Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

Controlling worm propagation in wireless sensor networks: Through fractal-fractional mathematical perspectives

Abstract

Wireless Sensor Networks (WSNs) are particularly vulnerable to malware attacks due to their limited processing power, memory, and energy, which makes defending against such threats especially challenging. To mitigate these serious security issues caused by malware infection, various preventive measures can be implemented, such as honeypots, robust security protocols, hardware-based protections, regular updates, firewalls, and intrusion detection systems (IDS). Considering these security concerns, we adopt an advanced version of the existing susceptible–infectious–protected–recovered SIPR model that incorporates a fractional-fractal derivative (FFD) defined in the Atangana-Baleanu-Caputo (ABC) sense, which offers a more realistic representation than the classical model. Furthermore, this research work introduced a new isolated nodes compartment , along with parameters and , defining the recovery and isolation rates of , respectively, in the existing SIPR model. Moreover, this study focuses on the existence and uniqueness of solutions, stability analysis, control theory and numerical approximation for the proposed generalized susceptible–infectious isolated-protected–recovered model. Additionally, nonlinear and fixed-point theory are used to obtain the results of existence and stability analysis. On the same line, Newton polynomial-based numerical scheme was established for the proposed modified model. The dynamics of desired results are visualized using MATLAB.

1 Introduction

This section of research work is committed to the fundamentals of mathematical modeling (MM), fractional calculus (FC), propagation of worms in wireless sensor networks (WSNs), literature survey, and the new findings of this research work.

1.1 Mathematical modeling and fractional calculus

MM plays a prominent role in contemporary mathematics because it connects real-world scenarios with their mathematical representation, enabling systematic investigation and resolution of complex problems [1]. This approach allows researchers to address current challenges while predicting future possibilities [2]. MM has shown wide applications across various disciplines, ranging from engineering to biological systems. MM plays a fundamental role in studying the dynamics of worm spread by employing methodologies in epidemiological models. These models were originally developed for the study of the spread of diseases and have shown effectiveness in understanding the transmission of malware in network systems [3]. Recent studies have demonstrated the flexibility of mathematical methods to model the dynamic propagation of malware alongside the dissemination of antiviral software by considering interactions between malicious attacks and defense mechanisms in cyber environments [4]. Consequently, to address critical vulnerabilities of malicious cybersecurity attacks to networks, the analysis of viral behavior in WSNs focuses on stability and protection of networks [5]. The modeling of dynamical systems and their numerical simulations have become a foundation for advancements in engineering and scientific inquiry [6]. In particular, fractional-order operators have been extensively studied as powerful tools to extend traditional models [7]. These operators in understanding processes that exhibit hereditary properties and memory effects, which are not addressed by classical models of integer order [8].

Fractional calculus (FC) is a field of mathematics that originates and bridges theoretical and empirical investigations with real-world applications. FC has contributed a lot by addressing fundamental mathematical questions by involving appropriate numerical schemes, analytical techniques, and suitable representations across various domains [9]. Fractional derivatives (FDs) also play a crucial role in the development of modeling for frequency-dependent damping behavior in viscoelastic materials, biological phenomena, chemical processes, and engineering problems [10]. Recently, researchers have recognized some differential and integral operators prominent in capturing the complexity of inheritance, in which fractal-differential and integral operators overcome the limitations of conventional approaches [11]. The fractal-fractional derivative (FFD) has advantages over the classical derivatives, due to its important applications in the modeling of multi-faceted real-world phenomena that can not be addressed by classical ones. Contrary to classical derivatives, which focus on local behavior, FFD applies to systems with long-range dependencies or hereditary traits because it accounts for non-local effects and memory properties [12]. The merging of fractal dimensions and fractional calculus integrate the representation of irregular structures and the processes of anomalous diffusion more accurately [13]. FFD operator is helpful in disciplines such as physics, biology, and engineering because it overcomes the inadequacy of classical derivatives for processes with scaling behavior, power-law dynamics, or multi-scale interactions [14]. Also, the non-local effects of FFD improve the modeling of complex systems such as natural and engineered systems containing discontinuous or highly variable functions [15].

