<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Investigating the Effect of Uniform Random Distribution of Nodes in Wireless Sensor Networks using an Epidemic Worm Model</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Chukwunonso</forename><forename type="middle">H</forename><surname>Nwokoye</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Virginia</forename><forename type="middle">E</forename><surname>Ejiofor</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Rita</forename><surname>Orji</surname></persName>
						</author>
						<author role="corresp">
							<persName><forename type="first">Njideka</forename><forename type="middle">N</forename><surname>Mbeledogu</surname></persName>
							<email>njidembeledogu@yahoo.com</email>
						</author>
						<author>
							<affiliation key="aff0">
								<orgName type="institution">Nnamdi Azikiwe University</orgName>
								<address>
									<settlement>Awka</settlement>
									<country key="NG">Nigeria</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="institution">Nnamdi Azikiwe University</orgName>
								<address>
									<settlement>Awka</settlement>
									<country key="NG">Nigeria</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="institution">University of Waterloo</orgName>
								<address>
									<country key="CA">Canada</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff3">
								<orgName type="institution">Ikechukwu Umeh Nnamdi Azikiwe University</orgName>
								<address>
									<settlement>Awka</settlement>
									<country key="NG">Nigeria</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff4">
								<orgName type="institution">Nnamdi Azikiwe University</orgName>
								<address>
									<settlement>Awka</settlement>
									<country key="NG">Nigeria</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Investigating the Effect of Uniform Random Distribution of Nodes in Wireless Sensor Networks using an Epidemic Worm Model</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">1B8B6A6674D32E3506755D008D23B583</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T00:54+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Wireless Sensor Network</term>
					<term>Worm</term>
					<term>Epidemic Model</term>
					<term>Uniform Random Deployment</term>
					<term>Differential Equations</term>
					<term>Stability</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The emergence of malicious codes that attack Wireless Sensor Networks (WSN) made it necessary to direct research attention to security. These attacks arising from worms pose devastating threats to networks which can lead to substantial losses or damages. However, recent models developed for the purpose of understanding worm transmission patterns and ensuring its containment did not account for the effect of uniform random deployment of sensor nodes on the Exposed and the Vaccinated compartments. Therefore, in this paper we present a modified Susceptible-Exposed-Infectious-Recovered-Susceptible with Vaccination (SEIRS-V) model for worm propagation dynamics in sensor networks. Our model applies the expression for uniform distribution deployment of sensor nodes so as to study the effect of distribution density and transmission range on the characterized compartments. Furthermore, we presented solutions for the equilibrium points, the reproduction number and proof of stability. Finally, we employed numerical methods to solve and simulate with real values the developed system of differential equations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>CCS Concepts</head><p>Computer systems organizations Embedded and cyberphysical systems Sensor networks. • Security and privacy Intrusion/anomaly detection and malware mitigation Malware and its mitigation. • Mathematics of computing Mathematical analysis Differential equations Ordinary differential equations. • Computing Methodologies modeling and simulation Model development and analysis, Simulation support systems.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">INTRODUCTION</head><p>In recent times, Wireless Sensor Networks (WSNs) has enjoyed considerable use in civilian applications for precision farming <ref type="bibr">[17]</ref> and the provision of smart and quality healthcare. In the military, WSNs are used to monitor rebel activities and to detect enemy movements etc. It consists of large number of communicating devices which are randomly deployed in unreachable territories without an engineered or predetermined position for the nodes <ref type="bibr" target="#b8">[9]</ref>, <ref type="bibr">[14]</ref>. These territories are basically unfriendly and unguarded.</p><p>The sensor nodes are distributed in a sensor field where they are wirelessly connected to the sink. Although they have minimal battery capacity they are able to monitor and collect data about a given area. The data and information can be territorial parameters like pressure, position/condition of objects/humans, humidity, temperature etc. The collected data and information are sent back to the local sink through transmission between neighboring nodes. This transmission is basically done in a "multihop infrastructureless" manner. Subsequently, analyses are performed on the collated data accessed by a remote user through the internet for suitable decision making.</p><p>The constrained nature of sensor resources that gives rise to frail protective potential makes them suitable prey for self-replicating malevolent codes (such as worms) that spread without human involvement. In addition, these worms often tamper with the confidentiality, integrity and availability measures of neighboring sensor nodes due to its distributed nature.