Research Article

Vampire Attack Mitigation and Network Performance Improvement Using Probabilistic Fuzzy Chain Set with Authentication Routing Protocol and Hybrid Clustering-Based Optimization in Wireless Sensor Network

Algorithm 2

CF (cluster formation).
(1)Input
(2)Output (CH_list)
(3)For each node do
(4)If Head =  Head
(5)If . Type = “” && . . Type “Awake.”
(6)Evaluate less distance from non-CH to CHs
(7)If av_energy && . Neighbour Neighbour
(8). Type =  “.
(9)CH_list store
(10)Broadcast packet type 3
(11)Else Type = “.
(12)End for