1.2 Survey literature on wireless sensor networks

The recent development in information technology has turned out all the fields of science efficiently and connectivity [16]. However, this advancement poses threats like cyber attacks, specifically to wireless sensor networks [17]. National security and safety are increasingly threatened by malicious attacks on networks [18]. Thus, ensuring the security, reliability, and efficiency of WSNs is of the highest priority. WSNs, being a key element of contemporary technological development, play a key role in achieving the desired goals, defining protocols, and gathering information [19]. Networks composed of low-cost, intelligent sensor nodes have proven highly effective in numerous applications ranging from tracking traffic flow, fuel, water conditions, seismic movements, and health parameters [20]. Similarly, these networks also play a critical role in agriculture, disaster mitigation, and environmental contaminant detection [21]. The integration of the internet with WSNs improves real-time information retrieval, facilitates quick decision-making, and improves technological efficiency [22]. However, among the several challenges that persist, one of the most significant threats is malware propagation, which compromises the confidentiality and security of data [23]. Therefore, ensuring the security of WSNs is crucial, particularly in ensuring the reliability of data, such as infrastructure management and healthcare applications. The intersection of MM, FC, and WSNs security represents a dynamic and evolving field in various research fields [24]. This convergence highlights the necessity of modern technologies for addressing the contemporary challenges related to cybersecurity and technological resilience [25].

Global models have observed noteworthy examples, including a review [26] which examines compartmental models based on the Kermack-McKendrick paradigm adapted for malware propagation in WSNs. This study determines that existing models have insufficiently considered energy and memory management, authentication schemes, and sensor mobility. Contemporary research on internet worm propagation relies primarily on epidemic theory [27] with state machine approaches. These classical models include: the Susceptible-Infected-Susceptible model, the SIR model, the Two-factor model, and the Improved Worm Mitigation (IWM) model [28]. These differential equations provide a framework to effectively describe internet worm propagation characteristics to some extent. The model extends the model and is widely applied for analyzing internet worm dynamics. However, these models are not specially designed for WSNs and thus fail to account for energy consumption during propagation. In the SIS model [29], hosts exist in either susceptible or infectious states. A susceptible host may transit to infectious with a certain probability per unit time, while an infectious host may revert to susceptible with a certain probability per unit time (where the probability of Susceptible and infectious are not equal). At time t, with initial host , the infectious host is and the susceptible host S(t). Critically, this model neglects host death from severe infections and ignores potential immunity after disinfection. The model [29] addresses these limitations by adding a removed state. When an infectious host is cleaned, it transitions to removed and gains immunity; susceptible hosts become infectious with a certain probability, while infectious hosts transition to removed with a certain probability. At time t, recovered hosts complete the state set alongside and . While this accounts for immunization/isolation/death, it erroneously assumes susceptible host remain perpetually active. This observed a serious problem for WSNs as expire from energy depletion. This is due to the removed nodes remain vulnerable to new worm strains in large-scale deployments. During the investigation in [30] extends SIR for WSNs where fundamental limitations persist. Various researchers studied the propagation of worms through WSNs from different aspects and published a variety of articles. For a more detail study we referred [31–33] to the readers.

1.3 Generalized SII1PR model

To address the aforementioned challenges, this research work proposed a generalized SII1PR model, which overcomes the above constraints by: introducing an isolated compartment to separate infected nodes, preventing the other nodes from infection. On line by the inter-venting fractal-fractional operator instead of integer-order derivatives, which capturing memory and hereditary effects. This framework maintains mathematical tractability while accurately modeled WSNs specific dynamics like intermittent connectivity and energy-constrained propagation. The newly established proposed model of five states, where each state represents a group of nodes: which are vulnerable to malware attacks and not yet infected. These states are susceptible nodes, infected nodes , the nodes that are already infected and capable of spreading malware, Isolated nodes , which are isolated from infected and protected nodes , which restrain the spread of malware in the network and recovered nodes which spot and remove malware infections by using a detection mechanism and at any time the network comprises nodes. The characteristics and properties posses by all the nodes in proposed model are the same as that of model [34]. A new compartment , representing isolated nodes, is introduced for nodes that are removed from the network to reduce the propagation worm. The isolated compartment reflects practical WSNs security measures where infected nodes are forcefully disconnected (but retained in the network for potential recovery).

The present study formulates the generalized model by deriving the governing equations, qualitative analysis, control strategies, and employing numerical techniques to solve the fractal-fractional system. To evaluate the efficiency of the proposed modified model in compared to the classical model by [34], simulations studies will be conducted by considering key parameters such as infection rate, isolation effectiveness, and overall network recovery. The aims of this study are to demonstrate the enhanced resilience of WSNs against worm attacks through the proposed generalized model, offering valuable insights into robust epidemic modeling for network security. The introduction of , in the classical model, directly addresses the practical challenges related to isolating infected nodes to prevent further propagation. Finally, this study proposed a strategy not only to improve the performance of the model but also to provide meaningful insights into how to control the propagation of worms in WSNs.