</p><p>With the proliferation of the use of network technologies, increasing efforts have been focused on developing appropriate cyber protection structure in order to secure both stationary and moving information. Wireless Sensor Network research believes that achieving this objective is overly expedient. As a result, several continuous (and discrete) equation-based models that characterize, investigate and aid better comprehension of the behavioral tendencies of worm variants have been developed. Predictions of worm behavior are largely dependent on the presuppositions of the model characterization and analysis.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">RELATED WORKS</head><p>It is unarguably true that propagation of malicious agents in cyberspace is similar to the spread of epidemic in the biological world. Therefore, modeling and analysis enhance optimized containment by providing better understanding of the factors that aid faster propagation of malicious codes in networks. The Susceptible-Infectious-Recovered (SIR) model by <ref type="bibr" target="#b4">[5]</ref>, <ref type="bibr" target="#b3">[4]</ref> and <ref type="bibr" target="#b5">[6]</ref> initiated the journey into developing mathematical models for worm/virus propagation. Building on the SIR model, other extensions such as Susceptible-Exposed-Infectious-Recovered (SIER) <ref type="bibr" target="#b13">[13]</ref>, <ref type="bibr" target="#b12">[12]</ref>, Susceptible-Exposed-Infectious-Vaccinated (SIEV) <ref type="bibr" target="#b10">[11]</ref>, Susceptible-Exposed-Infectious-Recovered-Vaccinated (SEIR-V) <ref type="bibr" target="#b8">[9]</ref> etc., were developed to address several concerns arising in a real world network environment.</p><p>In this paper we modify the Susceptible-Exposed-Infectious-Recovered-Susceptible with a Vaccination compartment (SEIRS-V) epidemic model of <ref type="bibr" target="#b8">[9]</ref> by applying <ref type="bibr" target="#b15">[15]</ref> expression for uniform random distribution of sensor nodes with the aim of investigating the effect of both distribution density (σ) and transmission range ( ) on the characterized compartments. We discovered that though <ref type="bibr" target="#b15">[15]</ref> represented distribution density and transmission range their SIR model did not include analyses for the Exposed and the Vaccinated compartments. On the other hand, though <ref type="bibr" target="#b8">[9]</ref> included these two compartments their analyses did not involve distribution density and transmission range. Wang and Yang <ref type="bibr" target="#b16">[16]</ref> also applied Tang and Mark's formulation but their model used the Susceptible-Infectious (SI) compartments for their analyses; and didn't discuss the Exposed and Vaccinated compartments. Considering the argument by <ref type="bibr" target="#b2">[3]</ref> that standard incidence "presents a more reasonable and practical scenario of contact than the simple mass action incidence", we would modify the above model using the former.</p><p>In epidemiology, the Exposed class contains nodes that are infected but not infectious. These nodes which are in a latent phase possess different infectivity rate when compared to the Infectious nodes. Common symptom for nodes in this latent stage is slow data transmission speed <ref type="bibr" target="#b8">[9]</ref>. On the hand, vaccination (or immunization) is a known countermeasure in epidemiology. It is aimed at fortifying a fraction of the total sensor node population prior to the outset of an epidemic. This study is necessary since there is a strong likelihood that sensor nodes can exist in the latent stage and that network managers can employ vaccination strategies to ensure security. In addition, the analyses of distribution density and transmission range using worm models can positively impact sensor deployment activities for institutions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">METHODOLOGY</head><p>In this study, we basically perform modeling and simulation. Specifically, we employ a widely applied method for investigating network epidemic <ref type="bibr" target="#b9">[10]</ref>, <ref type="bibr" target="#b8">[9]</ref> and <ref type="bibr" target="#b10">[11]</ref> etc. This method is called modeling and analysis of dynamical systems. Here, the WSN is treated like a dynamical system and equilibrium positions are studied. The methodology starts with; a. model formulation (and optionally drawing the schematic diagram); b. finding the equilibrium states (for the worm-free and the endemic states); and c. deriving the Reproduction number. Subsequent stages include; d. proof of stability and e. simulations experiments using software such as MatLab, Maple etc.</p><p>During model formulation, the analyst presents the equations that represent a real world phenomenon (in this case worm propagation in WSNs). Some authors also present a conceptual (or schematic) diagram at this point. Next, the analyst will derive the equilibrium points by equating the model (or system of differential equation) to zero. The Reproduction number is then derived to establish a threshold for disease/infection extinction in the network. Furthermore, stability analyses (using several renowned methods in literature) and simulation experiments are performed. The simulations experiments are more like sensitivity analyses. They are done by first solving the proposed model using a numerical method and applying real values for the simulation. Depending on the modeler's intention the method can take different turns for analyses. But stages such as model formulation and simulation experiments are significantly part of this methodology.