<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Method of Sensor Network Functioning under the Redistribution Condition of Requests between Nodes</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Nadiia Dovzhenko</string-name>
          <email>nadezhdadovzhenko@gmail.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Halyna Haidur</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Zoreslava Brzhevska</string-name>
          <email>z.brzhevska@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yevhen Ivanichenko</string-name>
          <email>y.ivanichenko@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olena Nesterova</string-name>
          <email>o.nesterova@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Dragomanov Ukrainian State University</institution>
          ,
          <addr-line>9 Pyrohova str., Kyiv, 01601</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>State University of Telecommunications</institution>
          ,
          <addr-line>7 Solomenska str., Kyiv, 03110</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>278</fpage>
      <lpage>283</lpage>
      <abstract>
        <p>The results of previous studies show that relaying a significant number of requests between sensor network nodes leads to a decrease in functional stability and an increase in the number of failures. In most cases, a sensor network is built with predefined and described functions. However, if it is necessary to scale a network segment, it is necessary to define conditions for the redistribution of requests between nodes to ensure security. As is known, the reconfiguration of an information transmission system between nodes and relaying of messages are based on the construction of optimal routes for the transmission of messages, as well as an introduction of efficiency criteria and minimizing loss of data arrays.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Sensor network</kwd>
        <kwd>functional stability</kwd>
        <kwd>query</kwd>
        <kwd>node</kwd>
        <kwd>attacks</kwd>
        <kwd>flooding</kwd>
        <kwd>method</kwd>
        <kwd>model</kwd>
        <kwd>reordering</kwd>
        <kwd>routing</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>When modeling sensor networks, it is
necessary to solve tasks of evaluating the
performance of communication nodes. The
requirements of network protocols often
determine a certain order of packet transmission,
which is preserved when requests pass from node
to node, from sensor to sensor [1].</p>
      <p>A situation often arises when requests received
by an intermediate node cannot be forwarded to
subsequent nodes due to unprocessed previous
packets. The creation of such situations can be
qualified as DoS (DDoS) attacks or flooding
threats [2–4].</p>
      <p>The paper considers an example of organizing
redistribution of requests in a communication
node with a total buffer memory capacity equal
to r.</p>
      <p>It is assumed that information transmission
lines have different bandwidths. Selection of
requests from the Buffer Memory (BM) for
transmission is carried out in order of their arrival
in the BM.</p>
      <p>Disruption of the order of requests at the output
of the sending node occurs due to different
bandwidths of lines and random lengths of packets
of requests [5]. The reordering delay is the length
of time required to restore the order of further
transmission, determined by sending node, at the
receiving node.</p>
      <p>A single streaming dual-channel mass service
system with shared capacity storage is used to
estimate packet ordering delay r.</p>
      <p>The query flow is assumed to be Poisson with
parameter λ, а duration of service requests on the
node is equal to  and has an exponential
distribution with parameter μi, i = 1,2.</p>
      <p>Without limitation of commonality, it is
expected that μ1 &gt; μ2 and it is also expected that
the first node is fast and the second one is slow. It
is also assumed that requests received by the
system go to the fast node. Requests are selected
from the queue in order of their arrival to the
system, that is, by the order determined by the
routing protocol of the sensor network. Requests
may be lost when the drive is full.</p>
      <p>Let τn is a moment of issuing a request with a
number n from the node.</p>
      <p>∆res,n= {τn−1 − τn,  τn−1 ≥ τn;</p>
      <p>0 in the oppositecase.</p>
      <p>Then a random variable ∆res,n specifies the
request redistribution delay n, associated with
waiting for a request to exit node n − 1.</p>
      <p>Requests that require reordering are
accumulated at the output of the node in the
socalled reorder buffer (Fig. 1) after serving a
request with a number less than the number of
requests waiting in the buffer (if any), the latter is
instantly emptied.</p>
      <p>Scientists have already obtained a
matrixgeometric solution for the stationary distribution
of queues taking into account the effect of
reordering, which allows the calculation of the
average number of applications in the reordering
buffer [6].</p>
      <p>It is assumed that the intervals between
requests and the duration of their service are
independent and have a phase-type distribution.</p>
      <p>At the same time, the rearrangement buffer is not
taken into account when describing the model. For
this, it is necessary to obtain the Laplace-Stiltjes
transformation.</p>
      <p>∆res,n n stationary node operation mode, when
n → ∞, and even an expression for initial times of
the rearrangement.</p>
      <p>At the same time, it is necessary to separately
calculate the recurrence relations for the factorial
moments of the number of requests in the
rearrangement buffer, which do not require
solving the original system of equilibrium
equations [7].</p>
      <p>This allows us to significantly reduce the
consumption of machine time and memory of
sensor nodes compared to the requirements. In
addition, the obtained relations relate factorial
moments of the number of unordered requests to
initial delays of reordering.