1.4 Organization of the paper

This article is structured as follows: Sect 1 introduces fractional calculus, the framework for mathematical modeling, and the dynamics of WSN propagation. Sect 2 presents the fundamental materials, including definitions, lemmas, and theorems of FC, necessary for subsequent sections. Sect 3 details the existence and stability results for the generalized fractional WSN mathematical model. Sect 4 introduces the proposed WSN model, covering equilibrium points, the basic reproductive number, and its sensitivity analysis. Sect 5 constructs a numerical scheme based on Newton polynomial for the considered WSN model. Sect 6 provides graphical visualizations and discusses the results. Finally, the study presents the conclusion and future work.

2 Preliminaries

This section establishes the fundamental definitions and concepts of Fractional Calculus (FC), presenting well-known generalizations like the Gamma and Beta functions and their interconnections. We review key definitions, lemmas, and theorems relevant to our reformulated model (12) and discuss essential definitions for stability analysis. This framework supports achieving the main objectives of this investigation.

Definition 1. [35] The Gamma function is defined as:

(1)

Certain properties related to Gamma function are mentioned in Table 1.

Definition 2. [36] The Beta function is defined as:

(2)

Certain properties related to Beta function are mentioned in Table 2.

Definition 3. [37] Consider that is a continuous function, then the fractal derivative of order of is given as:

(3)

where its fractional generalized form is given by

(4)

Remark 1. Let , where both of its fractional-order and fractal fractional order derivatives exist, we have

(5)

Definition 4. [38] Let be continuous on , with and , then the fractal fractional ABC derivative of is defined as:

(6)

Definition 5. [38] Let the function be continuous on , such that and , then the fractal-fractional integral (FFI) in the sense of is follows as:

(7)

where , , and . The function is defined as:

(8)

Lemma 1. For any function , the solution of

(9)

is given by

(10)

Definition 6. A function with a Lipschitz constant is Lipschitz continuous (LC) on , if

(11)

Theorem 1. Let be a convex closed subset of a Banach space , then is completely continuous and has at least one fixed point.

Assumption 1. Consider the functions and . The following norm properties hold:

3 Investigation of generalized WSNs model

In this section, we investigate the proposed generalized model (12) regarding existence and stability. A comprehensive literature review highlights the significance of worm propagation in WSNs and reveals that this research area requires further attention to explore its various aspects. Our study integrates a FFD in the ABC sense into the existing framework, achieving enhanced realism compared to classical models. Furthermore, we extend the model [34] by introducing a new compartment for isolated nodes, accompanied by parameters (recovery rate) and (isolation rate) for . The advanced model is formulated as follows:

(12)

with , , , , with .

Fig 1 represents the flow chart to describe the dynamics of our proposed model 12) is follow as:

The descriptions of the parameters used in the generalized model is given in Table 3.

3.1 Results of existence

We define the following system of operator equations for the proposed model (12) as follows:

(13)

Using the concepts of FF-order derivatives from Definition 5 with the combination of system of operator Eq 13 in proposed model (12), we get

(14)

Theorem 2. The solutions of the proposed generalized model (12) are non-negative and bounded.

Proof: From the considered model (12), we have

(15)

Thus, for R5 is a positive invariant set and therefore every hyperplane is non-negative and bounded. β–‘

Theorem 3. The operators defined in system of Eq 13, namely , , , and satisfy the Lipschitz condition (LC) and exhibit contraction properties.

Proof: Consider two solutions and of first compartment of considered model (12) for kernel , we have

Subtracting and and applying the maximum norm, we obtain

Defining , it follows that the operator satisfies the Lipschitz condition (LC).

Similarly, we can show that the remaining operator also satisfies the LC. β–‘

Theorem 4. The solution of proposed SII1PR model (12) is unique, if the following inequality holds true

(16)

Proof: Let us consider the first compartment of our considered model (12)

(17)

Applying the operator to both sides of Eq (17), we obtain

Similarly, we can obtain the remaining compartments of model (12).

Consider that , , , , and are Picard operators, we have

(18)

Here, we present boundedness results for the proposed Picard operators as follows:

(19)

Since is LC, it implies that is bounded.

Thus, there exist , , , , and constants such that

Thus,

(20)

For simplicity, putting the maximum value of to obtain beta function.

Now, assume that , such that :

Similarly, for , where we have

Therefore, the operators , , , , and are Picard bounded operators.

The operators , , , , and satisfy the contraction principle (CP), if

(21)

Let .

Now, putting the values of and we get

Let is bounded by , i.e., . From the definition of for any constant, we arrive at

Let

Then

If , then satisfies the CP.

Following the same procedure, we have

For where

the operator satisfies the CP.

Similarly, for , where

the operator satisfies the CP.

For

and

where , the operators and satisfy the CP.