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">The Modified SEIRS-V Model</head><p>We characterize worm attack in wireless sensor network using the Susceptible-Exposed-Infectious-Recovered-Susceptible with a Vaccination compartment (SEIRS-V). Our assumptions include addition of nodes in the network and removal (i.e. death) of nodes as a result of worm attack or due to hardware/software failure. All sensor nodes are susceptible to potential of worm attack and with time (probably) get infected (i.e. forming nodes in the Infectious compartment). Some sensor nodes before becoming infectious exists in the Exposed stage where the worm is latent and the nodes cannot transmit the infection. A symptom of this stage is slower data transmission for affected nodes. However, due to the existence of several worm variants in cyberspace the sensor nodes never acquire a permanent immunity i.e. they become susceptible to worm infection with time. The total population N (t) represents the nodes in the Wireless Sensor Network which is subdivided into Susceptible, Exposed (latent), Infectious (contagious), Recovered (temporarily immune), Vaccinated (immunized) denoted by S( t), E(t), I(t), R(t) and V(t). This implies that S (t) + E (t) + I (t) + R (t) + V (t) = N (t). Specifically, the sensor nodes are uniformly and randomly deployed with a distribution density of σ and a transmission range of , this implies that the effective contact with an infected node for transfer of infection is in the order of . Other parameters include which is the inclusion rate of nodes into the sensor network population, is the Infectivity contact rate, is the mortality or the death rate of nodes due to hardware or software failure, is the crashing rate due to attack of malicious objects (in this case worm), is the rate at which exposed nodes become infectious, is the recovery rate, is the rate at which recovered nodes become susceptible to infection, is the rate of vaccination for susceptible sensor nodes and is the rate of transmission from the Vaccinated compartment to the Susceptible compartment.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 1. Schematic diagram for the flow of worms in sensor network</head><p>The schematic diagram for the dynamical transmission of worms in a Wireless Sensor Network given our assumption is depicted in Fig. <ref type="figure">1</ref>. The system of differential equation ( <ref type="formula" target="#formula_0">1</ref>) is adapted from <ref type="bibr" target="#b8">[9]</ref> but modified to capture distribution density and transmission range.</p><p>The modified SEIRS-V model is represented using the following system of differential equations;</p><formula xml:id="formula_0">( ) ( )<label>(1) ( ) ( )</label></formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Solutions of Equilibrium Points</head><p>We equate the modified system of differential equations (1) to zero i.e.</p><p>; to obtain two solutions which are the Worm-free equilibrium and the Endemic equilibrium points. The Worm-free equilibrium describes the absence of worms while the Endemic equilibrium describes the presence of worms in the Wireless Sensor Network using formulated mathematical model. The solutions of equilibrium points are Worm-free equilibrium</p><formula xml:id="formula_1">( ) i.e. (<label>)</label></formula><formula xml:id="formula_2">( )<label>(2)</label></formula><p>( )</p><p>and Endemic equilibrium = ( , , , , ) i.e.</p><formula xml:id="formula_3">( )( ) = ( )( )( ( )( )( ) ( ) ) ( ) ( ) ( )( ) ( )( ( )( )( ) ( ) ) ( ) ( ) ( )( )<label>(3)</label></formula><formula xml:id="formula_4">( ( )( )( ) ( ) ) ( ) ( ) ( )( ) ( )( ) ( )</formula><p>A cursory look at the symbolic solutions of the endemic equilibrium in <ref type="bibr" target="#b8">[9]</ref> shows the differences. It is observed here that the expression for uniform distribution deployment formed part of the solutions; this is absent in the solutions of <ref type="bibr" target="#b8">[9]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">The Basic Reproduction Number</head><p>The Reproduction number commonly denoted as is a threshold quantity defined as "the expected number of secondary cases produced in a completely susceptible population, by a typical infective individual" <ref type="bibr" target="#b0">[1]</ref> or the spectral radius which can also be referred to as the "dominant eigenvalue of the matrix G = FV -1 " [2], <ref type="bibr" target="#b8">[9]</ref>. Some authors also refer to it as the inverse of the susceptible ( ) at the endemic equilibrium <ref type="bibr" target="#b9">[10]</ref>. The</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Reproduction number (</head><p>) is</p><formula xml:id="formula_5">( )( ) .<label>(4)</label></formula><p>In this study, the Reproduction number is different from what was obtained in <ref type="bibr" target="#b15">[15]</ref> and <ref type="bibr" target="#b8">[9]</ref> . Our Reproduction number can be used to determine the possible contained/endemic dynamics of worm propagation in WSNs considering distribution density and transmission range.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4">Stability of the Worm-free Equilibrium point</head><p>We show the proof of local asymptotic stability at the Wormfree Equilibrium using the jacobian method. This is done by showing that "the eigen-values of the jacobian matrix all have negative real parts" <ref type="bibr" target="#b8">[9]</ref> or that the "characteristic equation of the jacobian matrix" derived from the system of equations has negative roots <ref type="bibr" target="#b7">[8]</ref>.</p><p>Theorem: The worm-free equilibrium is locally asymptotically stable if &lt; 1 and unstable if &gt; 1.