3. System of Equilibrium Equations</p>
      <p>We can say that a sensor network segment is in
an orderly state: if a request is served on a fast
node  , on slow—request  and  &lt;  in the
opposite case, that is, when  &gt;  —the network
segment is out of order.</p>
      <p>A sensor network segment is considered to be
in an ordered state if it has only one request served
on a fast node, and in an unordered state if a
request is served on a slow node [8].</p>
      <p>The stochastic behavior of a network segment
can be described by a homogeneous Markov
process X(t), t ≥ 0 over a multitude of states</p>
      <p>R
X = ⋃ Xk,</p>
      <p>k=0
where</p>
      <p>X0 = {(0)}, Xk = Xk1 ∪ Xk2, R ≥ k ≥ 1, R</p>
      <p>= r + 2,</p>
      <p>Xki = {(k, i, l), l ≥ 0}, i = 1,2.</p>
      <p>For some point in time t: X(t) = (0), if the
system is empty; X(t) = (k, i, l), if there are in the
system (in the drive and the nodes) k requests and
reordering in the buffer  requests, at the same
time, when  = 1, the system is disordered when
 = 2—ordered</p>
      <p>In the assumption that if 0 &lt; λ, μ1, μ2 &lt; ∞,
final probabilities exist, are strictly positive, do
not depend on the initial distribution, and coincide
with stationary probabilities.</p>
      <p>px = lim P{X(t) = x}, x ∈ X.</p>
      <p>t→∞</p>
      <p>Stationary probabilities of macrostates Xki, do
not take into account the state of the buffer, and
Xk, which also do not take into account the
orderliness of the system and determine only the
number of requests in it that can be marked pki
and pk accordingly.</p>
      <p>Stationary probabilities px, x ∈ X, is the only
solution of the system of equilibrium equations.</p>
      <p>
        λp0 = μ1p1 2 + μ2p1 1,
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
μpR,il = λpr+1,il, i = 1,2, l ≥ 0.
      </p>
      <p>With the condition of rationing</p>
      <p>p0 + p … . = 1.</p>
      <p>If μ = μ1 + μ2,</p>
      <p>1, x &gt; 0;
u(x) = {0, x ≤ 0.</p>
      <p>Stationary probabilities of macrostates.</p>
      <p>Summing up equations (2–4) for  = 0.1. .., the
result will be obtained:
(λ + μ3−i)p1 i = u(i − 1)λp0 + μip2, i</p>
      <p>
        = 1,2,
(λu(R − k) + μ)pk i = λpk−1,i, + (
        <xref ref-type="bibr" rid="ref4">7</xref>
        )
u(R − k)μipk+1, k = ̅2̅,̅R̅̅, i = 1,2.
      </p>
      <p>
        The system of equations (
        <xref ref-type="bibr" rid="ref4">6–7</xref>
        ) and (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) is a
(4)
(5)
(6)
system of equilibrium equations for a given
network segment without taking into account the
reordering buffer.
      </p>
      <p>At the same time, the probabilities
{p0, p1 1, p1 2, pk, k = ̅2̅̅,̅R̅ } determine the
stationary distribution of the number of requests
to sensor network segment M|M|2|r with devices
of various productivity μ1 and μ2, in which the
request received by the empty node goes to the
first device.</p>
      <p>
        The system of equilibrium equations for this
segment of the network is obtained with (
        <xref ref-type="bibr" rid="ref4">7</xref>
        )
summations of  = 1,2 and taking into account
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) and (6). Omitting the calculations, only the
final statements for the solution of this system of
equilibrium equations are given:
p0 = μ1λμ2(2λ(+2λμ+2)μ) p2, p1 1 =
      </p>
      <p>μ2(λ + μ)
p1 2 = λ(λ + μ2) p2,</p>
      <p>μ1 p2,
λ+μ2
pk = ρk−2 [μ1μ2(2λ + μ) + λμ(λ + μ2) +
λ2(λ + μ2)
1 − ρr+1 −1</p>
      <p>
        ]
1 − ρ
, k = ̅2̅,̅R̅̅,
(λ + μ3−i)p1 il = u(1 − l)[u(i − 1)λp0 + μip2,3−i] + u(l)μip2i,l−1,
i = 1,2, l ≥ 0,
(λ + μ)pkil = u(1 − l)μipk+1,3−i + u(l)μipk+1,i,l−1 + λpk−1,il,
k = ̅2̅,̅r̅̅+̅̅̅1̅̅, i = 1,2, l ≥ 0,
where ρ = μλ. At the distribution
{p0, p1 1, p1 2, pk, k = ̅2̅̅,̅R̅ } probability pki, k =
̅2̅,̅R̅̅, can be computed from the recurrence
relations which follow from (
        <xref ref-type="bibr" rid="ref4">7</xref>
        ) trivially.