Now, to show that the solution of (12) is unique, assuming any two solutions and for the first compartment of model (12), we have

Thus

(22)

From system of Eq 13, we have

Putting and into (22), we obtain

(23)

Since ΞΌ is a constant and is bounded by , we have and . Substituting these values into (23), we obtain

(24)

Simplifying (24), we obtain:

(25)

Thus, the term cannot be equal to zero, therefore, we have

which gives

Hence, and are equal, which implies that the first compartment of model (12) has a unique solution.

Thus, we conclude that the operators , , , , and are well-defined and satisfy the CPs. Therefore, the solution for our proposed WSNs model (12) is unique in the sense of the F-ABC derivative. β–‘

3.2 Stability analysis

In this section, we provide the results related to the stability analysis of our proposed model (12). To achieve this goal, we first establish the following results:

Definition 7. The solution of proposed (12) is HUS in the FFI sense, if for there exists such that the following hold:

(26)

Let us assume that be an approximate solution for (12) as:

(27)

Thus, the system of equations model (12), is Hyers-Ulam Stable, if

(28)

Theorem 5. The solution of model (12) is Hyers-Ulam-Stable (HUS), if the system of inequalities (28) holds true.

Proof: Let us take the first compartment of (28), we have

(29)

Now, let and , thus

which implies that the first compartment (12) is HUS. Similarly, we can obtain HUS results for the remaining compartments of the considered model. Therefore, we can say that the proposed system of Eq 12 is HUS. β–‘

4 Control theory

In this section, we translate mathematical rigor into cyber-resilience, offering engineers a blueprint to outpace digital contagions. By anchoring worm dynamics to epidemiological principles like R0, the framework acts as an early warning system: if R0<1, networks can choke outbreaks before they metastasize. Sensitivity analysis reveals where defenses matter most, slowing data leaks β and amplifying proactive patching ρ become frontline tactics, akin to deploying a digital immune response. The fractional-order structure mirrors the messy reality of networks, where delays and legacy vulnerabilities linger, ensuring strategies adapt rather than crumble under uncertainty.

4.1 Equilibrium points

Here, mainly, we deal with the following equilibrium points.

4.1.1 Worm Free Equilibrium points (WFEP).

To find the WFEP of the system (12) algebraically, we set all the derivatives equal to zero by solving the equations of the system, and we get

with .

Thus, the worm-free equilibrium is

4.1.2 Endemic Equilibrium (EE).

For finding the EE, we consider the following system of equations:

(30)

From the second equation, we have

From the third equation, we have

From the fourth equation, we have

From the fifth equation, we have

Further, from the first compartment of model (12), we get

4.2 Basic reproduction number

The most critical threshold parameter concerning viral transmissibility is the basic reproduction number, typically stated as .

Definition 8. [39] is the average number of new infections that are transmitted by an infected individual throughout the entire period of infectiousness. If is greater than 1, the number of infected individuals will multiply rapidly and lead to an epidemic.

The Basic Reproduction Number quantifies the inherent β€œspreadability" of a phenomenon in a system, answering: How widely will one source propagate its influence if left unchecked? In epidemiology, the principles of apply universally to measure the average downstream impact of a single unit (for example, a node) within a vulnerable network. If is greater than 1, the effect cascades exponentially, demanding mitigation to prevent system overload. If is less than 1, the influence disappears naturally. This metric helps design resilient systems by identifying critical thresholds for intervention, optimizing resource distribution, and predicting failure points. Although simplified, the logic of bridges theoretical models and real-world stability, offering a framework to balance efficiency and robustness in dynamic networks.

In the next-generation matrix (NGM) method, matrix specifically describes the rate of new infections entering the system. In , we only take (primary infected nodes) due to biological and mathematical reasons considered within the framework of this model. is not epidemiologically related to new infections; rather, it is derived from . The dynamics of the infected compartments and are:

(31)(32)

Constructing and , the new infections () and transitions () matrices are:

New infections matrix :

Transitions matrix :

Spectral radius and , the eigenvalues of are

Therefore, the basic reproduction number is the dominant eigenvalue of and hence:

4.2.1 Sensitivity analysis of .

The basic reproduction number is given by

To quantify the relative impact of parameters on , we compute the normalized sensitivity indices (elasticity) using:

where is a parameter of interest. The following are the sensitivity indices for each parameter.

Transmission Rate ()

Biologically this means that a 1% increase in increases by 1%.

Protection Rate ()

A 1% increase in decreases by .

Parameters in the denominator ().

For any parameter :

For example:    ,     .

The key observations for the sensitivity indices of R0 from Table 4 are the following:

thumbnail
Table 4. Normalized sensitivity indices of with increasing the parameter values.

https://doi.org/10.1371/journal.pone.0335556.t004

  • The most sensitive parameter is , with a direct 1:1 effect on R0.
  • The protection () is effective for reducing , especially when is large.
  • Parameters in the denominator () reduce , but their impact depends on their relative magnitudes.