</p><p>Proof: Using -the characteristic equation of system (1) at worm-free equilibrium is Therefore the worm free equilibrium is locally asymptotically stable.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">NUMERICAL RESULTS AND DISCUSSION</head><p>We solved the system of differential equation using a numerical method i.e. Runge-Kutta Fehlberg method of order 4 and 5. Subsequently we performed simulation experiments using this following initial values for the Wireless Sensor network: S=100; E=3; I=1; R=0; V=0. Other values used for the simulation include =0.33; =0.003; =0.07; =0.25 =0.4; =0.3; =0.3 =0.06; adapted from the time history of <ref type="bibr" target="#b8">[9]</ref>. We compared our results with the results of similar models in literature for the purposes of verification and validation.</p><p>Figure <ref type="figure">2</ref> shows the time history of the compartments used for the analyses. Note that the transient response of Figure <ref type="figure">2</ref> simulated with values for distribution density and transmission range differs from the time history of <ref type="bibr" target="#b8">[9]</ref>. For the sake of clarity and ambiguity reduction we prepared the simulation experiment of Figure <ref type="figure">2</ref> using the same colors used in Figure <ref type="figure">3</ref>. It is evident that our model showed increase in both the Exposed and Infected compartments and a reduction in both the Susceptible and Vaccinated compartments. Figure <ref type="figure" target="#fig_2">4</ref> shows the dynamical behavior of the Exposed compartment with respect to changes in the distribution density and transmission range. At 0.5 and 2.0 for density and range respectively depicted with red, there was still an increase in the number of Exposed sensor nodes even though the range was kept constant (like in first response depicted with green). The effect of both density and range was again evident in the third response (0.7 and 2.5 for density and range respectively) depicted with blue when compared with the first response where 0.3 and 2.0 for density and range respectively. Figure <ref type="figure" target="#fig_4">5</ref> shows the dynamical behavior of the Infectious compartment with respect to changes in the distribution density and transmission range. At 0.5 and 2.0 for density and range respectively depicted with red, there was still an increase in the number of Infectious sensor nodes even though the range was kept constant (like in the first response depicted with green). The effect of both density and range was again evident in the third response (i.e. 0.7 and 2.5 for density and range respectively) depicted with blue when compared with the first response where 0.3 and 2.0 for density and range respectively.    </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">CONCLUSION AND FUTURE DIRECTION</head><p>In this study, we discovered that the increase in density and transmission range increased the Exposed and Infectious compartments and decreased and Vaccinated compartments. This study is consistent with <ref type="bibr" target="#b15">[15]</ref> and <ref type="bibr" target="#b16">[16]</ref> that employed similar expression for uniform random distribution i.e. the increase in the number of Infectious sensor nodes with the increase in both the node density and communication range.</p><p>Due to the effect of uniform random distribution on Vaccinated sensor nodes, it is only wise that the rate at which nodes are immunized is increased as density and range increase in order to reduce high susceptibility to infection. In future we would focus our analyses on how to achieve increased vaccination rate for vulnerable sensor nodes (to ensure reduced susceptibility to infection) in the light of increased density and increased communication/transmission range.</p><p>Furthermore, we would also perform analysis and simulation experiments to observe the effect of uniform random distribution on Quarantine models. In addition, pursuit of other mathematical objectives such as extending analyses to the global stability at the endemic equilibrium using the geometrical approach of <ref type="bibr" target="#b6">[7]</ref> etc. can ensue; since the symbolic solutions at the endemic equilibrium have been provided by this study. To creatively protect the interchange of data and information the generalized form of the analytical model (that characterizes other worm variants) will be integrated into the cyberspace defense structure of organization(s) that use Wireless Sensor Networks for monitoring rebel activities, detecting enemy movements, and providing smart healthcare etc.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>6.</head></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>the characteristic equation all have negative real parts i.e. -</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 .Figure 3 .</head><label>23</label><figDesc>Figure 2. Dynamical behaviour of the system for different compartments of the modified model</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 4 .</head><label>4</label><figDesc>Figure 4. Dynamical behaviour of Exposed Compartment versus Time w.r.t. to σ and</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head></head><label></label><figDesc>density = 0.3, range =2 density = 0.5, range =2 density = 0.7, range =2.5</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 .