Research Article

Vampire Attack Mitigation and Network Performance Improvement Using Probabilistic Fuzzy Chain Set with Authentication Routing Protocol and Hybrid Clustering-Based Optimization in Wireless Sensor Network

Algorithm 3

Authentication-based routing protocol.
 Vector<nsaddr.t>ARP:multi_shortest_path(nsaddr_t_sourfe_node,int packet.energy);
Bool exchange;
If (high ≥ low)}
While(time ≥ TIME_MAX&& listening (ACK = false){
If (exchange){
Int high, low, path.amount
Exchange = false
Path_amount
Multi_shortest_path(nsaddr.t source_node, int packet_energy)
High = path_amount, low = 1
Count(int timer); exchange = true
Send(route[high--]source_node)
}
}
Else
{
Path_amount
Send(route[low++] source_node)
Exchange = true
}
}
Else{
Int packet_energy)
High = path_amount;low = 1
Multi_shortest_path(nsaddr_t souce_node
exchange = true
}
}
Return
}