4.2.2 Stability analysis on the bases of R0.

Here, we present the result of stability and visualization of worm’s transmission dynamics for the proposed model based on R0, using the concepts of LaSalle’s principle.

Theorem 6. The worm-free equilibrium (WFE) is locally asymptotically stable when R0<1 and unstable when R0>1.

Proof: We prove this via Jacobian analysis and the Lyapunov method. The Jacobian at WFE is:

The eigenvalues are:

All eigenvalues have negative real parts iff:

For R0<1, define:

Its derivative along trajectories satisfies:

Equality holds only when . By LaSalle’s invariance principle, WFE is globally attractive. When R0>1, makes unstable. The transcritical bifurcation at R0 = 1 is verified by computing:

β–‘

The bifurcation is forward (a > 0), implying a stable endemic equilibrium for R0>1.

To visualize how the spread of the worm depends on its contagiousness, the following Figs 2 and 3, show the transmission dynamics within the WSNs. They illustrate three distinct outbreak scenarios determined by the basic reproduction number, R0. The value of R0 critically influences whether the infection persists, grows, or dies out.

Understanding how a worm spreads in a WSNs is crucial for developing defenses. The basic reproduction number R0, acts as a key predictor for this spread. Fig 2 illustrates the critical threshold scenario where R0 equals 1; here, each infected node transmits the worm to exactly one new node on average, leading to a persistent but non-expanding infection level. When R0 exceeds 1, as shown in Fig 3, the outbreak grows exponentially because each infection causes more than one subsequent infection, posing a significant threat to the network. Conversely, Fig 4 depicts the safer situation where R0 is less than 1; the worm struggles to spread effectively, causing infections to quickly decline and eventually fizzle out. These dynamics clearly demonstrate how the value of R0 determines the ultimate fate of a worm within the WSNs.

5 Newton’s polynomial-based numerical scheme

This section details the numerical approximation of model (12) via Newton’s polynomial approach, integrating interpolation techniques with Newton’s method using Newton-form polynomials. These methodologies find extensive application across diverse fields such as physics, economics, and computer science.

For model (12), we delineate the numerical implementation scheme through the following steps:

As we know from the Atangana-Baleanu integral, the solution for the model (12) takes a specific form, which can be derived as follows:

(33)

Substituting with , in (32), we have

(34)

Now, applying the two step Lagrange polynomial to , gives

where the difference of and is represented by .

(35)

Solving the integrals involving in Eq 34, we obtain

After simplification, we get

Replacing , we get

Now, applying the numerical scheme to model (12), we have

6 Numerical simulations

This section provides graphical visualizations and a concise discussion of the approximate solutions obtained for our proposed generalized fractional-order WSNs model.

6.1 Graphical analysis and discussion

We have used MATLAB to analyze and generate the graphs given below. The parameter values were obtained in order to get a graphical representation of the dynamics of our proposed model.The model parameters consist of and , each with specific values and corresponding units. Let us assume the following initial conditions:

Thus, the data presented here lay the foundation for developing the model we are examining. The simulation results of the SII1PR model are shown in Figs 5–20, illustrating the dynamical representation of the time evolution of each compartment. These figures demonstrate to exhibit the dynamics of the system under different parameter values. For example, as the parameters and increase, there is a notable reduction in the susceptible population S(t) shown in Fig 7. The behavioral pattern of S(t), P(t), and R(t) in Figs 5, 16–19 also substantiates the theoretical findings, affirming the boundedness, convergence, and long-term influence of protection mechanisms. We see that the infected nodes I(t) in Fig 10 first rise and then fall as a result of the impact of isolation and recovery parameters. In addition, the infected I(t) presented and isolated I1(t) illustrated in Figs 10 and 13 exhibit sharp oscillations, reaching their peak before rapidly declining. This behavior suggests an initial aggressive infection that can be mitigated through strategic interventions. Likewise, the isolated class I1(t) in Fig 13 presents an increase followed by stabilization, establishing the efficacy of the containment strategy. Such graphical interpretations justify the model’s ability to catch worm propagation patterns in WSNs. These dynamics emphasize the model’s sensitivity to parameter changes and demonstrate the impact of and on infection control in wireless sensor networks. The Figs 21, 22, 26, 27, 28 and 29 reveal how cybersecurity β€œknobs" shape worm outbreaks in WSNs. Infected nodes Fig 21 surge faster with higher transmission rates , but flatten with stronger protection . Isolated nodes in Fig 22 peak earlier when isolation is swift , while faster recovery shortens isolation periods, but node death permanently reduces network capacity. Protected nodes Figs 23–25 grow rapidly with preemptive hardening , though new nodes introduce vulnerabilities. Recovered nodes Fig 26 thrive with efficient remediation , but node loss forces costly replacements. Finally, combined dynamics Figs 27–29 show fractional parameters capturing real world delays: infections ripple through , while protection P curbs susceptibility. Together, they prove that early isolation and proactive patching are critical and that fractional calculus models real world quirks like β€œmemory effects" in nodes.

