A Review Article on Wireless Sensor Networks in View of E-epidemic Models

Authors(2) :-MS Ojha, Prof. Manoj Kumar Srivastava

Epidemic simulations have recently been used to model the dynamics of malicious codesin the network of wireless sensors. This is because of its open existence, which offers asim-ple target for malware attacks aimed at disrupting network operations or, worse,causing complete network failure. The Susceptible-Exposed-Infectious-Quarantined-Recovered–Susceptible with Vaccination compartments models like SIR-M, SEIRV,SEIQRV, SEIRS, SITR, SIR with delay are studied by various authors and some of suchmodels that char-acterize worm dynamics in WSN. After a concise presentation of thewireless sensor net-work, some primary research consequences of e-pandemic models (of various researchers) are given and assessed. At that point the uses of wireless sensornetwork in the clinical wellbeing, agribusiness, and military, space and marineinvestigation are laid out. What’s more, we break down the upside of wireless sensornetwork in these sectors. In this review article, we sum up the fundamental factors thatinfluence the uses of wireless sensor net-works in view of e-epidemic models and revivedsome epidemic models and also discussed some conceivable future works of different epidemic wireless sensor models.

Authors and Affiliations

MS Ojha
Assistant Professor, Govt. P.G. College Prayagraj, U.P., India
Prof. Manoj Kumar Srivastava
T.D.P.G. College, Jaunpur, U.P. , India