      </p>
      <p>
        If you enter vectors pkT = (pk1, pk2), k = ̅1̅,̅R̅̅,
you can get explicit statements about them
presented in the matrix-geometric form. Indeed,
from (
        <xref ref-type="bibr" rid="ref4">7</xref>
        ) p k = ̅2̅,̅r̅̅+̅̅̅1̅̅, taking into account the
obvious ratio λpk = μpk+1 will be received:
(λ + μ)pk i − ρμpk = λpk−1,i, k = (
        <xref ref-type="bibr" rid="ref8">9</xref>
        )
      </p>
      <p>̅2̅,̅r̅̅+̅̅̅1̅̅, i = 1,2,</p>
      <p>
        Taking into account that pk = pk … the system
of equations (
        <xref ref-type="bibr" rid="ref8">9</xref>
        ) concerning the unknowns is
written pk1  pk2 in matrix form:
where B = (
      </p>
      <p>Bpk = λpk−1, k = ̅2̅,̅r̅̅+̅̅̅1̅̅,
λ + μ − ρμ1 −ρμ1
−ρμ2 λ + μ − ρμ2
).</p>
      <p>Reversed to B matrix B−1 looks like
B−1 =</p>
      <p>1
μ(λ+μ)
(
λ + μ − ρμ2
ρμ2</p>
      <p>
        ρμ1
λ + μ − ρμ1
).
(2)
(3)
(
        <xref ref-type="bibr" rid="ref6">8</xref>
        )
(11)
      </p>
      <p>
        If we now consider that W = λB−1, then with
(10) and (
        <xref ref-type="bibr" rid="ref4">7</xref>
        ) at k = R the following ratio is
obtained:
      </p>
      <p>Wk−1p1, k = ̅2̅,̅r̅̅+̅̅̅1̅̅,
pk = {</p>
      <p>
        ρWrp1, k = R.
where is a vector p1 is determined from formula (
        <xref ref-type="bibr" rid="ref6">8</xref>
        ).
4. Factorial Moments of the Number
of Unordered Queries
      </p>
      <p>
        If we return to equations (
        <xref ref-type="bibr" rid="ref1">1–5</xref>
        ), then the solution
of a system of equations is obtained in the
matrixgeometric form, and the matrix reduced to the power
has the order 2(r + 2), which leads to
computational difficulties at large values of the
parameter r.
      </p>
      <p>
        An approach is proposed below that allows you
to calculate the factorial moments of the number of
requests in the reordering buffer recursively, without
solving the original system of equations (
        <xref ref-type="bibr" rid="ref1">1–5</xref>
        ).
      </p>
      <p>The next step is to introduce a function that
produces:
∞
l=0
Fki(z) = ∑ pkilzl, k = ̅1̅,̅̅R̅, i = 1,2, |z| ≤ 1.</p>
      <p>
        Usually, it is not difficult to obtain a system of
equations for the generating function from (
        <xref ref-type="bibr" rid="ref1">1–4</xref>
        )
Fki(z):
(λ + μ3−i)F1 i(z) = μizF2 i(z) +
u(i − 1)λp0 + μip2,3−i, i = 1,2.
      </p>
      <p>It
should
be</p>
      <p>emphasized
υki0 = pki,k = ̅1̅,̅̅R̅, i = 1,2, and the

 =  … ,  ≥ 1, represent factorial moments of
the order of several requests that are in the
rearrangement buffer.</p>
      <p>Differentiating (12) and (13) by   times and
then considering  = 1, will be obtained:
(λu(R − k) + μ)Fki(z) = u(R − k)μi[zFk+1,i(z) + pk+1,,3−i]
+λFk−1,i(z), k = ̅2̅,̅R̅̅, i = 1,2.
υkiv =
dF(υ)ki(z)
dz
|
z=1
= ∑(l)υpkil, k = ̅1̅̅,̅R̅, i = 1,2, υ ≥ 0.</p>
      <p>l≥υ
that
values
 + −1</p>
      <p>=1
(13)
(14)
(15)
(16)
(17)
(λ + μ3−i)υ1ν = μi  2 i,ν−1 + μiυ2iν, i = 1,2,  ≥ 1,
(λu(R − k) + μ)υ ν = u(R − k)μi[ k+1,iν +  k+1,i,ν−1]
+λ k−1,iν, k = ̅2̅,̅R̅̅, i = 1,2,  ≥ 1.</p>
      <p>At fixed values,  = 1,2 та  = 1,2 … (14) and
degenerate matrix of coefficients.