thumbnail
Fig 6. The dynamics of with variations in fractional orders with each others.

https://doi.org/10.1371/journal.pone.0335556.g006

thumbnail
Fig 7. The population dynamics for multiple values of and .

https://doi.org/10.1371/journal.pone.0335556.g007

thumbnail
Fig 9. The dynamics of with variations in   and   with each others.

https://doi.org/10.1371/journal.pone.0335556.g009

thumbnail
Fig 12. The dynamics of for variations of and with each others.

https://doi.org/10.1371/journal.pone.0335556.g012

thumbnail
Fig 15. The dynamics of with variations in values of   and   each others.

https://doi.org/10.1371/journal.pone.0335556.g015

thumbnail
Fig 16. The populations for multiple values of   and   .

https://doi.org/10.1371/journal.pone.0335556.g016

thumbnail
Fig 18. The dynamics of for variations in values of and each others.

https://doi.org/10.1371/journal.pone.0335556.g018

thumbnail
Fig 19. The dynamics of for multiple values of ,  and   .

https://doi.org/10.1371/journal.pone.0335556.g019

thumbnail
Fig 20. Combining plot all compartments of model for multiple values of and .

https://doi.org/10.1371/journal.pone.0335556.g020

thumbnail
Fig 21. Susceptible population dynamics with different values of parameters.

https://doi.org/10.1371/journal.pone.0335556.g021

thumbnail
Fig 22. Infected population dynamics with different values of parameters.

https://doi.org/10.1371/journal.pone.0335556.g022

thumbnail
Fig 23. Isolated population dynamics for different values of .

https://doi.org/10.1371/journal.pone.0335556.g023

thumbnail
Fig 24. Isolated population dynamics for different values of .

https://doi.org/10.1371/journal.pone.0335556.g024

thumbnail
Fig 25. Isolated population dynamics for different values of .

https://doi.org/10.1371/journal.pone.0335556.g025

thumbnail
Fig 26. Protected population dynamics with different values of parameters.

https://doi.org/10.1371/journal.pone.0335556.g026

thumbnail
Fig 27. Recovered population dynamics for different values of .

https://doi.org/10.1371/journal.pone.0335556.g027

thumbnail
Fig 28. Recovered population dynamics for different values of .

https://doi.org/10.1371/journal.pone.0335556.g028

thumbnail
Fig 29. Recovered population dynamics for different values of .

https://doi.org/10.1371/journal.pone.0335556.g029

The following are the graphs for different values of parameters.

In general, the analysis indicates that increasing these parameters leads to the following:

  • A faster decline in the susceptible population S(t) shown in Fig 7.
  • Rapid fluctuations illustrated in infection I(t) presented in Fig 10 and isolated I1(t) in Fig 13.
  • A steady rise in protection P(t) shown in Fig 16, and recovered nodes R(t) presented in Fig 19.

This underscores the effectiveness of strategic interventions in controlling the spread of worms in WSNs.

6.2 Comparative study

To evaluate the effectiveness of the proposed numerical scheme, we conducted comparative simulations with classical methods:

  • 4th-order Runge-Kutta (RK-4) and modified Euler method (EM)
  • Conventional integer-order case ()
  • MATLAB R2015a with fixed step size h = 0.5
  • CPU time comparison for the susceptible compartment

We compared the computational efficiency of the numerical schemes by measuring their CPU times, as shown in Table 1. The results demonstrate that our proposed method is more reliable than both RK-4 and EM approaches. Moreover, the NP scheme maintains its effectiveness for fractional-order cases (), where traditional methods like RK-4 fail to apply. This adaptability makes the NP method particularly valuable for modeling real-world phenomena exhibiting memory effects and non-local behavior, such as contaminant transport in aquatic systems.

7 Conclusions

This study presented an advanced mathematical model for analyzing worm-spreading dynamics in WSNs.

