Next Article in Journal
A Complete Review of the General Quartic Equation with Real Coefficients and Multiple Roots
Previous Article in Journal
A Two-Stage Framework for Directed Hypergraph Link Prediction
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Analysis and Control of Malware Mutation Model in Wireless Rechargeable Sensor Network with Charging Delay

1
School of Mechanical and Electrical Engineering, Guangzhou University, Guangzhou 510006, China
2
Guangzhou Industry & Information Technology Institute for Intelligent Robotic Equipment, Guangzhou University, Guangzhou 510006, China
3
Department of Port and Shipping Management, Guangzhou Maritime University, Guangzhou 510725, China
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Mathematics 2022, 10(14), 2376; https://doi.org/10.3390/math10142376
Submission received: 27 May 2022 / Revised: 2 July 2022 / Accepted: 5 July 2022 / Published: 6 July 2022

Abstract

:
In wireless rechargeable sensors (WRSNs), the system is vulnerable to be attacked by malware. Because of the distributed network structure of WRSNs, the malware attack has great influence on the security system of WRSNs. With the variability in malware, the problem of decryption and coding errors will lead to the malware mutating. In this paper, there are two problems to be solved, including the malware mutation and the charging delay in WRSNs. The malware mutation state and the low-energy state are introduced. Firstly, three different equilibrium solutions of the mutation model are given. Then, the local stability is proven by the characteristic equation, and the system will be stabilized at different equilibrium solutions when the base reproductive number is different. With the condition of charging delay, the bifurcation phenomenon is investigated by using the Hopf bifurcation theory. Furthermore, to improve the security of WRSNs and decrease the control cost, the Pontryagin’s Maximum principle is applied to obtain an optimal control scheme under mutation and charging delay. Finally, the numerical simulation is applied by Matlab to confirm this model. The simulation results show that the mutation malware can be controlled when the delay is less than the maximum threshold.
MSC:
49K35; 37G99

1. Introduction

With the development of various network applications, there are many network security issues for networks [1,2,3,4]. Thus, the security of wireless sensor network (WSN) is a hot topic [5,6,7]. Many authors have studied WSNs from different aspects. A WSN is a distributed network structure. It has a great number of sensor nodes connected by a common wireless channel. Thus, it is applied in many fields, such as the military, environmental monitoring, medical treatment, disaster management, automotive applications, and so on [8,9]. However, WSN is constrained by limited resource, processing speed, and battery life. Because of the deployment of the nodes, it is hard to create a complicated safeguard ability for a WSN. It is also easy to lead to information transmission failure or even network paralysis when the WSN is attacked by malware. Therefore, it is urgent and significant to take measures to ensure accuracy and efficiency in WSN.
More and more scholars have studied the propagation of malware. At first, Kephart et al. [10,11] studied the propagation of the virus by incorporating concepts of epidemic dynamics. Since then, this method has opened a new way to solve the security problems of networks. Liu et al. [12] studied the malware propagation on complex networks which follow the power-law degree distribution. A SEIR model is proposed by Zhu et al. [13], and the authors analyzed the threshold, time delay, and global stability of a rumor spreading on social networks. Then, authors [14,15] also studied the spread of rumors in complex networks. Huang et al. [16] proposed spreading dynamics of social behaviors in multiplex networks. With the mathematical model, a number of researchers have made attempts using different models for investigating the malware disseminating dynamics in WSNs. When considering the spatial and temproal parameters, Khayam et al. [17] proposed a worm propagation model by using signal processing techniques in WSN. A worm propagation model in a WSN is proposed in Refs. [18,19], and the authors took into account the communication radius and the distributed density of the nodes. In [20], Ojha et al. also proposed an improved model which aggregates quarantine and vaccination techniques by Feng et al. Muthukrishnan et al. [21] established the node-based malware trace and patching model. They studied the topological structure and proposed an optimal control strategy. In Ref. [22], the authors proposed the SIR1R2 with secondary immunity to analyze the feature of malware propagation in WSNs. In Ref. [18], a mathematical equation is presented as follows:
d S d t = μ N ξ S I ( μ + ω ) S + ϵ R d I d t = ξ S I ( μ + γ ) I d R d t = ω S + γ I ( μ + ϵ ) R
where, S, I, and R are the state nodes. They mean the numbers of the susceptible, the infected, and the recovered nodes, respectively. As shown in Table 1, the parameters are explained.
To study the malware spread specifically, other factors are taken into account in the mawlare spreading model, including time delay, virus mutation, the battery life, etc. Because of the battery capacity limitations, many scholars also pay attention to rechargeable WSN schemes [23,24,25] to solve the battery life problem. Li et al. [26] proposed an energy-efficient patching strategy to solve the problems of virus attacks and energy constraints. Liu et al. [27,28] considered the impact of pulse charging and charging delay on the system. Keshri et al. [29] proposed an SEIR model with two time delays (including the period exposed and the period of temporary immunity). They studied the effect of delay in the WSN during multiple attacks. In Ref. [30], the authors proposed the propagation of a worm model with three delays and analyzed the influence of multiple delays on a system. For these time delay models [31,32,33], the authors investigated the condition of Hopf bifurcation. However, the energy constraint is the most important problem to be solved for all delay problems. It is necessary to study the low-energy state and the influence of charging delay on a WSN’s efficiency. Liu et al. [34] proposed the malware propagation model when considering the low-energy state. They revealed the relationship between the charging rate and the basic reproductive number. However, they did not analyze the effect of a charging delay in WRSNs.
At the moment, it is worth noting that virus mutation [35] means that a virus is likely to convert to another virus when transmitting the virus on networks. In most networks, the malware mutation is real [36]. The condition of mutation needs to be considered, but few people have studied dynamic models of malware mutation. Li et al. [37,38] proposed an epidemic model with virus mutation and considered the virus mutation during transmission. Afterwards, they considered the virus’s spontaneous variation, and they only established a delay model with virus mutation; they did not analyze the effect of delay on the mutation model. Hao [39] proposed the virus variation model on complex networks. They mainly analyzed the stability. In Ref. [40], the authors proposed a SIVR model to investigate the dynamics of epidemic propogation with virus mutation on complex networks, and they only discussed different epidemic immunization strategies to control the propagation of viruses and their mutations. Regardless of mutation, there are some control methods, including dissemination of security patches or recovery in Ref. [41]. Zhang et al. [42] considered the control strategy of the SIQRS model and provided three measures of vaccination, quarantine, and treatment. Zhu et al. [43] established an optimal control model with delay, and four different control strategies were investigated. Many excellent works have also been described in Refs. [44,45,46]. Chen et al. [47] considered the virus mutation with drug resistance and proposed an SIVRS epidemic spreading model on scale-free networks. They analyzed the mutation under heterogeneous networks. The model has only one reproductive number, and the model could not reflect the influence of the variation and infection node well. Liu et al. [48,49] analyzed the propagation of malware with virus mutation in wireless sensor networks. They merely studied the stability and control. Based on the above survey, there are many problems with mutation models. However, few people have studied charging delays and mutation models simultaneously. Moreover, the problem of optimal control needs to be solved.
In this paper, a new model is proposed to consider charging delay and mutation. A complex SIIRL model is proposed in WSN. S, I 1 , I 2 , R, and L mean the numbers of the susceptible, the infected, the mutation malware, the recovered, and the low-energy nodes, respectively. Our contributions are as follows:
1.
For existing mutation models, the WSN has an energy constraint. As a solution, charging needs to be completed within a certain period of time. To address this problem, the mutation model with charging delay is proposed to analyse the process of spreading malware. The effect of charging delay on mutation model is also analyzed.
2.
Through the analysis of the mutation model with charging delay, two different basic reproductive numbers, R 1 and R 2 , are obtained. Then, the locally asymptotically stability is proven. Moreover, the bifurcation phenomenon and periodic oscillation of the mutation model are analyzed.
3.
Based on the mutation model with charging delay, the optimal charging delay control strategy is discussed. According to the Pontryagin’s Maximun Principle, the optimal variable u * ( t ) can be derived. It is found that the charging delay has great influence on optimal control. Meanwhile, no treatment control, average control, and full treatment are also analyzed. By comparison with the three control methods, the optimal control is the best control method of them.
The follow of this paper is organized as follows. In Section 2, the SIIRL model is proposed. The mean-field equations are analyzed. In Section 3, the equilibrium points are calculated, and the local stability and the bifurcation phenomenon are investigated. In Section 4, the direction of Hopf bifurcation is analyzed. In Section 5, the charging delay control strategy is proposed for mutation malware spreading in WRSNs. In Section 6, some simulations are described to support the theoretical analysis. Finally, in Section 7, the conclusion of the model is described.

2. Modeling

In this section, the model of malware spreading is introduced. In general, the condition of normal and abnormal depends on if the sensors are infected or not. The normal working sensors are not infected by malware such as S and R. For example, the energy consumption of S is normal. R will be not be attacked. Thus, the energy consumption of R is normal. The abnormal working sensors are infected by malware such as I 1 and I 2 . The nodes will consume a lot of energy when the sensors run the malware. The assumption is proposed that the conversion ratio of S or R to L is the same c 1 and the conversion ratio of I 1 or I 2 to L is the same c 2 . As depicted above, the model of equation is given as follows:
d S d t = A β 1 S I 1 β 2 S I 2 c 1 S d S + α R d I 1 d t = β 1 S I 1 ( c 2 + d + ε + γ 1 ) I 1 d I 2 d t = β 2 S I 2 ( c 2 + d + γ 2 ) I 2 + ε I 1 d R d t = γ 1 I 1 + γ 2 I 2 + μ L ( t τ ) ( c 1 + d + α ) R d L d t = c 1 ( R + S ) + c 2 ( I 2 + I 1 ) μ L ( t τ ) d L
According to Equation (2), A is the quantity of the injected nodes; β 1 is the conversion ratio of susceptible to infected; β 2 is the conversion ratio of the susceptible to virus mutation; ε is the conversion ratio of the infected to virus mutation; c 1 is the conversion ratio of the susceptible or recovered to low energy; c 2 is the conversion ratio of the infected or virus mutation to low energy; d is the conversion ratio of the sensor death; γ 1 is the conversion ratio of the infected to the recovered; γ 2 is the conversion ratio of the virus mutation to the recovered; μ is the conversion ratio of recovery from low energy; α is the failure ratio of recovery; and τ is the time delay.