</head><label>5</label><figDesc>Figure 5. Dynamical behaviour of Infectious Compartment versus Time w.r.t. to σ and Figure 6 shows the dynamical behavior of the Infectious compartment plotted against the Exposed compartment with respect to changes in the distribution density and transmission range. This figure showed how both the Exposed and Infectious compartments increased with increase in density and transmission range. The increase was observed when density was kept constant (at 0.5) and when range was kept constant (at 0.2). The difference between the Exposed and Infectious sensor nodes is in line with the real world because even though both have contacted the infection, only the Infectious sensor nodes can transmit the infection to susceptible nodes.</figDesc><graphic coords="5,348.00,236.29,185.95,112.85" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 6 .</head><label>6</label><figDesc>Figure 6. Dynamical behaviour of Infectious Compartment versus Exposed Compartment w.r.t. to σ and Figure7shows the dynamical behavior of the Susceptible compartment plotted against the Vaccinated compartment with respect to changes in the distribution density and transmission range. This figure showed a decrease in both the Susceptible and the Vaccinated compartments. The decrease was observed when density was kept constant (at 0.5) and when range was kept constant (at 0.2); this is clearly visible when compared to Figure7a.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 7 .</head><label>7</label><figDesc>Figure 7. Dynamical behaviour of Susceptible Compartment versus Vaccinated Compartment w.r.t. to σ and</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 8 .</head><label>8</label><figDesc>Figure 8. Dynamical behaviour of Infectious Compartment versus Exposed Compartment w.r.t. to σ=0.3 and =1</figDesc></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_0">CoRI'16, Sept 7-9, 2016, Ibadan, Nigeria.</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">On the definition and the computation of the basic reproduction ratio R0 in models for infectious diseases in heterogeneous populations</title>
		<author>
			<persName><forename type="first">O</forename><surname>Diekmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Heesterbeek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Metz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename></persName>
		</author>
		<idno type="DOI">10.1007/BF00178324</idno>
		<ptr target="http://doi.org/10.1007/BF00178324" />
	</analytic>
	<monogr>
		<title level="j">Journal of Mathematical Biology</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="365" to="382" />
			<date type="published" when="1990">1990</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">V D</forename><surname>Driessche</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Watmough</surname></persName>
		</author>
		<idno type="DOI">10.1016/S0025-5564(02)00108-6</idno>
		<ptr target="http://doi.org/10.1016/S0025-5564(02)00108-6" />
	</analytic>
	<monogr>
		<title level="j">Mathematical Biosciences</title>
		<imprint>
			<biblScope unit="volume">180</biblScope>
			<biblScope unit="page" from="29" to="48" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Effects of quarantine in six endemic models for infectious diseases</title>
		<author>
			<persName><forename type="first">H</forename><surname>Hethcote</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zhien</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Shengbing</surname></persName>
		</author>
		<idno type="DOI">10.1016/S0025-5564(02)00111-6</idno>
		<ptr target="http://doi.org/10.1016/S0025-5564(02)00111-6" />
	</analytic>
	<monogr>
		<title level="j">Mathematical Biosciences</title>
		<imprint>
			<biblScope unit="volume">180</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="141" to="160" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Contributions to the mathematical theory of epidemics. ii. the problem of endemicity</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">O</forename><surname>Kermack</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">G</forename><surname>Mckendrick</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Proceedings of the Royal Society of London. Series A</title>
		<imprint>
			<biblScope unit="volume">138</biblScope>
			<biblScope unit="page" from="55" to="83" />
			<date type="published" when="1932">1932</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A contribution to the mathematical theory of epidemics</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">O</forename><surname>Kermack</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">G</forename><surname>Mckendrick</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Royal Society of London A: mathematical, physical and engineering sciences</title>
				<meeting>the Royal Society of London A: mathematical, physical and engineering sciences</meeting>
		<imprint>
			<publisher>The Royal Society</publisher>
			<date type="published" when="1927">1927</date>
			<biblScope unit="page" from="700" to="721" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Contributions to the mathematical theory of epidemics. III. Further studies of the problem of endemicity</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">O</forename><surname>Kermack</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">G</forename><surname>Mckendrick</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character</title>
		<imprint>
			<biblScope unit="volume">141</biblScope>
			<biblScope unit="page" from="94" to="122" />
			<date type="published" when="1933">1933</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">A Geometric Approach to Global-Stability Problems</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">Y</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">S</forename><surname>Muldowney</surname></persName>
		</author>
		<idno type="DOI">10.1137/S0036141094266449</idno>