  • This work extends the traditional () model by incorporating an isolated compartment (), introducing new parameters (isolation rate) and (recovery rate of ), and utilizing FFD in the ABC sense. Incorporating an isolated compartment into the model improves its alignment with real-world scenarios by acknowledging nodes that are purposefully isolated to reduce the spread of worms. The ABC fractional derivative is employed to represent memory-influenced behavior and network-wide interactions, which are critical characteristics of malware propagation.
  • By studying the compartmental framework, researchers can identify how the parameters and , the measurable distinct and measure functions, are used in managing worm outbreaks within WSNs.
  • This analysis helps quantify the efficacy of containment strategies and track the restoration of compromised nodes to normal operation, offering insights into both preventive and reactive measures.
  • These parameters, representing transmission dynamics and control interventions, respectively have a significant impact across all compartments. Fixing and values produces a typical epidemic curve, whereas varying these parameters scales outbreak severity and duration. Higher values of accelerate transmission, while increasing reduces infection peaks, indicating its role in mitigation measures.
  • The Isolation patterns inversely reflect infection rates, with and influencing the timeliness and severity of isolation measures. The combined patterns show that the balanced modifications to and , such as maximizing transmission suppression while enhancing vaccination efforts, can effectively flatten the infection curves.
thumbnail
Table 5. CPU time comparison for extended simulation intervals using NP, RK4, and ME methods.

https://doi.org/10.1371/journal.pone.0335556.t005

Future works

This study established a theoretical foundation for modeling worm propagation in WSNs using fractal-fractional operators. Subsequent research should focus on validating the model empirically through test bed implementations with commercial sensor nodes, examining real-world constraints like dynamic topologies and intermittent connectivity. Further extensions could incorporate multi-vector threat scenarios (e.g., simultaneous malware strains) and energy-aware mitigation strategies that optimize security-energy tradeoffs. Developing machine learning frameworks for real-time parameter calibration and exploring hardware-level isolation mechanisms would enhance practical deployability. Finally, integrating cross-layer network vulnerabilities and post-quantum security considerations would strengthen the model’s resilience against evolving cyber-physical threats.