3. Local Stability and Existence of Hopf Bifurcation

According to the system (2), the solutions of the system, including the disease-free equilibrium, the boundary equilibrium, and the endemic equilibrium, are given by:
S 0 = A ( α d + c 1 d + α μ + d μ + d 2 ) d ( α + c 1 + d ) ( c 1 + d + μ )
S ¯ = c 2 + γ 2 + d β 2
S * = c 2 + γ 1 + d + ε β 1
The disease-free equilibrium is E 0 ( S 0 , 0 , 0 , R 0 , L 0 ) . According to the next generation, the basic reproductive numbers can be calculated. The matrix is given by:
F = β 1 S 0 0 0 β 2 S 0 V = c 2 + d + γ 1 + ε 0 ε c 2 + d + γ 2
Thus, the basic reproductive numbers are given by:
R 1 = ( F V 1 1 ) = β 1 S 0 c 2 + d + γ 1 + ε
R 2 = ( F V 2 1 ) = β 2 S 0 c 2 + d + γ 2
If R 1 < 1 and R 2 < 1 , the system has a disease-free equilibrium solution; if R 2 > 1 and R 2 > R 1 , the system has a disease-free equilibrium solution and a boundary equilibrium solution; if R 1 > 1 and R 1 > R 2 , the system has a disease-free equilibrium solution and an endemic equilibrium solution. The equilibrium is given as:
R 0 = A c 1 μ ( ( μ + d ) ( c 1 + d ) c 1 μ ) ( c 1 + d ) = A c 1 μ ( μ + c 1 + d ) ( c 1 + d ) d
L 0 = ( c 1 + d ) R 0 μ = A c 1 ( μ + d ) ( c 1 + d ) c 1 μ = A c 1 ( μ + c 1 + d ) d
I 2 ¯ = c 1 S ¯ μ α ( c 1 + d + α ) [ c 1 γ 1 + c 2 ( c 1 + d + α ) ] μ α + [ μ c 1 ( μ + d ) ( c 1 + d + α ) ]
L ¯ = γ 2 I 2 ¯ ( c 1 + d + α ) R ¯ μ                
R ¯ = A β 2 S ¯ I 2 ¯ ( c 1 + d ) S ¯ α               
I 1 * = I 2 * [ ( c 2 + d + γ 1 ) γ 2 S * ] ε               
            I 2 * = c 1 S * α μ ( A ( c 1 + d ) S * ) c 1 μ + ( A ( c 1 + d ) S * ) ( c 1 + d + α ) ( μ + d ) ε μ α α μ [ ( Q 1 + Q 2 + Q 3 ) Q 4 ]
     R * = ( β 1 S * ( ( c 2 + d + γ 1 ) β 2 S * ) ) I 2 * ( A ( c 1 + d ) S * ) ε ε α
    L * = ( Q 4 Q 3 ) I 2 * ( ( A ( c 1 + d ) S * ) ( c 1 + d + α ) ε ) α μ ε
where,
Q 1 = μ α c 2 ( ( c 2 + d + γ 2 ) β 2 S * + ε )    
Q 2 = c 1 β 1 S * μ ( ( c 2 + d + γ 1 ) β 2 S * ) + ε μ β 2 S * c 1
Q 3 = α γ 1 β 1 S * ( ( c 2 + d + γ 1 ) β 2 S * ) + γ 2 ε α
        Q 4 = ( β 1 S * ( ( c 2 + d + γ 1 ) + β 2 S * ) + β 2 S * ε ) ( c 1 + d + α ) ( μ + d )
The characteristic matrix is given as:
X = λ + a 1 β 1 S β 2 S α 0 β 1 I 1 λ a 1 0 0 0 β 2 I 2 ε λ a 3 0 0 0 γ 1 γ 2 λ + a 4 μ e λ τ c 1 c 2 c 2 c 1 λ + d + μ e λ τ
where
a 1 = λ + β 1 I 1 + β 2 I 2 + ( c 1 + d ) a 2 = β 1 S ( c 2 + d + γ 2 + ε ) a 3 = β 2 S ( c 2 + d + γ 2 ) a 4 = c 1 + d + α b 1 = β 1 I 1 β 1 S b 2 = β 2 I 2 β 2 S b 3 = β 1 I 1 β 2 S b 4 = c 1 + d
The characteristic equation is given by:
f ( λ ) = A 5 λ 5 + A 4 λ 4 + A 3 λ 3 + A 2 λ 2 + A 1 λ + A 0 + B e λ τ
where A 5 = 1 , and the others are given by:
A 4 = a 1 a 2 a 3 + a 4 + d                                     
A 3 = ( b 1 b 2 + a 1 a 2 + a 1 a 3 a 1 a 4 a 2 a 3 + a 2 a 4 + a 3 a 4 ( a 1 a 2 a 3 + a 4 ) d A 2 = a 1 a 2 a 3 a 1 a 2 a 4 a 1 a 3 a 4 + a 2 a 3 a 4 a 1 a 2 d a 1 a 3 d + a 1 a 4 d + a 2 a 3 d a 2 a 4 d a 3 a 4 d b 1 a 3 + b 1 a 4 b 2 a 2
+ b 2 a 4 + b 1 d + b 2 d + b 3 ε + α β 1 I 1 γ 1 + α β 2 I 2 γ 2 A 1 = a 1 a 2 a 3 a 4 + a 1 a 2 a 3 d a 1 a 2 a 4 d a 1 a 3 a 4 d + a 2 a 3 a 4 d a 3 a 4 b 1 a 2 a 4 b 2 a 3 b 1 d + a 4 b 1 d a 2 b 2 d + a 4 b 2 d + a 4 b 3 ε
+ b 3 d ε a 3 α β 1 I 1 γ 1 a 2 α β 2 I 2 γ 2 + α β 1 I 1 γ 1 d + α β 2 I 2 γ 2 d + α ε β 1 I 1 γ 2                
A 0 = a 3 a 4 b 1 d a 2 a 4 b 2 d + a 1 a 2 a 3 a 4 d + a 4 b 3 d ε a 3 α β 1 I 1 γ 1 d a 2 α β 2 I 2 γ 2 d + α ε β 1 I 1 γ 2 d B = μ λ 4 + ( a 1 μ a 2 μ a 3 μ + a 4 μ b 4 ) λ 3 + ( b 1 μ + b 2 μ a 1 a 2 μ a 1 a 3 μ + a 1 a 4 μ + a 2 a 3 μ a 2 a 4 μ a 3 a 4 μ a 1 b 4 + a 2 b 4 + a 3 b 4 + α b 4 ) λ 2 + ( a 1 a 2 a 3 μ a 1 a 2 a 4 μ a 1 a 3 a 4 μ + a 2 a 3 a 4 μ a 1 a 2 b 4 + a 1 a 3 b 4 a 2 a 3 b 4 a 3 b 1 μ + a 4 b 1 μ a 2 b 2 μ + a 4 b 2 μ b 1 b 4 b 2 b 4 + b 3 ε μ a 2 α b 4 a 3 α b 4 + α β 1 I 1 c 2 μ + α β 2 I 2 c 2 μ + α β 1 I 1 γ 1 μ + α β 2 γ 2 μ ) λ + ( a 1 a 2 a 3 a 4 μ
a 1 a 2 a 3 b 4 a 3 a 4 b 1 μ a 2 a 4 b 2 μ + a 3 b 1 b 4 + a 2 b 2 b 4 + a 4 b 3 ε μ b 3 b 4 ε )                  
Theorem 1.
If R 1 < 1 and R 2 < 1 , E 0 ( S 0 , 0 , 0 , R 0 , L 0 ) is locally asymptotically stable when τ = 0 .
Proof. 
If τ = 0 , Equation (24) can be depicted:
f ( λ ) = λ 5 + A 4 λ 4 + A 3 λ 3 + A 2 λ 2 + A 1 λ + A 0 + B e λ τ = λ 5 + ( A 4 + μ ) λ 4 + ( A 3 + ( a 1 μ a 2 μ a 3 μ + a 4 μ b 4 ) ) λ 3 + ( A 2 + ( b 1 μ + b 2 μ a 1 a 2 μ a 1 a 3 μ + a 1 a 4 μ + a 2 a 3 μ a 2 a 4 μ a 3 a 4 μ a 1 b 4 + a 2 b 4 + a 3 b 4 + α b 4 ) λ 2 + ( A 1 + ( a 1 a 2 a 3 μ a 1 a 2 a 4 μ a 1 a 3 a 4 μ + a 2 a 3 a 4 μ a 1 a 2 b 4 + a 1 a 3 b 4 a 2 a 3 b 4 a 3 b 1 μ + a 4 b 1 μ a 2 b 2 μ + a 4 b 2 μ b 1 b 4 b 2 b 4 + b 3 ε μ α a 2 b 4 α a 3 b 4 + α β 1 I 1 c 2 μ + α β 2 I 2 c 2 μ + α β 1 I 1 γ 1 μ + α β 2 I 2 γ 2 μ ) ) λ + ( A 0 + ( a 1 a 2 a 3 a 4 μ a 1 a 2 a 3 b 4 a 3 a 4 b 1 μ a 2 a 4 b 2 μ + a 3 b 1 b 4 + a 2 b 2 b 4 + a 4 b 3 ε μ b 3 b 4 ε + a 2 a 3 α b 4 a 3 α β 1 I 1 c 2 μ a 2 α β 2 I 2 c 2 μ a 3 α β 1 I 1 γ 1 μ a 2 α β 2 I 2 γ 2 μ + α β 1 I 1 ε c 2 μ + α β 1 I 1 γ 2 ε μ ) )
Thus, through putting E 0 into Equation (22), we can obtain b 1 = b 2 = b 3 = 0 . Equation (31) can be given as follows:
f ( λ ) = λ 5 + ( A 41 + μ ) λ 4 + ( A 31 + ( a 1 μ a 2 μ a 3 μ + a 4 μ b 4 ) ) λ 3 + ( A 21 + ( a 1 a 2 μ a 1 a 3 μ + a 1 a 4 μ + a 2 a 3 μ a 2 a 4 μ a 3 a 4 μ a 1 b 4 + a 2 b 4 + a 3 b + α b 4 ) ) λ 2 + ( A 11 + ( a 1 a 2 a 3 μ a 1 a 2 a 4 μ a 1 a 3 a 4 μ + a 2 a 3 a 4 μ a 1 a 2 b 4 + a 1 a 3 b 4 a 2 a 3 b 4 α a 2 b 4 α a 3 b 4 + α β 1 I 1 c 2 μ + α β 2 I 2 c 2 μ + α β 1 I 1 γ 1 μ + α β 2 I 2 γ 2 μ ) ) λ + ( A 01 + ( a 1 a 2 a 3 a 4 μ a 1 a 2 a 3 b 4 + α a 2 a 3 b 4 α a 3 β 1 I 1 c 2 μ a 2 α β 2 I 2 c 2 μ + a 3 α β 1 I 1 γ 1 μ a 2 α β 2 I 2 γ 2 μ + α β 1 I 1 ε c 2 μ + α β 1 I 1 γ 2 ε μ ) )
