References
- Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.
- Azad, P., & Sharma, V. (2015). Pareto-optimal clusters scheme using data aggregation for wireless sensor networks. International Journal of Electronics, 102(7), 1165–1176.
- Byun, H., & So, J. (2016). Node scheduling control inspired by epidemic theory for data dissemination in wireless sensor-actuator networks with delay constraints. IEEE Transactions on Wireless Communications, 15(3), 1794–1807.
- De, P., Liu, Y., & Das, S. K. (2009a). An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks. IEEE Transactions on Mobile Computing, 8(3), 413–425.
- De, P., Liu, Y., & Das, S. K. (2009b). Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory. ACM Transactions on Sensor Networks, 5(3), 1–33.
- Del, R., A, M., & Peinado, A. (2018). Mathematical models for malware propagation in wireless sensor networks: An analysis. In K. Daimi (Eds.), Computer and network security essentials (pp. 299–313). Cham: Springer.
- Driessche, P. V., & Watermouch, J. (2002). Reproduction number and sub-threshold endemic equilibrium for compartmental models of disease transmission. Mathematical Biosciences, 110, 29–48.
- Feng, L., Song, L., Zhao, Q., & Wang, H. (2015). Modeling and stability analysis of worm propagation in wireless sensor network. Mathematical Problems in Engineering, 2015, 1–8.
- Haghighi, M. S., Wen, S., Xiang, Y., Quinn, B., & Zhou, W. (2016). On the race of worms and patches: Modeling the spread of information in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(12), 2854–2865.
- Han, G., Liu, L., Jiang, J., Shu, L., & Hancke, G. (2017). Analysis of energy-efficient connected target coverage algorithms for industrial wireless sensor networks. IEEE Transactions on Industrial Informatics, 13(1), 135–143.
- Hu, F., Li, S., Xue, T., & Li, G. (2012). Design and analysis of low-power body area networks based on biomedical signals. International Journal of Electronics, 99(6), 811–822.
- Kumar, V., Dhok, B. S., Tripathi, R., & Tiwari, S. (2016). Cluster size optimization with tunable elfes sensing model for single and multi-hop wireless sensor networks. International Journal of Electronics, 104(2), 312–327.
- LaSalle, J. (1976). The stability of dynamical systems. In CBMS-NSF regional conference series in applied mathematics (pp. 96–106). doi:10.1137/1.9781611970432
- Lopez, M., Peinado, A., & Ortiz, A. (2017). A SEIS model for propagation of random jamming attacks in wireless sensor networks. In International Joint Conference SOCO16-CISIS16-ICEUTE16 advances in intelligent systems and computing (pp. 668–677). Len, Spain. doi:10.1007/978-3-319-47364-2_65
- Mishra, B. K., & Keshri, N. (2013). Mathematical model on the transmission of worms in wireless sensor network. Applied Mathematical Modelling, 37(6), 4103–4111.
- Ojha, R. P., Sanyal, G., & Srivastava, P. K. (2018). Pre-vaccination and quarantine approach for defense against worms propagation of malicious objects in wireless sensor networks. International Journal of Information System Modeling and Design (IJISMD), 9(1), 1–20.
- Ojha, R. P., Sanyal, G., Srivastava, P. K., & Sharma, K. (2017). Design and analysis of modifed SIQRS model for performance study of wireless sensor network. Scalable Computing: Practice and Experience, 18(3), 229–241.
- Shen, S., Huang, L., Liu, J., Champion, A. C., Yu, S., & Cao, Q. (2016). Reliability evaluation for clustered WSNs under malware propagation. Sensors, 16(6), 855.
- Shen, S., Li, H., Han, R., Vasilakos, A. V., Wang, Y., & Cao, Q. (2014). Differential game-based strategies for preventing malware propagation in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 9(11), 1962–1973.
- Singh, A. K., Purohit, N., & Varma, S. (2012). Fuzzy logic based clustering in wireless sensor networks: A survey. International Journal of Electronics, 100(1), 126–141.
- Tang, S. (2011). A modified SI epidemic model for combating virus spread in wireless sensor networks. International Journal of Wireless Information Networks, 18, 319–326.
- Tang, S., & Li, W. (2011). An epidemic model with adaptive virus spread control for wireless sensor networks. International Journal of Security and Networks, 6(4), 201–210.
- Tang, S., & Mark, B. L. (2009, November). Analysis of virus spread in wireless sensor networks: An epidemic model. In Proceedings of the 2009 7th international workshop on the design of reliable communication networks, DRCN 2009 (pp. 86–91). Washington, DC, USA. doi:10.1109/DRCN.2009.5340022
- Tang, S., Myers, D., & Yuan, J. (2013). Modified SIS epidemic model for analysis of virus spread in wireless sensor networks. International Journal of Wireless and Mobile Computing, 6(2), 99–108.
- Upadhyay, R. K., & Kumari, S. (2017). Bifurcation analysis of an e-epidemic model in wireless sensor network. International Journal of Computer Mathematics, 95(9), 1775–1805.
- Verma, V. K., Singh, S., & Pathak, N. (2016). Impact of malicious servers over trust and reputation models in wireless sensor networks. International Journal of Electronics, 103(4), 530–540.
- Wang, T., Wu, Q., Wen, S., Cai, Y., Tian, H., Chen, Y., & Wang, B. (2017). Propagation modeling and defending of a mobile sensor worm in wireless sensor and actuator networks. Sensors, 17(1), 139.
- Wang, X., Li, Q., & Li, Y. (2010). EiSIRS: A formal model to analyze the dynamics of worm propagation in wireless sensor networks. Journal of Combinatorial Optimization, 20(1), 47–62.
- Wang, X. M., & Li, Y. S. (2009). An improved SIR model for analyzing the dynamics of worm propagation in wireless sensor networks. Chinese Journal of Electronics, 18(1), 8–12.
- Wang, Y., Wen, S., Xiang, Y., & Zhou, W. (2014). Modeling the propagation of worms in networks: A survey. IEEE Communications Surveys & Tutorials, 16(2), 942–960.
- Wang, Y. Q., & Yang, X. Y. (2013). Virus spreading in wireless sensor networks with a medium access control mechanism. Chinese Physics B, 22(4), 040206.
- Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 51(12), 2292–2330.
- Zhang, S. K., Gong, S. R., & Cui, Z. M. (2009, January). Study on spreading of virus infection with sirs characteristic in wireless sensor network. In Proceeding of international conference on communication and mobile computing (Vol. 3, pp.512–517), Yunnan, China.