Wireless sensor networks, Nodes, Susceptible, Infected, Recovered epidemic

  1. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., &Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.
  2. Hu, F., Li, S., Xue, T., & Li, G. (2011). Design and analysis of low-power body area networks based onbiomedical signals. International Journal of Electronics, 99(6), 811–822.
  3. Yick, J., Mukherjee, B., &Ghosal, D. (2008). Wireless sensor network survey. Computer Networks,51(12), 2292–2330.
  4. Azad, P., & Sharma, V. (2015). Pareto-optimal clusters scheme using data aggregation for wirelesssensor networks. International Journal of Electronics., 102(7), 1165–1176.
  5. Verma, V. K., Singh, S., &Pathak, N. (2016). Impact of malicious servers over trust and reputationmodels in wireless sensor networks. International Journal of Electronics, 103(3), 530–540.
  6. Haghighi, M. S., Wen, S., Xiang, Y., Quinn, B., & Zhou, W. (2016). On the race of worms and patches:Modeling the spread of information in wireless sensor networks. IEEE Transactions on InformationForensics and Security, 11(12), 2854–2865.
  7. Kumar, V., Dhok, B. S., Tripathi, R., &Tiwari, S. (2016). Cluster size optimization with TunableElfessensing model for single and multi-hop wireless sensor networks. International Journal of Electronics,104(2), 312–327.A Review Article on Wireless Sensor Networks in View of E-epidemic…
  8. Tang, S., & Mark, B. L. (2009). Analysis of virus spread in wireless sensor networks: An epidemicmodel. Proceedings of the 2009 7th International Workshop on the Design of Reliable CommunicationNetworks, DRCN 2009, 86–91. 2009, Washington, DC, USA.
  9. De, P., Liu, Y., & Das, S. K. (2009). An epidemic theoretic framework for vulnerability analysis ofbroadcast protocols in wireless sensor networks. IEEE Transactions on mobile Computing, 8(3),413–425.
  10. Feng, L., Song, L., Zhao, Q., & Wang, H. (2015). Modeling and stability analysis of worm propagationin wireless sensor network. Mathematical Problems in Engineering, 2015, 1–8.
  11. Mishra, B. K., &Keshri, N. (2013). Mathematical model on the transmission of worms in wirelesssensor network. Applied Mathematical Modelling, 37(6), 4103–4111.
  12. Ojha, R. P., Sanyal, G., &Srivastava, P. K. (2018). Pre-vaccination and quarantine approach fordefense against worms propagation of malicious objects in wireless sensor networks. InternationalJournal of Information System Modeling and Design (IJISMD), 9(1), 01–20.
  13. Wang, X. M., & Li, Y. S. (2009). An improved SIR model for analyzing the dynamics of worm propagationin wireless sensor networks. Chinese Journal of Electronics, 18(1), 8–12.
  14. Wang, Y., Wen, S., Xiang, Y., & Zhou, W. (2014). Modeling the propagation of worms in networks:A survey. IEEE Communications Surveys and Tutorials, 16(2), 942–960. https:// doi. org/ 10. 1109/ surv.2013. 100913. 00195.
  15. Dubey, B. (2007). A prey-predator model with a reserved area. Nonlinear Analysis Modelling andControl, 12(4), 479–494.
  16. Nwokoye, C. H., &Umeh, I. I. (2017). The SEIQR–V model: On a more accurate analytical characterizationof malicious threat defense. International Journal of Information Technology and ComputerScience, 9(12), 28–37.
  17. Singh, A., Awasthi, A. K., Singh, K., &Srivastava, P. K. (2018). Modeling and analysis of wormpropagation in wireless sensor networks. Wireless Personal Communications, 98(3), 2535–2551.
  18. Ojha, R. P., Srivastava, P. K., &Sanyal, G. (2019). Improving wireless sensor networks performancethrough epidemic model. International Journal of Electronics, 106(6), 862–879.
  19. Zhang, Z., Kundu, S., & Wei, R. (2019). A delayed epidemic model for propagation of maliciouscodes in wireless sensor network. Mathematics, 7(5), 396.
  20. Awasthi, S., Kumar, N., &Srivastava, P. K. (2020). A study of epidemic approach for worm propagationin wireless sensor network. In V. Solanki, M. Hoang, Z. Lu, & P. Pattnaik (Eds.), Intelligentcomputing in engineering. Advances in intelligent systems and computing (Vol. 1125, pp.315–326). Springer, Singapore. https:// doi. org/ 10. 1007/ 978- 981- 15- 2780-7_ 36.
  21. Shen, S., Huang, L., Liu, J., Champion, A. C., Yu, S., & Cao, Q. (2016). Reliability evaluationfor clustered WSNs under malware propagation. Sensors, 16(6), 855. https:// doi. org/ 10. 3390/ s16060855.
  22. Mishra, B. K., &Tyagi, I. (2014). Defending against malicious threats in wireless sensor network:A mathematical model. International Journal of Information Technology and Computer Science,6(3), 12–19.
  23. Upadhyay, R. K., &Kumari, S. (2018). Bifurcation analysis of an e-epidemic model in wirelesssensor network. International Journal of Computer Mathematics, 95(9), 1775–1805.
  24. Kumar, A., &Nilam. (2018). Stability of a time delayed SIR epidemic model along with nonlinearincidence rate and Holling type-II treatment rate. International Journal of Computational Methods,15(6), 1850055. https:// doi. org/ 10. 1142/ S0219 87621 85005 5X.
  25. MadhuSudanan, V., &Geetha, R. (2020). Dynamics of epidemic computer virus spreading modelwith delays. Wireless Personal Communications, 115(3), 2047–2061.
  26. Geetha, R., Madhusudanan, V., &Srinivas, M. N. (2021). Influence of clamor on the transmissionof worms in remote sensor network. Wireless Personal Communications. https:// doi. org/ 10. 1007/s11277- 020- 08024-4.

Publication Details

Published in : Volume 5 | Issue 3 | May-June 2022
Date of Publication : 2022-06-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 127-141
Manuscript Number : GISRRJ225319
Publisher : Technoscience Academy

ISSN : 2582-0095

Cite This Article :

MS Ojha, Prof. Manoj Kumar Srivastava , "A Review Article on Wireless Sensor Networks in View of E-epidemic Models ", Gyanshauryam, International Scientific Refereed Research Journal (GISRRJ), ISSN : 2582-0095, Volume 5, Issue 3, pp.127-141, May-June.2022
URL : https://gisrrj.com/GISRRJ225319

Article Preview