where
n 5 = A 51 = 1 n 4 = A 41 + μ n 3 = A 31 + ( a 1 μ a 2 μ a 3 μ + a 4 μ b 4 ) n 2 = A 21 + ( a 1 a 2 μ a 1 a 3 μ + a 1 a 4 μ + a 2 a 3 μ + a 2 a 3 μ a 2 a 4 μ a 3 a 4 μ a 1 b 4 + a 2 b 4 + a 3 b 4 + α b 4 ) n 1 = A 11 + ( a 1 a 2 a 3 μ a 1 a 2 a 4 μ a 1 a 3 a 4 μ + a 2 a 3 a 4 μ a 1 a 2 b 4 + a 1 a 3 b 4 a 2 a 3 b 4 α a 2 b 4 α a 3 b 4 + α β 1 I 1 c 2 μ + α β 2 I 2 c 2 μ + α β 1 I 1 γ 1 μ + α β 2 I 2 γ 2 μ ) n 0 = A 01 + ( a 1 a 2 a 3 a 4 μ a 1 a 2 a 3 b 4 + α a 2 a 3 b 4 α a 3 β 1 I 1 c 2 μ α a 2 β 2 I 2 c 2 μ α a 3 β 1 I 1 γ 1 μ α a 2 β 2 I 2 γ 2 μ + α β 1 I 1 ε c 2 μ + α β 1 I 1 γ 2 ε μ )
          n 5 = 1 > 0 , Δ 1 = | n 4 | = n 4
Δ 2 = n 4 1 n 2 n 3 = n 4 n 3 n 2
Δ 3 = n 4 1 0 n 2 n 3 n 4 n 0 n 1 n 2 = n 4 ( n 3 n 2 n 4 n 1 ) ( n 2 2 n 4 n 0 )
Δ 4 = n 4 1 0 0 n 2 n 3 n 4 1 n 0 n 1 n 2 n 3 0 0 n 0 n 1 = n 3 n 1 n 3 n 2 n 0 + n 5 n 0 ( n 4 n 1 n 5 n 0 )
Δ 5 = n 4 1 0 0 0 n 2 n 3 n 4 1 0 n 0 n 1 n 2 n 3 n 4 0 0 n 0 n 1 n 2 0 0 0 0 n 0 = n 0 Δ 4
Assumption A1.
For the system (2), when τ = 0 , if the conditions ( R 1 < 1 , R 2 < 1 , Δ 1 > 0 , Δ 2 > 0 , Δ 3 > 0 , Δ 4 > 0 , Δ 5 > 0 ), E 0 ( S 0 , 0 , 0 , R 0 , L 0 ) is locally asymptotically stable in accordance with the Routh–Hurwitz criterion.
Theorem 2.
If R 1 < 1 and R 2 > 1 , E ¯ ( S ¯ , 0 , I ¯ , R ¯ , L ¯ ) is locally asymptotically stable when τ = 0 .
Proof. 
If τ = 0 , according to Equation (22), b 1 = b 3 = 0 and a 3 = 0 can be obtained. Equation (24) can be given as follows:
f ( λ ) = λ 5 + A 4 λ 4 + A 3 λ 3 + A 2 λ 2 + A 1 λ + A 0 + B e λ τ = λ 5 + ( A 4 + μ ) λ 4 + ( A 3 ( a 2 μ a 1 μ a 4 μ + b 4 ) ) λ 3 + ( A 2 + ( b 2 μ a 1 a 2 μ + a 1 a 4 μ a 2 a 4 μ a 1 b 4 + a 2 b 4 + α b 4 ) λ 2 + ( A 1 ( a 1 a 2 a 4 μ + a 1 a 2 b 4 + a 2 b 4 α β 2 I 2 c 2 μ α β 2 I 2 γ 2 μ α + a 2 b 2 μ a 4 b 2 μ + b 2 b 4 ) ) λ + ( A 0 ( a 4 b 2 μ a 2 b 2 b 4 + a 2 α β 2 I 2 c 2 μ + a 2 α β 2 I 2 γ 2 μ ) )
Similarly, according to the Routh–Hurwitz criterion, E ¯ ( S ¯ , 0 , I ¯ , R ¯ , L ¯ ) is locally asymptotically stable. □
Case 1. if τ > 0 ,
B 4 = μ B 3 = ( a 1 μ a 2 μ + a 4 μ b 4 ) B 2 = ( b 2 μ a 1 a 2 μ + a 1 a 4 μ a 2 a 4 μ a 1 b 4 + a 2 b 4 + α b 4 ) B 1 = ( a 1 a 2 a 4 μ a 1 a 2 b 4 a 2 b 2 μ + a 4 b 2 μ b 2 b 4 α a 2 b 4 + α β 2 I 2 c 2 μ + α β 2 I 2 γ 2 μ ) B 0 = ( a 2 a 4 b 2 μ + a 2 b 2 b 4 α a 2 β 2 I 2 c 2 μ α a 2 β 2 I 2 γ 2 μ )
The characteristic equation can be obtained:
f ( λ ) = λ 5 + A 42 λ 4 + A 32 λ 3 + A 22 λ 2 + A 12 λ + A 02 + ( B 4 λ 4 + B 3 λ 3 + B 2 λ 2 + B 1 λ + B 0 ) e λ τ
If the root of Equation (37) is λ = i ω , Equation (37) can be depicted as follows:
f ( i ω ) = ( i ω ) 5 + A 42 ( i ω ) 4 + A 32 ( i ω ) 3 + A 22 ( i ω ) 2 + A 12 ( i ω ) + A 02 + ( B 4 ( i ω ) 4 + B 3 ( i ω ) 3 + B 2 ( i ω ) 2 + B 1 ( i ω ) + B 0 ) e i ω τ
Hence, the imaginary component and real component can be given as:
( A 42 ω 4 A 22 ω 2 + A 02 ) + ( B 4 ω 4 B 2 ω 2 + B 0 ) c o s ( ω τ ) ( B 3 ω 3 B 1 ω ) s i n ( ω τ ) = 0 ( i ω 5 A 32 i ω 3 + A 12 i ω ) ( B 3 i ω 3 B 1 i ω ) c o s ( ω τ ) ( B 4 ω 4 B 2 ω 2 + B 0 ) i s i n ( ω τ ) = 0
A 42 ω 4 A 22 ω 2 + A 02 = ( B 3 ω 3 B 1 ω ) s i n ( ω τ ) ( B 4 ω 4 B 2 ω 2 + B 0 ) c o s ( ω τ ) ω 5 + A 32 ω 3 A 12 ω = ( B 3 ω 3 + B 1 ω ) c o s ( ω τ ) ( B 4 ω 4 B 2 ω 2 + B 0 ) s i n ( ω τ )
Thus, ( 1 + 2 ) can be obtained as follows:
ω 10 + H 81 ω 8 + H 61 ω 6 + H 41 ω 4 + H 21 ω 2 + H 01 = 0
With
H 81 = A 42 2 2 A 32 B 4 2 H 61 = A 32 2 2 A 12 2 A 22 A 42 ( B 3 2 2 B 4 B 2 ) H 41 = A 22 2 + 2 A 02 A 42 2 A 12 A 32 ( 2 B 4 B 0 + B 2 2 2 B 1 B 3 ) H 21 = A 12 2 2 A 12 A 22 ( B 1 2 2 B 2 B 0 ) H 01 = A 02 2 B 0 2
Let V = ω 2 . Equation (40) is given by:
V 5 + H 81 V 4 + H 61 V 3 + H 41 V 2 + H 21 V + H 01 = 0
Obviously, if H 01 < 0 , Equation (42) has one positive root at least. Thus, the assumption can be obtained as follows.
Assumption A2.
We assume Equation (42) has five solutions and each solution has a different τ.
According to Equation (39), ① of Equation (39) can be obtained as follows:
( A 42 ω 4 A 22 ω 2 + A 02 ) ( B 4 ω 4 B 2 ω 2 + B 0 ) B 3 ω 3 B 1 ω = ( B 4 ω 4 B 2 ω 2 + B 0 ) s i n ( ω τ ) ( B 4 ω 4 B 2 ω 2 + B 0 ) B 3 ω 3 B 1 ω c o s ( ω τ )
Hence, Equation (39) of ( + ) is given by:
( A 42 ω 4 A 22 ω 2 + A 02 ) ( B 4 ω 4 B 2 ω 2 + B 02 ) + ( ω 5 + A 32 ω 3 A 12 ω ) ( B 3 ω 3 B 1 ω ) = ( ( B 4 ω 4 B 2 ω 2 + B 0 ) 2 ( B 3 ω ) 3 B 1 ω ) 2 ) c o s ( ω τ )
From Equation (44), the value of τ can be obtained:
P = ( A 42 ω 4 A 22 ω 2 + A 02 ) ( B 4 ω 4 B 2 ω 2 + B 0 ) + ( ω 5 + A 32 ω 3 A 12 ω ) ( B 3 ω 3 B 1 ω ) Q = ( B 4 ω 4 B 2 ω 2 + B 0 ) 2 ( B 3 ω 3 B 0 ω ) 2
where
τ = arccos ( P Q ) + 2 n π 1 ω , n = 1 , 2 , 3
The positive root of Equation (46) obtains the solution of τ . When ω = ω 10 , τ 10 can be obtained:
τ 10 = min τ 1 i 0 , i = 1 , 2 5
Then Equation (37) has a purely imaginary roots ± i ω 10 . When ω = ω 10 , differentiating both side of Equation (37) can be obtained:
d λ d τ = λ ( B 4 λ 4 + B 3 λ 3 + B 2 λ 2 + B 1 λ + B 0 ) e λ τ z 1 + z 2 z 3
With
z 1 = ( 5 λ 4 + 4 A 42 λ 3 + 3 A 32 λ 2 + 2 A 22 λ + A 12 ) z 2 = ( 4 B 4 λ 3 + 3 B 3 λ 2 + 2 B 2 λ + B 1 ) e λ τ z 3 = τ ( B 4 λ 4 + B 3 λ 3 + B 2 λ 2 + B 1 λ + B 0 ) e λ τ
where τ = τ 10 . Equation (48) is given by:
d λ d τ 10 1 = 5 λ 4 + 4 A 42 λ 3 + 3 A 32 λ 2 + 2 A 22 λ + A 12 λ ( λ 5 + A 42 λ 4 + A 32 λ 3 + A 22 λ 2 + A 12 λ + A 02 + 4 B 4 λ 3 + 3 B 3 λ 2 + 2 B 2 λ + B 1 λ ( B 4 λ 4 + B 3 λ 3 + B 2 λ 2 + B 1 λ + B 0 ) τ 10 λ
Thus, R e d λ d τ 10 1 0 is a transversality condition of the Hopf bifurcation theorem. The results can be given as:
Theorem 3.
For the system (2), if R 1 < 1 , R 2 > 1 and τ [ 0 , τ 10 ) , E ¯ ( S ¯ , 0 , I ¯ , R ¯ , L ¯ ) is locally asymptotically stable, and if τ τ 10 , a Hopf bifurcation occurs at E ¯ ( S ¯ , 0 , I ¯ , R ¯ , L ¯ ) .
