{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T22:59:18Z","timestamp":1773701958501,"version":"3.50.1"},"reference-count":26,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1,1]]},"abstract":"<p>Network security poses a challenge to wireless sensor networks (WSNs) achieving its true potential. It is hard to tackle due to operational constraints of networks. Worms have become an emergent threat to the wireless networks. The spread of worms in the network is epidemic in nature. This article proposes a novel mathematical model with pre-vaccination and quarantine for study of worm propagation dynamics in WSN that is based on epidemic model. Further, the authors have devised an expression to determine threshold communication radius and node density. The objective of this proposed model is to study the propagation dynamics of worms in wireless sensor networks. Through the model, investigate the stability condition of networks in the presence of malicious codes. The experimental studies indicate that the proposed model outperforms in terms of security and energy efficiency over other existing models. It is a leap toward worm-controlling mechanisms in sensor networks. Finally, the control mechanism and performance of the proposed model is validated through extensive simulation results.<\/p>","DOI":"10.4018\/ijismd.2018010101","type":"journal-article","created":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T18:48:04Z","timestamp":1529520484000},"page":"1-20","source":"Crossref","is-referenced-by-count":11,"title":["Pre-Vaccination and Quarantine Approach for Defense Against Worms Propagation of Malicious Objects in Wireless Sensor Networks"],"prefix":"10.4018","volume":"9","author":[{"given":"Rudra Pratap","family":"Ojha","sequence":"first","affiliation":[{"name":"National Institute of Technology, Durgapur, India"}]},{"given":"Pramod Kumar","family":"Srivastava","sequence":"additional","affiliation":[{"name":"Rajkiya Engineering College, Azamgarh, India"}]},{"given":"Goutam","family":"Sanyal","sequence":"additional","affiliation":[{"name":"National Institute of Technology, Durgapur, India"}]}],"member":"2432","reference":[{"key":"IJISMD.2018010101-0","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"IJISMD.2018010101-1","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198545996.001.0001","author":"R.Anderson","year":"1991","journal-title":"Infectious diseases of humans: Dynamics and control"},{"key":"IJISMD.2018010101-2","doi-asserted-by":"publisher","DOI":"10.1016\/S0025-5564(02)00108-6"},{"key":"IJISMD.2018010101-3","article-title":"Modeling and Stability Analysis of Worm Propagation in Wireless Sensor Network","author":"L.Feng","year":"2015","journal-title":"Mathematical Problems in Engineering"},{"key":"IJISMD.2018010101-4","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9574.1996.tb01482.x"},{"key":"IJISMD.2018010101-5","doi-asserted-by":"publisher","DOI":"10.1049\/iet-wss.2011.0101"},{"key":"IJISMD.2018010101-6","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1927.0118"},{"key":"IJISMD.2018010101-7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2005.26"},{"key":"IJISMD.2018010101-8","first-page":"54","article-title":"Directed-graph epidemiological models of computer viruses.","author":"A.Khelil","year":"2002","journal-title":"Proc. 5th ACM Int\u2019l Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems"},{"key":"IJISMD.2018010101-9","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970432"},{"key":"IJISMD.2018010101-10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77690-1_17"},{"issue":"3","key":"IJISMD.2018010101-11","first-page":"207","article-title":"An Energy Efficient and Trust Aware Framework for Secure Routing in LEACH for Wireless Sensor Networks.","volume":"18","author":"A.Miglani","year":"2017","journal-title":"Scalable Computing: Practice and Experience"},{"key":"IJISMD.2018010101-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2012.09.025"},{"key":"IJISMD.2018010101-13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.055101"},{"key":"IJISMD.2018010101-14","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.66.016128"},{"issue":"3","key":"IJISMD.2018010101-15","first-page":"229","article-title":"Design and Analysis of Modified SIQRS Model for Performance Study of Wireless Sensor Network.","volume":"18","author":"R. P.Ojha","year":"2017","journal-title":"Scalable Computing: Practice and Experience"},{"key":"IJISMD.2018010101-16","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2006.74"},{"key":"IJISMD.2018010101-17","doi-asserted-by":"publisher","DOI":"10.1504\/IJFE.2017.082977"},{"key":"IJISMD.2018010101-18","doi-asserted-by":"publisher","DOI":"10.1109\/GCCE.2014.7031241"},{"key":"IJISMD.2018010101-19","unstructured":"Staniford, S., Paxson, V., & Weaver, N. (2002). How to own the internet in your spare time? In USENIX security symposium (pp. 149-167)."},{"key":"IJISMD.2018010101-20","doi-asserted-by":"publisher","DOI":"10.1007\/s10776-011-0147-z"},{"key":"IJISMD.2018010101-21","doi-asserted-by":"crossref","unstructured":"Tang, S., & Mark, B. L. (2009). Analysis of virus spread in wireless sensor networks: An epidemic model. In 7th international workshop on design of reliable communication networks (DRCN 2009) (pp. 86-91). IEEE.","DOI":"10.1109\/DRCN.2009.5340022"},{"key":"IJISMD.2018010101-22","doi-asserted-by":"publisher","DOI":"10.1504\/IJWMC.2013.054048"},{"issue":"1","key":"IJISMD.2018010101-23","first-page":"8","article-title":"An improved SIR model for analyzing the dynamics of worm propagation in wireless sensor networks.","volume":"18","author":"X.Wang","year":"2009","journal-title":"Chinese Journal of Electronics"},{"key":"IJISMD.2018010101-24","first-page":"22","article-title":"Virus spreading in wireless sensor networks with a medium access control mechanism.","volume":"\u25aa\u25aa\u25aa","author":"Y. Q.Wang","year":"2013","journal-title":"Chinese Physics B"},{"key":"IJISMD.2018010101-25","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.jnca.2014.11.005","article-title":"Data fusion prolongs the lifetime of mobile sensing networks.","volume":"49","author":"P.Yuan","year":"2014","journal-title":"Journal of Network and Computer Applications"}],"container-title":["International Journal of Information System Modeling and Design"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=208637","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T16:29:06Z","timestamp":1720369746000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISMD.2018010101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,1,1]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijismd.2018010101","relation":{},"ISSN":["1947-8186","1947-8194"],"issn-type":[{"value":"1947-8186","type":"print"},{"value":"1947-8194","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,1]]}}}