Journals
Publish with us
Publishing partnerships
About us
Blog
Mathematical Problems in Engineering
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Mathematical Problems in Engineering
/
2022
/
Article
/
Alg 1
/
Research Article
Vampire Attack Mitigation and Network Performance Improvement Using Probabilistic Fuzzy Chain Set with Authentication Routing Protocol and Hybrid Clustering-Based Optimization in Wireless Sensor Network
Algorithm 1
Cluster setup phase.
(1)
Input
(2)
Output
(3)
For each node
do
(4)
Evaluate
(5)
Nodes known their neighbours
(6)
Broadcast packet type_1
(7)
Evaluate number of neighbour nodes
(8)
Every node evaluates delay time
(9)
Evaluate average energy of neighbour nodes
(10)
S
.
Type = “
”.
(11)
If
= close to 0
(12)
CountCH = countCH + 1
(13)
.
Type = “
.
”
(14)
End
(15)
While
close to
(16)
Broadcast packet type_2
(17)
If
(18)
End
(19)
.
Type = “N.”
(20)
While
(21)
If
(22)
If
.
Type = “
.
”
(23)
If
(24)
Type =
(25)
Else
Type = “
.
”
(26)
End While