Theorem 4.
If R 1 > 1 and R 1 > R 2 , E * ( S * , I 1 * , I 2 * , R * , L * ) is locally asymptotically stable when τ = 0 .
Proof. 
If τ = 0 , Equation (24) can be given by:
f ( λ ) = λ 5 + A 43 λ 4 + A 33 λ 3 + A 23 λ 2 + A 13 λ + A 03 + μ λ 4 + ( a 1 μ a 2 μ a 3 μ + a 4 μ b 4 ) λ 3 + ( b 1 μ + b 2 μ a 1 a 2 μ a 1 a 3 μ + a 1 a 4 μ + a 2 a 3 μ a 2 a 4 μ a 3 a 4 μ a 1 b 4 + a 2 b 4 + a 3 b 4 + α b 4 ) λ 2 + ( a 1 a 2 a 3 μ a 1 a 2 a 4 μ a 1 a 3 a 4 μ + a 2 a 3 a 4 μ a 1 a 2 b 4 + a 1 a 3 b 4 a 2 a 3 b 4 a 3 b 1 μ + a 4 b 1 μ a 2 b 2 μ + a 4 b 2 μ b 1 b 4 b 2 b 4 + b 3 μ ε α a 2 b 4 α a 3 b 4 + α β 1 I 1 c 2 μ + α β 2 I 2 c 2 μ + α β 1 I 1 γ 1 μ + α β 2 I 2 γ 2 μ ) λ + ( a 1 a 2 a 3 a 4 μ a 1 a 2 a 3 b 4 a 3 a 4 b 1 μ a 2 a 4 b 2 μ + a 3 b 1 b 4 + a 2 b 2 b 4 + α a 2 a 3 b 4 α a 3 β 1 I 1 c 2 μ α a 2 β 2 I 2 c 2 μ α a 3 β 1 I 1 γ 1 μ α a 2 β 2 I 2 γ 2 μ + α β 1 I 1 ε c 2 μ + α β 1 I 1 γ 2 ε μ + a 4 b 3 ε μ b 3 b 4 μ )
where
p 5 = 1 p 4 = A 43 + μ p 3 = A 33 + ( a 1 μ a 2 μ a 3 μ + a 4 μ b 4 ) p 2 = A 23 + ( b 1 μ + b 2 μ a 1 a 2 μ a 1 a 3 μ + a 1 a 4 μ + a 2 a 3 μ a 2 a 4 μ a 3 a 4 μ a 1 b 4 + a 2 b 4 + a 3 b 4 + α b 4 ) p 1 = A 13 + ( a 1 a 2 a 3 μ a 1 a 2 a 4 μ a 1 a 3 a 4 μ + a 2 a 3 a 4 μ a 1 a 2 b 4 + a 1 a 3 b 4 a 2 a 3 b 4 a 3 b 1 μ + a 4 b 1 μ a 2 b 2 μ + a 4 b 2 μ b 1 b 4 b 2 b 4 + b 3 μ ε α a 2 b 4 α a 3 b 4 + α β 1 I 1 c 2 μ + α β 2 I 2 c 2 μ + α β 1 I 1 γ 1 μ + α β 2 I 2 γ 2 μ ) p 0 = A 03 + ( a 1 a 2 a 3 a 4 μ a 1 a 2 a 3 b 4 a 3 a 4 b 1 μ a 2 a 4 b 2 μ + a 3 b 1 b 4 + a 2 b 2 b 4 + a 4 b 3 ε μ b 3 b 4 μ α a 3 β 1 I 1 c 2 μ α a 2 β 2 I 2 c 2 μ α a 3 β 1 I 1 γ 1 μ α a 2 β 2 I 2 γ 2 μ + α β 1 I 1 ε c 2 μ + α β 1 I 1 γ 2 ε μ )
Then,
Δ 1 = | p 4 | = p 4
Δ 2 = p 4 1 p 2 p 3 = p 4 p 3 p 2
Δ 3 = p 4 1 0 p 2 p 3 p 4 p 0 p 1 p 2 = p 4 ( p 3 p 2 p 4 p 1 ) ( p 2 2 p 4 p 0 )
Δ 4 = p 4 1 0 0 p 2 p 3 p 4 1 p 0 p 1 p 2 p 3 0 0 p 0 p 1 = p 3 p 1 p 3 p 2 p 0 + p 5 p 0 ( p 4 p 1 p 5 p 0 )
Δ 5 = p 4 1 0 0 0 p 2 p 3 p 4 1 0 p 0 p 1 p 2 p 3 p 4 0 0 p 0 p 1 p 2 0 0 0 0 p 0 = p 0 Δ 4
Assumption A3.
For the system (2), when τ = 0 , if the conditions ( R 1 > 1 , R 1 > R 2 , Δ 1 > 0 , Δ 2 > 0 , Δ 3 > 0 , Δ 4 > 0 , Δ 5 > 0 ), E * ( S * , I 1 * , I 2 * , R * , L * ) is local asymptotically stable in accordance with the Routh–Hurwitz criterion.
Case 2. If τ > 0 , Equation (24) can be depicted:
f ( λ ) = λ 5 + A 43 λ 4 + A 33 λ 3 + A 23 λ 2 + A 13 λ + A 03 + ( C 4 λ 4 + C 3 λ 3 + C 2 λ 2 + C 1 λ + C 0 ) e λ τ
With
C 4 = μ C 3 = ( a 1 μ a 2 μ a 3 μ + a 4 μ b 4 ) C 2 = ( ( b 1 μ + b 2 μ a 1 a 2 μ a 1 a 3 μ + a 1 a 4 μ + a 2 a 3 μ a 2 a 4 μ a 3 a 4 μ a 1 b 4 + a 2 b 4 + a 3 b 4 + α b 4 ) C 1 = ( a 1 a 2 a 3 μ a 1 a 2 a 4 μ a 1 a 3 a 4 μ + a 2 a 3 a 4 μ a 1 a 2 b 4 + a 1 a 3 b 4 a 2 a 3 b 4 a 3 b 1 μ + a 4 b 1 μ a 2 b 2 μ + a 4 b 2 μ b 1 b 4 b 2 b 4 + b 3 μ ε α a 2 b 4 α a 3 b 4 + α β 1 I 1 c 2 μ + α β 2 I 2 c 2 μ + α β 1 I 1 γ 1 μ + α β 2 I 2 γ 2 μ ) C 0 = ( a 1 a 2 a 3 a 4 μ a 1 a 2 a 3 b 4 a 3 a 4 b 1 μ a 2 a 4 b 1 μ + a 3 b 1 b 4 + a 2 b 2 b 4 + a 4 b 3 ε μ b 3 b 4 μ + α a 2 a 3 b 4 α a 3 β 1 I 1 c 2 μ α a 2 β 2 I 2 c 2 μ α a 3 β 1 I 1 γ 1 μ α a 2 β 2 I 2 γ 2 μ + α β 1 I 1 ε c 2 μ + α β 1 I 1 γ 2 ε μ )
Suppose that λ = i σ , the real part and imaginary part is given as:
A 43 σ 4 A 23 σ 2 + A 03 + ( C 4 σ 4 C 2 σ 2 + C 0 ) cos σ τ + ( C 3 σ 3 + C 1 σ ) sin σ τ σ 5 A 33 σ 3 + A 13 σ + ( C 3 σ 3 + C 1 σ ) cos σ τ ( C 4 σ 4 C 2 σ 2 + C 0 ) sin σ τ
Let J = σ 2 . ( 2 + 2 ) can be expressed:
J 5 + K 81 J 4 + K 61 J 3 + K 41 J 2 + K 21 J + K 01 = 0
With
K 81 = A 43 2 2 A 33 C 4 2 K 61 = 2 A 13 2 A 43 A 23 + A 33 2 C 3 2 + 2 C 4 C 2 K 41 = 2 A 43 A 03 + A 23 2 2 A 33 A 13 + 2 C 3 C 1 2 C 4 C 0 C 0 2 K 21 = A 13 2 2 A 23 A 03 C 1 2 + 2 C 2 C 0 K 01 = A 03 2 C 0 2
Assumption A4.
If R 1 > 1 and R 1 > R 2 , Equation (57) has five solutions, and each solution has a different τ.
④ of Equation (56) can be depicted as follows:
( A 43 σ 4 A 23 σ 2 + A 03 ) ( C 4 σ 4 C 2 σ 2 + C 0 ) C 3 σ 3 C 1 σ = ( C 4 σ 4 C 2 σ 2 + C 0 ) sin ( σ τ ) ( C 4 σ 4 C 2 σ 2 + C 0 ) 2 C 3 σ 3 C 1 σ cos ( σ τ )
Thus, Equation (59) can be given by:
( A 43 σ 4 A 23 σ 2 + A 03 ) ( C 4 σ 4 C 2 σ 2 + C 0 ) ( σ 5 A 33 σ 3 + A 13 σ ) ( C 3 σ 3 C 1 σ ) = ( ( C 4 σ 4 C 2 σ 2 + C 0 ) + ( C 3 σ 3 C 1 σ ) 2 ) cos ( σ τ )
From Equation (60), τ can be obtained:
τ = arccos ( A 43 σ 4 A 23 σ 2 + A 03 ) ( C 4 σ 4 C 2 σ 2 + C 0 ) ( σ 5 A 33 σ 3 + A 13 σ ) ( C 4 σ 4 C 2 σ 2 + C 0 ) 2 ( C 3 σ 3 C 1 σ ) 2 ) + 2 n π 1 σ n = 1 , 2 , 3
The positive root of Equation (60) can be solved for the solution of τ . When σ = σ 10 , the τ 20 can be obtained:
τ 20 = min τ 2 i 0 , i = 1 , 2 5
Then, Equation (54) has the imaginary roots ± i σ 10 . When σ = σ 10 , differentiating both side of Equation (54) can be obtained:
d λ d τ = λ ( C 4 λ 4 + C 3 λ 3 + C 2 λ 2 + C 1 λ + C 0 ) e λ τ z 4 + z 5 z 6
With
z 4 = ( 5 λ 4 + 4 A 43 λ 3 + 3 A 33 λ 2 + 2 A 23 λ + A 13 ) z 5 = ( 4 C 4 λ 3 + 3 C 3 λ 2 + 2 C 2 λ + C 1 ) e λ τ z 6 = τ ( C 4 λ 4 + C 3 λ 3 + C 2 λ 2 + C 1 λ + C 0 ) e λ τ
where τ = τ 20 . Equation (63) is given by:
d λ d τ 20 1 = 5 λ 4 + 4 A 43 λ 3 + 3 A 33 λ 2 + 2 A 23 λ + A 13 λ ( λ 5 + A 43 λ 4 + A 33 λ 3 + A 23 λ 2 + A 13 λ + A 03 + 4 C 4 λ 3 + 3 C 3 λ 2 + 2 C 2 λ + C 1 λ ( C 4 λ 4 + C 3 λ 3 + C 2 λ 2 + C 1 λ + C 0 ) τ 20 λ
Thus, R e d λ d τ 20 1 0 is a transversality condition of the Hopf bifurcation theorem. The results can be given by the following theorem.
Theorem 5.
For the system (2), if R 1 > 1 , R 1 > R 2 , and τ [ 0 , τ 20 ) , E * ( S * , I 1 * , I 2 * , R * , L * ) is locally asymptotically stable, and if τ τ 20 , a Hopf bifurcation occurs at E * ( S * , I 1 * , I 2 * , R * , L * ) .

