Skip Navigation Links
Discontinuity, Nonlinearity, and Complexity

Dimitry Volchenkov (editor), Dumitru Baleanu (editor)

Dimitry Volchenkov(editor)

Mathematics & Statistics, Texas Tech University, 1108 Memorial Circle, Lubbock, TX 79409, USA

Email: dr.volchenkov@gmail.com

Dumitru Baleanu (editor)

Cankaya University, Ankara, Turkey; Institute of Space Sciences, Magurele-Bucharest, Romania

Email: dumitru.baleanu@gmail.com


Stability Analysis of E-epidemic SIT Model with Beddington-DeAngelis Functional Response for Wireless Sensor Network

Discontinuity, Nonlinearity, and Complexity 12(4) (2023) 737--756 | DOI:10.5890/DNC.2023.12.003

Kalyan Das$^1$, V. Madhusudanan$^2$, M. Humayun Kabir$^{3,4}$, M. Osman Gani$^{3,4}$

$^1$ Department of Basic and Applied Sciences, National Institute of Food Technology Entrepreneurship and

Management, HSIIDC Industrial Estate, Kundli-131028, Haryana, India

$^2$ Department of Mathematics, S. A. Engineering College, Chennai 600077, Tamil Nadu, India

$^3$ Mathematical and Computational Biology (MCB) Research Group, Department of Mathematics,

Jahangirnagar University, Dhaka 1342, Bangladesh

$^4$ Center for Mathematical Modeling and Applications (CMMA), Meiji University, Tokyo 164-8525, Japan

Download Full Text PDF

 

Abstract

Nowadays, a wireless sensor network (WSN) is an emerging and robust technology that can facilitate our everyday life. To investigate the assaulting conduct of worms in wireless sensor networks, we propose a Susceptible-Infected-Terminally-infected (SIT) model utilizing Holling type-II and Beddington-DeAngelis functional responses. The Positivity and boundedness of solutions of the model are analyzed to assure the feasibility of solutions. We determine the existence of possible equilibrium points under feasible conditions. With the aid of a characteristic equation, local stability analysis of all feasible equilibrium points is investigated. Global stability analysis of the steady states is also investigated under Lassalle's invariance principle and Bendixson-Dulac criteria. The global stability of the endemic equilibrium point is performed under a suitable Lyapunov function. Numerical simulations are performed to validate the analytical findings under suitable initial data. It is revealed that a Hopf bifurcation occurs where the endemic steady state of the system becomes unstable when the parameter $\omega_2$ is globally varied. Furthermore, a periodic time series and a period-doubling behavior are exposed in the system due to the instability of the endemic steady state in a parameter regime. Finally, the results are significantly beneficial to predict and control the spread of worms in a WSN.