(15) is a system of equations concerning the
unknowns υkiv, k = ̅1̅,̅R̅̅, i = 1,2 with a
non</p>
      <p>The solution of this system of equations is
determined by the following theorem.
 +1
∑ 
 =1</p>
      <p>Theorem 1. Size υkiv, k = ̅1̅,̅R̅̅, i = 1,2 is
determined by the following recurrence relations:
υ1iν = 
  +1, , −1 ∏   , = 1,2,</p>
      <p>=1
υkiν =      −1,

   + , , −1</p>
      <p>∏   , k = ̅2̅,̅R̅̅,  = 1,2,
+ 

1
  , = ,
 −
∑</p>
      <p>The validity of the theorem can easily be shown
by substituting ratios (16) of equations (14) and (15),
as a result of which these equations turn to identity.</p>
      <p>To
control the</p>
      <p>calculations according to
formulas (16) and (17), the following relations can
be useful, which result from equations (14) and
(15) by summing them  = 1,2 …  .</p>
      <p>, =
 3−
   [  , −1 −  1, , −1],  =</p>
      <p>= 1,2,  = 1,2,</p>
      <p>In particular, for  = 1 the following will be
obtained:
  ,1 =
∑ pki,  = 1,2.</p>
      <p>(19)

 
 3−  =2</p>
      <p>In conclusion, it is necessary to focus on the
connection of factorial moments of the request’s
number in the rearrangement buffer with the initial
moments of the rearrangement delay in stationary
mode.</p>
      <p>Let</p>
      <p>be the initial moment of order  of the
rearrangement time, taking into account state  ,
determining the orderliness of the node. For
(18)
analyzed network segment:
 
=
 !   
   
3−  =2
= 1,2, …
∑ pki,  = 1,2,  =
(20)
where</p>
      <p>=  (1 −   )—the
servicing flow of requests.
intensity
of</p>
      <p>Theorem
2.</p>
      <p>For
a
network
segment
 |</p>
      <p>| 2 |  taking into account the rearrangement,
the following ratios take place:
  )  1, , − ],  = 1,2,  = 1,2, …
With a sufficiently large load on the system,
It follows from Theorem 2 that when  = 1,
quite
understandable
from
physical
(18) and (20).
and  1 related by the ratio:
the average value of the reordering time and the
number of applications in the reordering buffer  1
   1 =  1.</p>
      <p>(22)</p>
      <p>It is worth noting that the ratio is an analog of
Little's well-known formula and has an obvious
physical interpretation.</p>
      <p>The
algorithm
for
calculating
the
characteristics of the analyzed network segment
was implemented [9].
the values of these indicators stabilize, which is
considerations [10].
Indicators  1 and  2 are the calculation of request
processing time on a fast node and a slow node.</p>
      <p>r
 1
 2 0,85
1
0,64
5
0,68
1,97
10
0,75
2,58
15
0,86
6,44
20
0,99
25
1,16
30
1,41</p>
      <p>As noted, the approach used in the work allows
us to calculate the factorial moments of the
number of requests in the reordering buffer more
efficiently from the point of view of resource
consumption. This conclusion confirms the results
shown in Table 1.</p>
      <p>60
40
20
0</p>
    </sec>
    <sec id="sec-2">
      <title>5. Conclusions</title>
      <p>A sensor network is built with predefined and
described functions. However, if it is necessary to
scale a network segment, it is necessary to define
conditions for the redistribution of requests between
nodes to ensure security.</p>
      <p>The
reconfiguration
of
an
information
transmission system between nodes and relaying of
messages is based on the construction of optimal
routes for the transmission of messages, as well as
an introduction of efficiency criteria and minimizing
the loss of data arrays.
1.5
0.5
1
0
2.5
1.5
2
1
0
0.5
0
1
2</p>
      <p>3
w_1
time  1 on requests in the reordering buffer</p>
      <p>In Figs. 2 and 3 the dependences of the average
rearrangement time are shown  1 and the mean
and standard deviation of the number of requests
at the value of the storage volume  = 10.
in the reorder buffer  1 and   from system load</p>
      <p>The calculations show that  the values of
 1,  1 and   also, increase.</p>
      <p>0
0.5
1
1.5
2.5
3
v1
σl
2
deviation of the number of requests in the
reorder buffer  1 and   from system load 
6. References</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bondarchuk</surname>
          </string-name>
          , et al.,
          <article-title>The Research of Problems of the Information Algorithm Functioning in the Presence of Preserved Nodes in Wireless Sensor Networks</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Cybersecur</surname>
          </string-name>
          .