4. Direction and Stability of the Hopf Bifurcation

In this section, the Hopf bifurcation’s properties of the system (2) will be analyzed. Let τ = τ 0 + μ , μ R (In this part, μ is different from above). μ = 0 is value of the bifurcation of the system (2). It can be obtained that μ 1 ( t ) = S ( t ) S * , μ 2 ( t ) = I 1 ( t ) I 1 * , μ 3 ( t ) = I 2 ( t ) I 2 * , μ 4 ( t ) = R ( t ) R * , μ 5 ( t ) = L ( t ) L * . The system is written as:
μ ˙ ( t ) = L μ μ t + F ( μ , μ t )
where μ ( t ) = ( μ 1 ( t ) , μ 2 ( t ) , μ 3 ( t ) , μ 4 ( t ) , μ 5 ( t ) ) T C W = C ( [ 1 , 0 ] , R 5 ) .
L u ϕ = ( τ 0 + μ ) ( A ϕ ( 0 ) + B ϕ ( 1 ) )
With
F ( μ , ϕ ) = ( τ 0 + μ ) = β 1 ϕ 1 ( 0 ) ϕ 2 ( 0 ) β 2 ϕ 1 ( 0 ) ϕ 3 ( 0 ) β 1 ϕ 1 ( 0 ) ϕ 2 ( 0 ) β 2 ϕ 1 ( 0 ) ϕ 3 ( 0 ) 0 0 ,
and
A = a 11 a 12 a 13 a 14 0 a 21 a 22 0 0 0 a 31 a 32 a 33 0 0 0 a 42 a 43 a 44 0 a 51 a 52 a 53 a 54 a 55 ,
B = 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 b 45 0 0 0 0 b 55
The adjoint operator A * ( φ ) of A ( 0 ) is defined as:
A * ( φ ) = d φ ( s ) d s 0 < s 1 1 0 d η T ( s , 0 ) φ ( s ) s = 0
The formula can be defined as:
| φ ( s ) , ϕ ( θ ) | = φ ¯ ( 0 ) ϕ ( 0 ) θ = 1 0 θ ξ φ ¯ ( ξ θ ) d η ( θ ) ϕ ( ξ ) d ξ
η ( θ ) = η ( θ , 0 ) . h ( θ ) = ( 1 , h 2 , h 3 , h 4 , h 5 ) T e i ω 0 τ 0 θ is the eigenvector of A ( 0 ) , and h * ( s ) = D ( 1 , h 2 * , h 3 * , h 4 * , h 5 * ) T e i ω 0 τ s is the eigenvector of A * ( 0 ) . The eigenvector of A * ( 0 ) and A ( 0 ) are i ω 0 τ 0 and i ω 0 τ 0 , and the matrix operations are given by:
a 11 i ω 0 a 12 a 13 a 14 0 a 21 a 22 i ω 0 0 0 0 a 31 a 32 a 33 i ω 0 0 0 0 a 42 a 43 a 44 i ω 0 b 45 e i ω 0 τ 0 a 51 a 52 a 53 a 54 a 55 + b 55 e i ω 0 τ 0 i ω 0 1 h 2 h 3 h 4 h 5 = 0
and
a 11 + i ω 0 a 21 a 31 0 a 51 a 12 a 22 + i ω 0 a 32 a 42 a 52 a 13 0 a 33 + i ω 0 a 43 a 53 a 14 0 0 a 44 + i ω 0 a 54 a 15 0 0 b 45 e i ω 0 τ 0 a 55 + b 55 e i ω 0 τ 0 + i ω 0 1 h 2 * h 3 * h 4 * h 5 * = 0
The results can be obtained as follows:
h 1 = 1                    
h 2 = β 1 I 1 β 1 S ( c 2 + d + γ 1 + ε ) i ω 0       
      h 3 = β 2 I 2 ( β 1 S ( c 2 + d + γ 1 + ε ) i ω 0 ) + ε β 1 I 1 ) ( β 1 S ( c 2 + d + γ 1 + ε ) i ω 0 ) ( β 2 S ( c 2 + d + γ 2 ) i ω 0 )
h 4 = β 1 I 1 + β 2 I 2 + ( c 1 + d ) + i ω 0 + β 1 S h 2 + β 2 S H 3 α
h 5 = c 1 + c 2 h 2 + c 2 h 3 + c 1 h 4 d + μ e i ω 0 τ 0 + i ω 0            
and
h 1 * = 1
h 2 * = β 1 I 1 + β 2 I 2 + ( c 1 + d ) i ω 0 β 2 I 2 h 3 * c 1 h 5 * β 1 I 1
h 3 * = β 2 S γ 2 h 4 * c 2 h 5 * β 2 S ( c 2 + d + γ 2 ) + i ω 0        
h 4 * = α ( c 1 + d + α ) + i ω 0         
h 5 * = α ( ( c 1 + d + α ) + i ω 0 ) ( d + μ e i ω 0 τ 0 i ω 0 )
where h * ( s ) , h ( θ ) = 1 . From Equation (68), the equation can be given by
h * ( s ) , h ( θ ) = D ¯ ( 1 + h ¯ 2 * h 2 + h ¯ 3 * h 3 + h ¯ 4 * h 4 + h ¯ 5 * h 5 ) D ¯ θ = 1 0 ( 1 , h ¯ 2 * , h ¯ 3 * , h ¯ 4 * , h ¯ 5 * ) e i ω 0 τ 0 θ d η ( θ ) ϕ ( θ ) ( 1 , h 2 , h 3 , h 4 , h 5 ) T h * ( s ) , h ( θ ) = D ¯ ( 1 + h ¯ 2 * h 2 + h ¯ 3 * h 3 + h ¯ 4 * h 4 + h ¯ 5 * h 5 ) + τ 0 e i ω 0 τ ( b 45 h ¯ 4 * h 5 + b 55 h ¯ 5 * h 5 )
Then, we can choose
D ¯ = ( 1 + h ¯ 2 * h 2 + h ¯ 3 * h 3 + h ¯ 4 * h 4 + h ¯ 5 * h 5 + ( τ 0 e i ω 0 τ ( b 45 h ¯ 4 * h 5 + b 55 h ¯ 5 * h 5 ) ) 1
According to the center manifold theory, the coordinate is calculated to express the manifold C 0 at μ = 0 . When μ = 0 , define:
z ( t ) = h * , μ t W ( t , θ ) = μ t ( θ ) 2 R e { z ( t ) h ( θ ) }
With C 0 , it is given by:
W ( t , θ ) = W ( z ( t ) , z ¯ ( t ) , θ )
where
W ( z , z ¯ , θ ) = W 20 ( θ ) z 2 2 + W 11 ( θ ) z z ¯ + W 02 ( θ ) z ¯ 2 2 + W 30 ( θ ) z 3 6 + ,
Then, z and z ¯ are local coordinates for C 0 in the direction of h * and h ¯ * , and the real solution is considered. Thus:
z ˙ ( t ) = i ω 0 τ 0 z + h ¯ * ( 0 ) f ( 0 , W ( z , z ¯ , θ ) + 2 R e { z h ( θ ) } ) = i ω 0 τ 0 z + h ¯ * ( 0 ) f 0 ( z , z ¯ ) ,
that is:
z ˙ ( t ) = i ω 0 τ 0 z ( t ) + g ( z , z ¯ )
With
g ( z , z ¯ ) = h ¯ * ( 0 ) f 0 ( z , z ¯ ) = g 20 z 2 2 + g 11 z z ¯ + g 02 z ¯ 2 2 + g 21 z 2 z ¯ 2 +
According to Equation (84), Equation (86), and f 0 ( z , z ¯ ) = F ( 0 , μ ( t ) ) , it is given by
g ( z , z ¯ ) = τ 0 D ¯ ( 1 , h ¯ 2 * , h ¯ 3 * , h ¯ 4 * , h ¯ 5 * ) β 1 ϕ 1 ( 0 ) ϕ 2 ( 0 ) β 2 ϕ 1 ( 0 ) ϕ 3 ( 0 ) β 1 ϕ 1 ( 0 ) ϕ 2 ( 0 ) β 2 ϕ 1 ( 0 ) ϕ 3 ( 0 ) 0 0
Thus,
g ( z , z ¯ ) = τ 0 D ¯ { ( z + z ¯ + W 20 ( 1 ) ( 0 ) z 2 2 + W 11 ( 1 ) ( 0 ) z z ¯ + W 02 ( 1 ) ( 0 ) z ¯ 2 2 + o ( | ( z , z ¯ ) | 4 ) ) ( β 1 ( h 2 z + h ¯ 2 z ¯ + W 20 ( 2 ) ( 0 ) z 2 2 + W 11 ( 2 ) ( 0 ) z z ¯ + W 02 ( 2 ) ( 0 ) z ¯ 2 2 + o ( | ( z , z ¯ ) | 4 ) + β 2 ( h 3 z + h ¯ 3 z ¯ + W 20 ( 3 ) ( 0 ) z 2 2 + W 11 ( 3 ) ( 0 ) z z ¯ + W 02 ( 3 ) ( 0 ) z ¯ 2 2 + o ( | ( z , z ¯ ) | 4 ) ) ) + h ¯ 2 * ( β 1 ( z + z ¯ + W 20 ( 1 ) ( 0 ) z 2 2 + W 1 ( 1 ) ( 0 ) z z ¯ + W 02 ( 1 ) ( 0 ) z ¯ 2 2 + o ( | ( z , z ¯ ) | 4 ) ) ( h 2 z + h ¯ 2 z ¯ + W 20 ( 2 ) ( 0 ) z 2 2 + W 11 ( 2 ) ( 0 ) z z ¯ + W 02 ( 2 ) ( 0 ) z ¯ 2 2 + o ( | ( z , z ¯ ) | 4 ) ) + h ¯ 3 * ( β 2 ( z + z ¯ + W 20 ( 1 ) ( 0 ) z 2 2 + W 11 ( 1 ) ( 0 ) z z ¯ + W 02 ( 1 ) ( 0 ) z ¯ 2 2 + o ( | ( z , z ¯ ) | 4 ) ) ( h 3 z + h ¯ 3 z ¯ + W 20 ( 3 ) ( 0 ) z 2 2 + W 11 ( 3 ) ( 0 ) z z ¯ + W 02 ( 3 ) ( 0 ) z ¯ 2 2 + o ( | ( z , z ¯ ) | 4 ) ) ) }
The coefficients of the Hopf bifurcation’s properties are given by:
g 20 = 2 τ 0 D ¯ ( β 1 h 2 ( h ¯ 2 * 1 ) + β 2 h 3 ( h ¯ 3 * ) ) g 11 = τ 0 D ¯ ( β 1 ( h 2 + h ¯ 2 ) β 2 ( h 3 + h ¯ 3 ) + h ¯ 2 * β 1 ( h 2 + h ¯ 2 ) + h ¯ 3 * β 2 ( h 3 + h ¯ ) ) g 02 = 2 τ 0 D ¯ ( β 1 h ¯ 2 ( h ¯ 2 * 1 ) + β 2 h ¯ 3 ( h ¯ 3 * 1 ) ) g 21 = τ 0 D ¯ ( β 1 ( h ¯ 2 * 1 ) ( 2 W 11 ( 2 ) ( 0 ) + W 20 ( 2 ) ( 0 ) + h ¯ 2 W 20 ( 1 ) ( 0 ) + 2 h 2 W 11 ( 1 ) ( 0 ) ) + β 2 ( h ¯ 3 * 1 ) ( 2 W 11 ( 3 ) ( 0 ) + W 20 ( 3 ) ( 0 ) + h ¯ 3 W 20 ( 1 ) ( 0 ) + 2 h 3 W 11 ( 1 ) ( 0 ) ) )
However, there are W 11 ( θ ) and W 20 ( θ ) in g 21 . The formula can be obtained as follows:
H ( z , z ¯ , θ ) = H 20 ( θ ) z 2 2 + H 11 ( θ ) z z ¯ + H 02 ( θ ) z ¯ 2 2 +
and
W 20 ( θ ) = i g 20 ω 0 τ 0 h ( 0 ) e i ω 0 τ 0 θ + i g ¯ 02 3 ω 0 τ 0 h ¯ ( 0 ) e i ω 0 τ 0 θ + E 1 e 2 i ω 0 τ 0 θ W 11 ( θ ) = i g 11 ω 0 τ 0 h ( 0 ) e i ω 0 τ 0 θ + i g ¯ 11 ω 0 τ 0 h ¯ ( 0 ) e i ω 0 τ 0 θ + E 2
From Equation (89), it is given by:
H 20 ( 0 ) = g 20 h ( 0 ) g ¯ 02 h ¯ ( 0 ) + 2 β 1 h 2 2 β 2 h 3 2 β 1 h 2 2 β 2 h 3 0 0 .
and
H 11 ( 0 ) = g 11 h ( 0 ) g ¯ 11 h ¯ ( 0 ) + β 1 ( h 2 + h ¯ 2 ) β 2 ( h 3 + h ¯ 3 ) β 1 ( h 2 + h ¯ ) β 2 ( h 3 + h ¯ 3 ) 0 0 .
Thus, substituting (90), H 20 ( 0 ) and H 11 ( 0 ) , we can obtain the matrix:
E 1 = 2 i ω 0 a 11 a 12 a 13 a 14 0 a 21 2 i ω 0 a 22 0 0 0 a 31 a 32 2 i ω 0 a 33 0 0 0 a 42 a 43 2 i ω 0 a 44 b 45 e 2 i ω 0 τ 0 a 51 a 52 a 53 a 54 2 i ω 0 a 55 b 55 e 2 i ω 0 τ 0 1 E 1 ( 1 ) E 1 ( 2 ) E 1 ( 3 ) 0 0
and
E 2 = a 11 a 12 a 13 a 14 0 a 21 a 22 0 0 0 a 31 a 32 a 33 0 0 0 a 42 a 43 a 44 a 45 + b 45 a 51 a 52 a 53 a 54 a 55 + b 55 1 E 2 ( 1 ) E 2 ( 2 ) E 2 ( 3 ) 0 0
where,
E 1 ( 1 ) = 2 β 1 h 2 2 β 2 h 3 E 1 ( 2 ) = 2 β 1 h 2 E 1 ( 3 ) = 2 β 2 h 3 E 2 ( 1 ) = β 1 ( h 2 + h ¯ 2 ) β 2 ( h 3 + h ¯ 3 ) E 2 ( 2 ) = β 1 ( h 2 + h ¯ 2 ) E 2 ( 3 ) = β 2 ( h 3 + h ¯ 3 )
Consequently, the values can be calculated:
C 1 ( 0 ) = i 2 ω 0 τ 0 ( g 11 g 20 2 | g 11 |   2 | g 02 | 2 3 ) + g 21 2 ψ 2 = 2 R e { C 1 ( 0 ) } μ 2 = R e { C 1 ( 0 ) } R e { λ ( τ 0 ) } T 2 = I m { C 1 ( 0 ) } + μ 2 I m { λ ( τ 0 ) } τ 0 ω 0
Theorem 6.
For the system (2), μ 2 , ψ 2 , and T 2 explain the bifurcation properties. μ 2 determines the direction of the Hopf bifurcation (subcritical if μ 2 < 0 , supercritical if μ 2 > 0 ); ψ 2 determines the stability of the periodic solutions of bifurcation (stable if ψ 2 < 0 , unstable if ψ 2 > 0 ); and T 2 determines the period of the periodic solutions of bifurcation (decrease if T 2 < 0 , increase if T 2 > 0 ).