		<ptr target="http://doi.org/10.1137/S0036141094266449" />
	</analytic>
	<monogr>
		<title level="j">SIAM Journal on Mathematical Analysis</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="page" from="1070" to="1083" />
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Global Stability of Worms in Computer Network Bimal Kumar Mishra Aditya Kumar</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">K</forename><surname>Mishra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><surname>Singh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Applications and Applied Mathematics An International Journal</title>
		<imprint>
			<biblScope unit="volume">05</biblScope>
			<biblScope unit="page" from="1511" to="1528" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Mathematical model on the transmission of worms in wireless sensor network</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">K</forename><surname>Mishra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Keshri</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.apm.2012.09.025</idno>
		<ptr target="http://doi.org/10.1016/j.apm.2012.09.025" />
	</analytic>
	<monogr>
		<title level="j">Applied Mathematical Modelling</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="4103" to="4111" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Dynamic model of worms with vertical transmission in computer network</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">K</forename><surname>Mishra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">K</forename><surname>Pandey</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.amc.2011.03.041</idno>
		<ptr target="http://doi.org/10.1016/j.amc.2011.03.041" />
	</analytic>
	<monogr>
		<title level="j">Applied Mathematics and Computation</title>
		<imprint>
			<biblScope unit="volume">217</biblScope>
			<biblScope unit="page" from="8438" to="8446" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Dynamic model of worm propagation in computer network</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">K</forename><surname>Mishra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">K</forename><surname>Pandey</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Applied Mathematical Modelling</title>
		<imprint>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="page" from="2173" to="2179" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title/>
		<idno type="DOI">10.1016/j.apm.2013.10.046</idno>
		<ptr target="http://doi.org/http://dx.doi.org/10.1016/j.apm.2013.10.046" />
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">SEIRS epidemic model with delay for transmission of malicious objects in computer network</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">K</forename><surname>Mishra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">K</forename><surname>Saini</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.amc.2006.11.012</idno>
		<ptr target="http://doi.org/10.1016/j.amc.2006.11.012" />
	</analytic>
	<monogr>
		<title level="j">Applied Mathematics and Computation</title>
		<imprint>
			<biblScope unit="volume">188</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="1476" to="1482" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Mathematical models on computer viruses</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">K</forename><surname>Mishra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">K</forename><surname>Saini</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.amc.2006.09.062</idno>
		<ptr target="http://doi.org/10.1016/j.amc.2006.09.062" />
	</analytic>
	<monogr>
		<title level="j">Applied Mathematics and Computation</title>
		<imprint>
			<biblScope unit="volume">187</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="929" to="936" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Defending against Malicious Threats in Wireless Sensor Network: A Mathematical Model</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">K</forename><surname>Mishra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Tyagi</surname></persName>
		</author>
		<idno type="DOI">10.5815/ijitcs.2014.03.02</idno>
		<ptr target="http://doi.org/10.5815/ijitcs.2014.03.02" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Information Technology and Computer Science</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="12" to="19" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Analysis of virus spread in wireless sensor networks: An epidemic model</title>
		<author>
			<persName><forename type="first">S</forename><surname>Tang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">L</forename><surname>Mark</surname></persName>
		</author>
		<idno type="DOI">10.1109/DRCN.2009.5340022</idno>
		<ptr target="http://doi.org/10.1109/DRCN.2009.5340022" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2009 7th International Workshop on the Design of Reliable Communication Networks</title>
				<meeting>the 2009 7th International Workshop on the Design of Reliable Communication Networks<address><addrLine>DRCN</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2009">2009. 2009</date>
			<biblScope unit="page" from="86" to="91" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Virus spreading in wireless sensor networks with a medium access control mechanism</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Yang</surname></persName>
		</author>
		<idno type="DOI">10.1088/1674-1056/22/4/040206</idno>
		<ptr target="http://doi.org/10.1088/1674-1056/22/4/040206" />
	</analytic>
	<monogr>
		<title level="j">Chinese Physics B</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page">40206</biblScope>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