          <source>Educ. Sci. Tech</source>
          .
          <volume>4</volume>
          (
          <issue>4</issue>
          ) (
          <year>2019</year>
          )
          <fpage>54</fpage>
          -
          <lpage>61</lpage>
          . doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2019</year>
          .
          <volume>4</volume>
          .5461
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sadykov</surname>
          </string-name>
          , et al.,
          <article-title>Technology of Location Hiding by Spoofing the Mobile Operator IP Address</article-title>
          ,
          <source>in: IEEE International Conference on Information and Telecommunication Technologies and Radio Electronics</source>
          (
          <year>2021</year>
          )
          <fpage>22</fpage>
          -
          <lpage>25</lpage>
          . doi:
          <volume>10</volume>
          .1109/UkrMiCo52950.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <year>2021</year>
          .9716700
          <string-name>
            <given-names>A.</given-names>
            <surname>Carlsson</surname>
          </string-name>
          , et al.,
          <article-title>Sustainability Research of the Secure Wireless Communication System with Channel Reservation</article-title>
          ,
          <source>in: IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering</source>
          (
          <year>2020</year>
          ). doi:
          <volume>10</volume>
          .1109/tcset49122.
          <year>2020</year>
          .235583
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          , et al.,
          <source>Bandwidth Research of Wireless IoT Switches, in: IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering</source>
          (
          <year>2020</year>
          ). doi:
          <volume>10</volume>
          .1109/tcset49122.
          <year>2020</year>
          .2354922
          <string-name>
            <given-names>N.</given-names>
            <surname>Dovzhenko</surname>
          </string-name>
          , et al.,
          <source>Research on the Method of Information Transfer in Wireless Sensor Networks Between Intelligent Sensor Sensors. Science and Education a New Dimension. Nat. Tech.</source>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          Sci.
          <volume>7</volume>
          (
          <issue>23</issue>
          )
          <fpage>193</fpage>
          (
          <year>2019</year>
          )
          <fpage>39</fpage>
          -
          <lpage>42</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>N.</given-names>
            <surname>Dovzhenko</surname>
          </string-name>
          ,
          <article-title>Analysis of Methods for Increasing Bandwidth Sensory Networks and Ways to Ensure the Reliability of Information</article-title>
          . Mod. Prot. Inf.
          <volume>3</volume>
          (
          <issue>35</issue>
          ) (
          <year>2018</year>
          )
          <fpage>58</fpage>
          -
          <lpage>63</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          Appls.
          <volume>8</volume>
          (
          <year>2018</year>
          )
          <fpage>11</fpage>
          -
          <lpage>18</lpage>
          . doi:
          <volume>10</volume>
          .5815/ijisa.
          <year>2018</year>
          .
          <volume>08</volume>
          .02
          <string-name>
            <given-names>N.</given-names>
            <surname>Dovzhenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Barabash</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Koval</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>VIKNU</surname>
          </string-name>
          ,
          <volume>58</volume>
          (
          <year>2017</year>
          )
          <fpage>74</fpage>
          -
          <lpage>80</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>K.</given-names>
            <surname>Priya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Larsen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Jagannathan</surname>
          </string-name>
          .
          <article-title>A New Data Aggregation Scheme Via Adaptive Compression for Wireless Sensor Networks</article-title>
          .
          <source>ACM Transs. Sens. Netws</source>
          .
          <volume>9</volume>
          (
          <issue>1</issue>
          ) (
          <year>2012</year>
          )
          <article-title>5</article-title>
          .
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .26. doi:
          <volume>10</volume>
          .1145/2379799.2379804 [10]
          <string-name>
            <given-names>N.</given-names>
            <surname>Dovzhenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kyrychok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Brzhevska</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <article-title>The Construction of the Data Routing System for Wireless Sensor Nework on the Basis of Flooding Concept (flooding)</article-title>
          .
          <source>Modern Information Secur</source>
          .
          <volume>4</volume>
          (
          <issue>36</issue>
          ) (
          <year>2018</year>
          )
          <fpage>17</fpage>
          -
          <lpage>21</lpage>
          . doi:
          <volume>10</volume>
          .31673/
          <fpage>2409</fpage>
          -
          <lpage>7292</lpage>
          .
          <year>2018</year>
          .041216
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>