5. Optimal Strategy

In this section, the strategy of optimal control including installing immune patches or removing viruses is proposed to control the malware.
The parameters γ 1 = u 1 ( t ) and γ 2 = u 2 ( t ) are introduced. Thus, the optimal control system is given by:
d S d t = A β 1 S I 1 β 2 S I 2 c 1 S d S + α R d I 1 d t = β 1 S I 1 ( c 2 + d + ε ) I 1 u 1 ( t ) I 1 d I 2 d t = β 2 S I 2 ( c 2 + d ) I 2 + ε I 1 u 2 ( t ) I 2 d R d t = u 1 ( t ) 1 I 1 + u 2 ( t ) 2 I 2 + μ L ( t τ ) ( c 1 + d + α ) R d L d t = c 1 ( R + S ) + c 2 ( I 2 + I 1 ) μ L ( t τ ) d L
U = { ( u 1 ( t ) , u 2 ( t ) ) L 2 [ 0 , T ] : 0 t T , 0 u 1 ( t ) 1 , 0 u 2 ( t ) 1 } , u ( t ) is a control variable, and it satisfies the Lebesgue measurable.
Thus, the objective function is given by:
J ( U ) = 0 T I 1 ( t ) + I 2 ( t ) + m 2 u 1 ( t ) 2 + n 2 u 2 ( t ) 2 d t
m and n are positive weighting factors. The Lagrangian function is given by:
L ( I 1 , I 2 , u ) = I 1 ( t ) + I 2 ( t ) + m 2 u 1 ( t ) 2 + n 2 u 2 ( t ) 2
where
x ( t ) = ( S ( t ) , I 1 ( t ) , I 2 ( t ) , R ( t ) , L ( t ) ) x τ ( t ) = ( S τ ( t ) , I 1 τ ( t ) , I 2 τ , R τ ( t ) , L τ ( t ) ) T = ( S ( t τ ) , I 1 ( t τ ) , I 2 ( t τ ) , R ( t τ ) , L ( t τ ) ) λ ( t ) = ( λ 1 ( t ) , λ 2 ( t ) , λ 3 ( t ) , λ 4 ( t ) , λ 5 ( t ) )
The Hamiltonian function can be given as:
H ( x , x τ , u , λ ) = L ( I 1 , I 2 , u ) + λ 1 ( t ) d S d t + λ 2 ( t ) d I 1 d t + λ 3 ( t ) d I 2 d t + λ 4 ( t ) d R d t + λ 5 ( t ) d L d t
where ( λ 1 ( t ) , λ 2 ( t ) , λ 3 ( t ) , λ 4 ( t ) , λ 5 ( t ) ) are the adjoint functions.
The indicative function is introduced as follows:
X [ 0 , T τ ] ( t ) = 1 i f 0 t T τ 0 i f T τ t T
According to the Pontryagin’s maximum principle, the necessary conditions of the optimal control are the state equation X ˙ ( t ) = H λ ( X , X τ , u , λ ) ( t ) , the optimal condition 0 = H u ( X , X τ , u , λ ) ( t ) , and the adjoint equation d λ d t = H x ( X , X τ , u , λ ) ( t ) + λ ( t + τ ) H X τ ( X , X τ , u , λ ) ( t ) .
Theorem 7.
For the optimal control system, let S * ( t ) , I 1 * ( t ) , I 2 * ( t ) , R * ( t ) , and L * ( t ) be the optimal state solutions of the optimal related to u 1 * ( t ) and u 2 * ( t ) . There are λ 1 ( t ) , λ 2 ( t ) , λ 3 ( t ) , λ 4 ( t ) , and λ 5 ( t ) satisfying the following:
d λ 1 d t = λ 1 ( t ) ( β 1 I 1 + β 2 I 2 + ( c 1 + d ) ) λ 2 ( t ) β 1 I 1 λ 3 ( t ) β 2 I 2 λ 5 ( t ) c 1 d λ 2 d t = 1 + λ 1 ( t ) β 1 S λ 2 ( t ) ( β 1 S ( c 2 + d + ϵ ) u 1 ( t ) ) λ 3 ( t ) ϵ λ 4 ( t ) u 1 ( t ) λ 5 ( t ) c 2 d λ 3 d t = 1 + λ 1 ( t ) β 2 S λ 3 ( t ) ( β 2 S ( c 2 + d ) u 2 ( t ) ) λ 4 ( t ) u 2 ( t ) λ 5 ( t ) c 2 d λ 4 d t = λ 1 ( t ) α + λ 4 ( t ) ( c 1 + d + α ) λ 5 c 1 d λ 5 d t = λ 4 ( t + τ ) μ + λ 5 ( t + τ ) μ + λ 5 d
The transversality conditions are as follows:
λ i ( T ) = 0 , i = 1 , 2 , 3 , 4 , 5
The optimal control can be shown as:
u 1 * = m a x { m i n { ( λ 2 ( t ) λ 4 ( t ) ) I 1 * m , 1 } , 0 } u 2 * = m a x { m i n { ( λ 3 ( t ) λ 4 ( t ) ) I 2 * n , 1 } , 0 }

6. Simulation

In this section, the theoretical results are illustrated and completed by simulation, including three parts. The first part explains the relationship between the parameters and the reproductive numbers. The second part illustrates the trend in the quantity of state nodes and the bifurcation properties of the system. The last part describes the result of the optimal control.

6.1. Relationship between Parameters and Basic Reproductive Numbers

The relationship between basic reproductive numbers and other parameters are shown in Figure 1. The initial parameters are set as: A = 10 , β 1 = 0.04 , γ 1 = 0.2 , c 1 = 0.3 , c 2 = 0.2 , d = 0.1 , and ε = 0.4 . As shown in Figure 1a, it can be observed that with the increase in d, the basic reproductive number R 1 decreases, and with the increase in β 1 , R 1 increases. When c 1 = 0 , γ 1 = 0 , or ε = 0 , with the increase in β 1 , R 1 increases. Therefore, there is a linear relationship among β 1 , d, and R 1 .
As shown in Figure 1b, the initial parameters are set as: A = 10 , β 2 = 0.03 , γ 2 = 0.4 , c 2 = 0.2 , and d = 0.1 . Let β 2 and d vary. With the increase in d, the basic reproductive number R 2 decreases, and with the increase in β 2 , R 2 increases. There is a linear relationship among β 2 , d, and R 2 .