References

  1. [1]  Rotariu, C. and Manta, V. (2012), Wireless system for remote monitoring of oxygen saturation and heart rate, 2012 Federated Conference on Computer Science and Information Systems (FedCSIS), IEEE, 193-196
  2. [2]  Tchuani Tchakonté, D., Simeu, E., and Tchuente, M. (2018), Lifetime optimization of wireless sensor networks with sleep mode energy consumption of sensor nodes, Wireless Networks, 26(1), 91-100 Springer
  3. [3]  Choi, K.W., Rosyady, P.A., Ginting, L., Aziz, A.A., Setiawan, D., and Kim, D.I. (2017), Theory and experiment for wireless-powered sensor networks: How to keep sensors alive, IEEE Transactions on Wireless Communications, 17(1), 430-444
  4. [4]  Tubaishat, M. and Madria, S. (2003), Sensor networks: an overview, IEEE potentials, 22(2), IEEE, 20-23
  5. [5]  Ez-Zaidi, A. and Rakrak, S. (2016), A comparative study of target tracking approaches in wireless sensor networks, Journal of Sensors, 2016, 1-11, https://doi.org/10.1155/2016/3270659.
  6. [6]  Mampentzidou, I., Karapistoli, E., and Economides, A.A. (2012), Basic guidelines for deploying wireless sensor networks in agriculture, 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems, IEEE, 864-869.
  7. [7]  Adeel, A., Gogate, M., Farooq, S., Ieracitano, C., Dashtipour, K., Larijani, H., and Hussain, A. (2019), A survey on the role of wireless sensor networks and IoT in disaster management, Geological disaster monitoring based on sensor networks, 57-66, Springer.
  8. [8]  Filipponi, L., Santini, S., and Vitaletti, A. (2008), Data collection in wireless sensor networks for noise pollution monitoring, International Conference on Distributed Computing in Sensor Systems, Springer, 492-497.
  9. [9]  Pasi, A.A. and Bhave, U. (2015), Flood detection system using wireless sensor network, International Journal of Advanced Research in Computer Science and Software Engineering, 5(2), 386-389.
  10. [10]  Ng, E.H., Tan, S.L., and Guzman, J.G. (2009), Road traffic monitoring using a wireless vehicle sensor network, 2008 International Symposium on Intelligent Signal Processing and Communications Systems, IEEE, 1-4.
  11. [11]  Somov, A., Baranov, A., Savkin, A., Spirjakin, D., Spirjakin, A., and Passerone, R. (2011), Development of wireless sensor network for combustible gas monitoring, Sensors and Actuators A: Physical, 171(2), 398-405.
  12. [12]  Faustine, A., Mvuma, A.N., Mongi, H.J., Gabriel, M.C., Tenge, A.J., and Kucel, S.B. (2014), Wireless sensor networks for water quality monitoring and control within lake victoria basin, Wireless Sensor Network, 6, 281-290.
  13. [13]  Sankarasubramaniam, Y., Akyildiz, I.F., Su, W., and Cayirci, E. (2002), Wireless sensor networks: A survey, Computer Networks, 38(4), 393-422.
  14. [14]  Chauhdary, S.H., Hassan, A., Alqarni, M.A., Alamri, A., and Bashir, A.K. (2019), A twofold sink-based data collection in wireless sensor network for sustainable cities, Sustainable cities and society, 45, 1-7.
  15. [15]  Azad, P. and Sharma, V. (2015), Pareto-optimal clustering scheme using data aggregation for wireless sensor networks, International Journal of Electronics, 102(7), 1165-1176.
  16. [16]  Yao, Y., Xie, X.W., Guo, H., Yu, G., Gao, F.X. and Tong, X.J. (2013), Hopf bifurcation in an Internet worm propagation model with time delay in quarantine, Mathematical and Computer Modelling, 57(11-12), 2635-2646.
  17. [17]  Sun, B., Yan, G., and Xiao, Y. (2008), Worm propagation dynamics in wireless sensor networks, 2008 IEEE International Conference on Communications, 1541-1545, IEEE.
  18. [18]  Khouzani, M.H.R. and Sarkar, S. (2011), Maximum damage battery depletion attack in mobile sensor networks, IEEE Transactions on Automatic Control, 56(10), 2358-2368.
  19. [19]  De, P., Liu, Y., and Das, S.K. (2008), An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks, IEEE Transactions on Mobile Computing, 8(3), 413-425.
  20. [20]  Stefano, Z. (2009), Wireless malware propagation: A reality check, IEEE Security $\&$ Privacy, 7(5), 70-74.
  21. [21]  Keshri, A.K., Mishra, B.K., and Mallick, D.K. (2016), Library formation of known malicious attacks and their future variants, International Journal of Advanced Science and Technology, 94, 1-12
  22. [22]  Singh, J., Kumar, D., Hammouch, Z., and Atangana, A. (2018), A fractional epidemiological model for computer viruses pertaining to a new fractional derivative, Applied Mathematics and Computation, 316, 504-515.
  23. [23]  Keshri, A.K., Mishra, B.K., and Mallick, D.K. (2018), A predator-prey model on the attacking behavior of malicious objects in wireless nanosensor networks, Nano communication networks, 15, 1-16.
  24. [24]  Bahi, J.M., Guyeux, C., Hakem, M., and Makhoul, A. (2014), Epidemiological approach for data survivability in unattended wireless sensor networks, Journal of network and computer applications, 46, 374-383.
  25. [25]  Wang, S., Liu, Q., Yu, X., and Ma, Y. (2010), Bifurcation analysis of a model for network worm propagation with time delay, Mathematical and Computer Modelling, 52(3-4), 435-447.
  26. [26]  Zhu, Q., Yang, X., Yang, L.X., and Zhang, C. (2012), Optimal control of computer virus under a delayed model, Applied Mathematics and Computation, 218(23), 11613-11619.
