Research Article

Vampire Attack Mitigation and Network Performance Improvement Using Probabilistic Fuzzy Chain Set with Authentication Routing Protocol and Hybrid Clustering-Based Optimization in Wireless Sensor Network

Algorithm 1

Cluster setup phase.
(1)Input
(2)Output
(3)For each node do
(4)Evaluate
(5)Nodes known their neighbours
(6)Broadcast packet type_1
(7)Evaluate number of neighbour nodes
(8)Every node evaluates delay time
(9)Evaluate average energy of neighbour nodes
(10)S . Type = “”.
(11)If  = close to 0
(12)CountCH = countCH + 1
(13). Type =  “.
(14)End
(15)While close to
(16)Broadcast packet type_2
(17)If
(18)End
(19). Type = “N.”
(20)While
(21)If
(22)If . Type =  “.
(23)If
(24) Type = 
(25)Else Type =  “.
(26)End While