References

  1. 1. Dym C. Principles of mathematical modeling. Elsevier; 2004.
  2. 2. Strielkowski W, Vlasov A, Selivanov K, Muraviev K, Shakhnov V. Prospects and challenges of the machine learning and data-driven methods for the predictive analysis of power systems: a review. Energies. 2023;16(10):4025.
  3. 3. Nwokoye CH, Madhusudanan V. Epidemic models of malicious-code propagation and control in wireless sensor networks: an indepth review. Wireless Pers Commun. 2022;125(2):1827–56.
  4. 4. Ferdous J, Islam R, Mahboubi A, Islam MdZ. A review of state-of-the-art malware attack trends and defense mechanisms. IEEE Access. 2023;11:121118–41.
  5. 5. Yu J-Y, Lee E, Oh S-R, Seo Y-D, Kim Y-G. A survey on security requirements for WSNs: focusing on the characteristics related to security. IEEE Access. 2020;8:45304–24.
  6. 6. van den Bosch PP, van der Klauw AC. Modeling, identification and simulation of dynamical systems. CRC Press; 2020.
  7. 7. Patnaik S, Hollkamp JP, Semperlotti F. Applications of variable-order fractional operators: a review. Proc Math Phys Eng Sci. 2020;476(2234):20190498. pmid:32201475
  8. 8. Acay B, Inc M, Mustapha UT, Yusuf A. Fractional dynamics and analysis for a lana fever infectious ailment with Caputo operator. Chaos, Solitons & Fractals. 2021;153:111605.
  9. 9. Baleanu D, Karaca Y, Vazquez L, MacΓ­as-DΓ­az JE. Advanced fractional calculus, differential equations and neural networks: analysis, modeling and numerical computations. Physica Scripta. 2023;98(11):110201.
  10. 10. Chen W, Sun H, Li X. Fractional derivative modeling in mechanics and engineering. Berlin/Heidelberg, Germany: Springer Nature; 2022.
  11. 11. Chen W, Liang Y. New methodologies in fractional and fractal derivatives modeling. Chaos, Solitons & Fractals. 2017;102:72–7.
  12. 12. Leizerman S. Fractional-derivative field theory of cognitive memory: a unified mathematical framework for biological and artificial intelligence. In: SSRN Preprint. 2025.
  13. 13. Sun H, Li Z, Zhang Y, Chen W. Fractional and fractal derivative models for transient anomalous diffusion: model comparison. Chaos, Solitons & Fractals. 2017;102:346–53.
  14. 14. Chen W, Sun H, Li X. Fractional derivative modeling in mechanics and engineering. Berlin/Heidelberg, Germany: Springer; 2022.
  15. 15. Kavallaris NI, Suzuki T. Non-local partial differential equations for engineering and biology. Mathematical Modeling and Analysis. 2018;31.
  16. 16. Taherdoost H. An overview of trends in information systems: emerging technologies that transform the information technology industry. Cloud Computing and Data Science. 2022;:1–16.
  17. 17. Bhushan B, Sahoo G. Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wireless Pers Commun. 2017;98(2):2037–77.
  18. 18. White J. Cyber threats and cyber security: national security issues, policy and strategies. Global Security Studies. 2016;7(4).
  19. 19. Jamshed MA, Ali K, Abbasi QH, Imran MA, Ur-Rehman M. Challenges, applications, and future of wireless sensors in Internet of Things: a review. IEEE Sensors J. 2022;22(6):5482–94.
  20. 20. Sofi A, Jane Regita J, Rane B, Lau HH. Structural health monitoring using wireless smart sensor network – an overview. Mechanical Systems and Signal Processing. 2022;163:108113.
  21. 21. Mubeen M, Shabbir K, Hanif A, Ali M, Hussain S, Ahmad S. Role of environmental science for disaster risk reduction in agriculture. Disaster risk reduction in agriculture. Singapore: Springer; 2023. p. 131–45.
  22. 22. Kumar P, Motia S, Reddy SRN. Integrating wireless sensing and decision support technologies for real-time farmland monitoring and support for effective decision making. Int j inf tecnol. 2018;15(2):1081–99.
  23. 23. Aslan Γ–, Aktuğ SS, Ozkan-Okay M, Yilmaz AA, Akin E. A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics. 2023;12(6):1333.
  24. 24. Achar SJ, Baishya C, Kaabar MKA. Dynamics of the worm transmission in wireless sensor network in the framework of fractional derivatives. Math Methods in App Sciences. 2021;45(8):4278–94.
  25. 25. Saeed S, Altamimi SA, Alkayyal NA, Alshehri E, Alabbad DA. Digital transformation and cybersecurity challenges for businesses resilience: issues and recommendations. Sensors (Basel). 2023;23(15):6666. pmid:37571451
  26. 26. Nwokoye CH, Madhusudanan V. Epidemic models of malicious-code propagation and control in wireless sensor networks: an indepth review. Wireless Pers Commun. 2022;125(2):1827–56.
  27. 27. Frauenthal JC. Mathematical modeling in epidemiology. Springer Science & Business Media; 2012.
  28. 28. Dantu R, Cangussu JW, Patwardhan S. Fast worm containment using feedback control. IEEE Trans Dependable and Secure Comput. 2007;4(2):119–36.
  29. 29. Kim J, Radhakrishnan S, Dhall SK. Measurement and analysis of worm propagation on Internet network topology. In: Proceedings of the 13th International Conference on Computer Communications and Networks (ICCCN). 2004.
  30. 30. Wang X, Li Y. An improved SIR model for analyzing the dynamics of worm propagation in wireless sensor networks. Chinese Journal of Electronics. 2009;18(1):8–12.
  31. 31. Liu P, Din A. Comprehensive analysis of a stochastic wireless sensor network motivated by Black-Karasinski process. Sci Rep. 2024;14(1):8799. pmid:38627447
  32. 32. Wu Y, Pu C, Zhang G, Li L, Xia Y, Xia C. Epidemic spreading in wireless sensor networks with node sleep scheduling. Physica A: Statistical Mechanics and its Applications. 2023;629:129204.
  33. 33. Awasthi S, Srivastava PK, Kumar N, Ojha RP, Pandey PS, Singh R, et al. An epidemic model for the investigation of multi-malware attack in wireless sensor network. IET Communications. 2023;17(11):1274–87.
  34. 34. Tahir H, Din A, Shah K, Abdalla B, Abdeljawad T. Advances in stochastic epidemic modeling: tackling worm transmission in wireless sensor networks. Mathematical and Computer Modelling of Dynamical Systems. 2024;30(1):658–82.
  35. 35. Cao X, Datta A, Al Basir F, Roy PK. Fractional-order model of the disease Psoriasis: a control based mathematical approach. J Syst Sci Complex. 2016;29(6):1565–84.
  36. 36. France J, Thornley JH, Thornley JHM. Mathematical models in agriculture. Butterworths; 1984.
  37. 37. Atangana A. Fractional operators with constant and variable order with application to geo-hydrology. Academic Press. 2017.
  38. 38. Atangana A. Fractal-fractional differentiation and integration: Connecting fractal calculus and fractional calculus to predict complex system. Chaos, Solitons & Fractals. 2017;102:396–406.
  39. 39. Li H, Zhang H, Ding K, Wang X-H, Sun G-Y, Liu Z-X, et al. The evolving epidemiology of monkeypox virus. Cytokine Growth Factor Rev. 2022;68:1–12. pmid:36244878