  27. [27]  Feng, L., Liao, X., Li, H., and Han, Q. (2012), Hopf bifurcation analysis of a delayed viral infection model in computer networks, Mathematical and Computer Modelling, 56(7-8), 167-179.
  28. [28]  Feng, L., Liao, X., Han, Q., and Li, H. (2013), Dynamical analysis and control strategies on malware propagation model, Applied Mathematical Modelling, 37(16-17), 8225-8236.
  29. [29]  Shen, S., Huang, L., Liu, J., Champion, A. C., Yu, S., and Cao, Q. (2016), Reliability evaluation for clustered {WSN}s under malware propagation, Sensors, 16(6), 855(1-16), https://doi.org/10.3390/s16060855 .
  30. [30]  Kumar, V., Dhok, S.B., Tripathi, R., and Tiwari, S. (2017), Cluster size optimisation with Tunable Elfes sensing model for single and multi-hop wireless sensor networks, International Journal of Electronics, 104(2), 312-327
  31. [31]  Tang, S. and Mark, B.L. (2009), Analysis of virus spread in wireless sensor networks: An epidemic model, 2009 7th International Workshop on Design of Reliable Communication Networks, IEEE, 86-91
  32. [32]  Feng, L., Song, L., Zhao, Q., and Wang, H. (2015), Modeling and stability analysis of worm propagation in wireless sensor network, Mathematical Problems in Engineering, 2015, 1-8, https://doi.org/10.1155/2015/129598.
  33. [33]  Mishra, B.K. and Keshri, N. (2013), Mathematical model on the transmission of worms in wireless sensor network, Applied Mathematical Modelling, 37(6), 4103-4111.
  34. [34]  Ojha, R.P., Srivastava, P.K., and Sanyal, G. (2020), Pre-vaccination and quarantine approach for defense against worms propagation of malicious objects in wireless sensor networks, Sensor Technology: Concepts, Methodologies, Tools, and Applications, IGI Global, 1233-1251.
  35. [35]  Wang, X.M. and Li, Y.S. (2009), An improved SIR model for analyzing the dynamics of worm propagation in wireless sensor networks, Chinese Journal of Electronics, 18(1), 8-12.
  36. [36]  Wang, Y., Wen, S., Xiang, Y., and Zhou, W. (2013), Modeling the propagation of worms in networks: A survey, IEEE Communications Surveys $\&$ Tutorials, 16(2), 942-960.
  37. [37]  Pastor-Satorras, R. and Vespignani, A. (2001), Epidemic dynamics and endemic states in complex networks, Physical Review E, 63(6), 066117, https://doi.org/10.1103/PhysRevE.63.066117.
  38. [38]  Pastor-Satorras, R. and Vespignani, A. (2001), Epidemic spreading in scale-free networks, Physical review letters, 86(14), 3200, https://doi.org/10.1103/PhysRevLett.86.3200.
  39. [39]  Newman, M.E. (2002), Spread of epidemic disease on networks, Physical review E, 66(1), 016128-11.
  40. [40]  Kermack, W.O. and McKendrick, A.G. (1927), A contribution to the mathematical theory of epidemics, Proceedings of the royal society of london. Series A, Containing papers of a mathematical and physical character, 115(772), 700-721.
  41. [41]  Sarah, C. (2014), Pathogen evolution and the immunological niche, Annals of the New York Academy of Sciences, 1320(1), 1-15.
  42. [42]  Barbarossa, M.V. and Röst, G. (2015), Mathematical models for vaccination, waning immunity and immune system boosting: a general framework, BIOMAT 2014: International Symposium on Mathematical and Computational Biology, 185-205, World Scientific.
  43. [43]  Singh, A., Awasthi, A.K., Singh, K., and Srivastava, P.K. (2018), Modeling and analysis of worm propagation in wireless sensor networks, Wireless Personal Communications, 98(3), 2535-2551.
  44. [44]  Ojha, R.P., Srivastava, P.K., Sanyal, G., and Gupta, N. (2020), Improved model for the stability analysis of wireless sensor network against malware attacks, Wireless Personal Communications, 116(3), 2525-2548.
  45. [45]  Zhang, Z., Kundu, S., and Wei, R. (2019), A delayed epidemic model for propagation of malicious codes in wireless sensor network, Mathematics, 7(5), 396, https://doi.org/10.3390/math7050396.
  46. [46]  Nwokoye, C.H. and Umeh, I.I. (2017), The SEIQR-V model: on a more accurate analytical characterization of malicious threat defense, International Journal of Information Technology and Computer Science, 9(12), 28-37.
  47. [47]  Hethcote, H.W. (1978), An immunization model for a heterogeneous population, Theoretical Population Biology, 14, 338-349.
  48. [48]  Upadhyay, Ranjit Kumar and Kumari, Sangeeta (2018), Bifurcation analysis of an e-epidemic model in wireless sensor network, International Journal of Computer Mathematics, 95(9), 1775-1805
  49. [49]  LaSalle, J. (1960), Some extensions of Liapunov's second method, IRE Transactions on Circuit Theory, 7(4), 520-527.
  50. [50]  Bendixson, I. (1901), Sur les courbes d{e}finies par des {e}quations diff{e}rentielles, Acta Mathematica, 24(1), 1-88.
  51. [51]  Dhooge, A., Govaerts, W., and Kuznetsov, Y.A. (2003), MATCONT: a MATLAB package for numerical bifurcation analysis of ODEs, ACM Transactions on Mathematical Software (TOMS), 29(2), 141-164.
  52. [52]  Jajarmi, A., Baleanu, D., Zarghami Vahid, K., and Mobayen, S. (2022), A general fractional formulation and tracking control for immunogenic tumor dynamics, Mathematical Methods in the Applied Sciences, 45(2), 667-680.
  53. [53]  Yusuf, A., Qureshi, S., Mustapha, U.T., Musa, S.S., and Sulaiman, T.A. (2022), Fractional Modeling for Improving Scholastic Performance of Students with Optimal Control, International Journal of Applied and Computational Mathematics, 8(1), 1-20.