Mathematical Problems in Engineering / 2022 / Article / Alg 3 / Research Article
Vampire Attack Mitigation and Network Performance Improvement Using Probabilistic Fuzzy Chain Set with Authentication Routing Protocol and Hybrid Clustering-Based Optimization in Wireless Sensor Network Algorithm 3 Authentication-based routing protocol.
Vector<nsaddr.t>ARP:multi_shortest_path(nsaddr_t_sourfe_node,int packet.energy); Bool exchange; If (high ≥ low)} While(time ≥ TIME_MAX&& listening (ACK = false){ If (exchange){ Int high, low, path.amount Exchange = false Path_amount Multi_shortest_path(nsaddr.t source_node, int packet_energy) High = path_amount, low = 1 Count(int timer); exchange = true Send(route[high--]source_node) } } Else { Path_amount Send(route[low++] source_node) Exchange = true } } Else{ Int packet_energy) High = path_amount;low = 1 Multi_shortest_path(nsaddr_t souce_node exchange = true } } Return }