Biosciences</source>
          <volume>180</volume>
          ,
          <issue>1</issue>
          :
          <fpage>141</fpage>
          -
          <lpage>160</lpage>
          . http://doi.org/10.1016/S0025-
          <volume>5564</volume>
          (
          <issue>02</issue>
          )
          <fpage>00111</fpage>
          -
          <lpage>6</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Kermack</surname>
            ,
            <given-names>W. O.</given-names>
          </string-name>
          and
          <string-name>
            <surname>McKendrick</surname>
            ,
            <given-names>A. G.</given-names>
          </string-name>
          <year>1932</year>
          .
          <article-title>Contributions to the mathematical theory of epidemics. ii. the problem of endemicity</article-title>
          .
          <source>Proceedings of the Royal Society of London. Series A. v138</source>
          <volume>i834</volume>
          :
          <fpage>55</fpage>
          -
          <lpage>83</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Kermack</surname>
            ,
            <given-names>W. O.</given-names>
          </string-name>
          and
          <string-name>
            <surname>McKendrick</surname>
            ,
            <given-names>A. G.</given-names>
          </string-name>
          <year>1927</year>
          .
          <article-title>A contribution to the mathematical theory of epidemics</article-title>
          .
          <source>Proceedings of the Royal Society of London A: mathematical, physical and engineering sciences, The Royal Society</source>
          ,
          <fpage>700</fpage>
          -
          <lpage>721</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Kermack</surname>
            ,
            <given-names>W. O.</given-names>
          </string-name>
          and
          <string-name>
            <surname>McKendrick</surname>
            ,
            <given-names>A. G.</given-names>
          </string-name>
          <year>1933</year>
          .
          <article-title>Contributions to the mathematical theory of epidemics. III. Further studies of the problem of endemicity</article-title>
          .
          <source>Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character</source>
          <volume>141</volume>
          ,
          <issue>843</issue>
          :
          <fpage>94</fpage>
          -
          <lpage>122</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>M. Y.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Muldowney</surname>
            ,
            <given-names>J. S.</given-names>
          </string-name>
          <year>1996</year>
          .
          <article-title>A Geometric Approach to Global-Stability Problems</article-title>
          .
          <source>SIAM Journal on Mathematical Analysis</source>
          <volume>27</volume>
          ,
          <fpage>1070</fpage>
          -
          <lpage>1083</lpage>
          . http://doi.org/10.1137/S0036141094266449
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Mishra</surname>
            ,
            <given-names>B. K.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <year>2010</year>
          .
          <article-title>Global Stability of Worms in Computer Network Bimal Kumar Mishra Aditya Kumar Singh</article-title>
          .
          <source>Applications and Applied Mathematics An International Journal</source>
          <volume>05</volume>
          ,
          <volume>10</volume>
          :
          <fpage>1511</fpage>
          -
          <lpage>1528</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Mishra</surname>
            ,
            <given-names>B. K.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Keshri</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <year>2013</year>
          .
          <article-title>Mathematical model on the transmission of worms in wireless sensor network</article-title>
          .
          <source>Applied Mathematical Modelling</source>
          <volume>37</volume>
          ,
          <issue>6</issue>
          :
          <fpage>4103</fpage>
          -
          <lpage>4111</lpage>
          . http://doi.org/10.1016/j.apm.
          <year>2012</year>
          .
          <volume>09</volume>
          .025
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Mishra</surname>
            ,
            <given-names>B. K.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Pandey</surname>
            ,
            <given-names>S. K.</given-names>
          </string-name>
          <year>2011</year>
          .
          <article-title>Dynamic model of worms with vertical transmission in computer network</article-title>
          .
          <source>Applied Mathematics and Computation</source>
          <volume>217</volume>
          ,
          <issue>21</issue>
          :
          <fpage>8438</fpage>
          -
          <lpage>8446</lpage>
          . http://doi.org/10.1016/j.amc.
          <year>2011</year>
          .
          <volume>03</volume>
          .041
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Mishra</surname>
            ,
            <given-names>B. K.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Pandey</surname>
            ,
            <given-names>S. K.</given-names>
          </string-name>
          <year>2014</year>
          .
          <article-title>Dynamic model of worm propagation in computer network</article-title>
          .
          <source>Applied Mathematical Modelling</source>
          <volume>38</volume>
          ,
          <fpage>7</fpage>
          -
          <lpage>8</lpage>
          :
          <fpage>2173</fpage>
          -
          <lpage>2179</lpage>
          . http://doi.org/http://dx.doi.org/10.1016/j.apm.
          <year>2013</year>
          .
          <volume>10</volume>
          .046
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Mishra</surname>
            ,
            <given-names>B. K.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Saini</surname>
            ,
            <given-names>D. K.</given-names>
          </string-name>
          <year>2007</year>
          .
          <article-title>SEIRS epidemic model with delay for transmission of malicious objects in computer network</article-title>
          .
          <source>Applied Mathematics and Computation</source>
          <volume>188</volume>
          ,
          <issue>2</issue>
          :
          <fpage>1476</fpage>
          -
          <lpage>1482</lpage>
          . http://doi.org/10.1016/j.amc.
          <year>2006</year>
          .
          <volume>11</volume>
          .012
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Mishra</surname>
            ,
            <given-names>B. K.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Saini</surname>
            ,
            <given-names>D. K.</given-names>
          </string-name>
          <year>2007</year>
          .
          <article-title>Mathematical models on computer viruses</article-title>
          .
          <source>Applied Mathematics and Computation</source>
          <volume>187</volume>
          ,
          <issue>2</issue>
          :
          <fpage>929</fpage>
          -
          <lpage>936</lpage>
          . http://doi.org/10.1016/j.amc.
          <year>2006</year>
          .
          <volume>09</volume>
          .062
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <fpage>14</fpage>
          .
          <string-name>
            <surname>Mishra</surname>
            ,
            <given-names>B. K.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Tyagi</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          <year>2014</year>
          .
          <article-title>Defending against Malicious Threats in Wireless Sensor Network: A Mathematical Model</article-title>
          .
          <source>International Journal of Information Technology and Computer Science</source>
          <volume>6</volume>
          ,
          <issue>3</issue>
          :
          <fpage>12</fpage>
          -
          <lpage>19</lpage>
          . http://doi.org/10.5815/ijitcs.
          <year>2014</year>
          .
          <volume>03</volume>
          .02
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Tang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Mark</surname>
            ,
            <given-names>B. L..</given-names>
          </string-name>
          <year>2009</year>
          .
          <article-title>Analysis of virus spread in wireless sensor networks: An epidemic model</article-title>
          .
          <source>Proceedings of the 2009 7th International Workshop on the Design of Reliable Communication Networks</source>
          ,
          <string-name>
            <surname>DRCN</surname>
          </string-name>
          <year>2009</year>
          :
          <fpage>86</fpage>
          -
          <lpage>91</lpage>
          . http://doi.org/10.1109/DRCN.
          <year>2009</year>
          .5340022
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          <year>2013</year>
          .
          <article-title>Virus spreading in wireless sensor networks with a medium access control mechanism</article-title>
          .
          <source>Chinese Physics B</source>
          <volume>22</volume>
          ,
          <issue>4</issue>
          :
          <fpage>040206</fpage>
          . http://doi.org/10.1088/
          <fpage>1674</fpage>
          -1056/22/4/040206
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>