6.2. The Trend of the Quantity of State Nodes

In Section 2 and Section 3, the three solutions of the system (2) are calculated by analyzing and demonstrating. The following part will illustrate the theoretical results. The influence of different Hopf bifurcation points ( τ ) are illustrated. Through analyzing three conditions, including E 0 , E ¯ , and E * , we can obtain the variation in the state nodes and the stable situation.
Firstly, the disease-free equilibrium and the basic reproductive numbers R 1 < 1 and R 2 < 1 need to be satisfied. Thus, the initial parameters are set as: A = 20 , β 1 = 0.0029 , β 2 = 0.003 , γ 1 = 0.3 , γ 2 = 0.2 , c 1 = 0.15 , c 2 = 0.22 , μ = 0.46 , d = 0.2 , ϵ = 0.1 , and α = 0.115 . Moreover, the initial value are S = 30, I 1 = 28, I 2 = 20, R = 12, and L = 10. The basic reproductive numbers can be obtained as R 1 = 0.2021 < 1 and R 2 = 0.2726 < 1 , and the disease-free equilibrium is obtained as E 0 ( 63.1620 , 0 , 0 , 18.3199 , 18.5181 ) . Obviously, the condition of Theorem 1 is satisfied. Then, by some complicated computations with Matlab software, we can obtain ω 0 = 0.2985 and τ 10 = 8.1591 . As shown in Figure 2, there are different cases of the quantity of state nodes. It is shown that the system is locally asymptotically stable when τ = 6.368 < τ 10 . From Figure 3a, it is shown that the system is unstable and goes into oscillation when τ = 8.1593 > τ 10 . As shown in Figure 3b, the quantity of nodes has a particular variation like an elliptic curve. In a word, the quantity of I 1 and I 2 always tend to zero finally, whatever τ is.
To ensure R 1 < 1 and R 2 > 1 , the initial parameters are set as A = 20 , β 1 = 0.004 , β 2 = 0.03 , γ 1 = 0.2 , γ 2 = 0.4 , c 1 = 0.15 , c 2 = 0.22 , μ = 0.46 , d = 0.2 , ϵ = 0.4 , and α = 0.2 , and the initial values are S = 30 , I 1 = 28 , I 2 = 20 , R = 12 , and L = 10 . Through computation, we can obtain R 1 = 0.2241 < R 2 = 2.0906 . It is obvious that this system has a fixed positive boundary equilibrium E ¯ = ( 27.3332 , 0 , 20.4987 , 31.8780 , 20.2900 ) . It is easy to obtain τ 20 = 8.4822 . As shown in Figure 4a, the system is locally asymptotically stable if τ = 5.891 < τ 20 . From Figure 4b, the system is unstable and goes into oscillation. In short, if the charging delay is τ < τ 20 , the system will be stable eventually; if the charging delay τ is greater than the critical value τ 20 , the system will lose stability and goes into oscillation. The quantity of I 1 still tends to zero at the end of the time.
Lastly, considering the endemic equilibrium, it is necessary to ensure R 1 > 1 and R 1 > R 2 . The initial parameters are set as: A = 20 , β 1 = 0.2 , β 2 = 0.03 , γ 1 = 0.15 , γ 2 = 0.4 , c 1 = 0.28 , c 2 = 0.18 , μ = 0.66 , d = 0.2 , ϵ = 0.2 , and α = 0.45 . The basic reproductive numbers can be obtained as R 1 = 11.4155 > R 2 = 1.6026 . Thus, the endemic equilibrium is E * = ( 3.6501 , 39.0175 , 11.6384 , 25.5761 , 20.1179 ) . The parameters are set to satisfy the Hopf condition, and the initial values of the nodes are set as ( S , I 1 , I 2 , R , L ) = ( 20 , 35 , 10 , 20 , 15 ) . We can obtain ω 02 = 0.4706 and the critical value τ 30 = 4.9049 . As shown in Figure 5a, it is shown that the quantity of nodes of this system is from oscillation to stability when the charging delay τ = 3.2049 < τ 30 . Thus, the system is locally asymptotically stable. From Figure 5b, if τ > τ 30 , the system will be unstable and goes into oscillation, and this diagram is a particular condition that the system is a periodic oscillation.

6.3. Optimal Control Strategy Analysis

In this part, the control factor is added to this system, and the optimal control method is proposed to consider the cost of treating the infected nodes. The theoretical analysis for the optimal control is demonstrated in Section 5. In this part, there are different methods of control, including maximum control, minimum control, average control, and optimal control [43].
The parameters are set as A = 20 , β 1 = 0.389 , β 2 = 0.1 , c 1 = 0.15 , c 2 = 0.22 , μ = 0.56 , ϵ = 0.2 , α = 0.115 , d = 0.2 , and τ = 2.2 . The maximum control means full treatment; that is, the parameters’ values are set as γ 1 = 1 and γ 2 = 1 . The minimum control means no treatment; that is, the parameters’ values are set as γ 1 = 0 and γ 2 = 0 . The optimal control means γ 1 = u 1 ( t ) and γ 2 = u 2 ( t ) ; that is, u 1 ( t ) and u 2 ( t ) are the control curves of the patch input. Then, the average control is the average of the optimal control curve. When m = 30 and n = 20 , the control curves are shown in Figure 6. Obviously, u 1 ( t ) is always greater than u 2 ( t ) . As shown in Figure 7, we can obtain the curves of the cost for different methods. It is obvious that the cost of optimal control is the minimum. When τ = 3.2 , the optimal control curve is shown in Figure 8. When τ = 5.2 , the optimal control curve is shown in Figure 9. Thus, the larger the charging delay, the more oscillation appears in the optimal control curve.
When τ = 2.2 , Figure 10 shows the ratio of different nodes for four control cases. For four cases, the proportion of S is the smallest and the proportion of R is the largest than the other state nodes of all the nodes. It is obvious that the ratios of I 1 and I 2 are lower for the full treatment than those for the no treatment. The ratio of I 1 decreases to 15.32 % , and I 2 decreases to 3.11 % . With the optimal control, the ratio of I 1 decreases to 18.67 % and I 2 decreases to 7.31 % . Then, the average control can also control the ratios of I 1 and I 2 .
As shown in Figure 11, the variation in nodes is shown. In addition to no treatment, the recovered nodes curve is the highest, which means that the number of recovered nodes is more than that of the other two control methods. The numbers I 1 and I 2 are less than that of no treatment. From Figure 11a, at the end of time, there is a noticeable wobble in the end of the optimal control curve.
In summary, according to the above analysis, the full treatment has the best effect to control the numbers of I 1 and I 2 when the control strategy of the system does not consider the cost. However, optimal control has the best effect to control the numbers of I 1 and I 2 when the control strategy of the system considers the cost.

7. Conclusions

In this paper, to investigate the malware propagation with charging delay and virus mutation in WRSNs, a new model is constructed and analyzed which improves the SIR model. The model involves a mutation which is caused by the infected variation. There is a charging delay in sensors. Unlike the SIR model, there are three equilibrium points including disease free equilibrium, boundary equilibrium, and endemic equilibrium. The analysis reveals the local stability of equilibrium points when the charging delay τ equals to zero. If R 1 < 1 and R 2 < 1, the malware does not affect the WRSNs and the malware will reduce to zero. In this charging delay model, the locally asymptotic stability is proven when τ is less than τ 0 . There are three different Hopf bifurcations.The system goes through a Hopf bifurcation, and the system goes into oscillation when τ is larger than τ 0 .
Meanwhile, the intent to study the SIIRL model of malware propagation in the WSN is used for controlling the spreading of mutation malware. We propose control strategies including full treatment control, average control, no treatment control, and optimal control. The cost relationships among the four control methods are O p t i m a l > A v e r a g e > F u l l > N o . In addition, the malware proportion relationships among the four control methods are F u l l > O p t i m a l > A v e r a g e > N o . Thus, considering the malware proportion and control cost, the best control method is optimal control. At the same time, the optimal control of the mutation model is also affected by the charging delay. The bigger the charging delay, the more oscillation appears in the optimal control curve. Finally, all of the theoretical analyses are proven by numerical simulation.
This paper discusses a mutation model with a charging delay. Although the dynamic propagation model is analyzed and the control strategy is proposed, there still exists an interesting work on how to establish rate of infection with actual situation. This work needs to be further studied in the future. However, with the development of networks, the heterogeneous network is one of our future research directions. Meanwhile, the stochastic model [50] and fractional order model [51] are also the trends in our future research.

Author Contributions

Conceptualization, G.L., Z.P. and X.X.; methodology, G.L., Z.P. and X.Z.; software, G.L. and Z.P.; validation, G.L., Z.P. and X.Z.; formal analysis, G.L. and Z.P.; investigation, G.L., Z.P. and Z.L.; writing—original draft preparation, Z.P.; writing—review and editing, G.L., Z.P. and Z.L. All authors have read and agreed to the published version of the manuscript.

Funding

The National Natural Science Foundation of China (51975136, 52075109), the National Key Research and Development Program of China (2018YFB2000501), the Science and Technology Innovative Research Team Program in Higher Educational Universities of Guangdong Province (2017KCXTD025), the Special Research Projects in the Key Fields of Guangdong Higher Educational Universities (2019KZDZX1009), the Science and Technology Research Project of Guangdong Province (2017A010102014), the Industry-University-Research Cooperation Key Project of Guangzhou Higher Educational Universities (202235139), and the Guangzhou University Research Project (YJ2021002).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

References

  1. Li, W.; Zhu, H. Research on Comprehensive Enterprise Network Security. In Proceedings of the 2021 IEEE 11th International Conference on Electronics Information and Emergency Communication (ICEIEC), Beijing, China, 18 20 June 2021; pp. 1–6. [Google Scholar]
  2. Manshaei, M.H.; Zhu, Q.; Alpcan, T.; Bacşar, T.; Hubaux, J.P. Game theory meets network security and privacy. ACM Comput. Surv. (CSUR) 2013, 45, 1–39. [Google Scholar] [CrossRef]
  3. Jing, Q.; Vasilakos, A.V.; Wan, J.; Lu, J.; Qiu, D. Security of the Internet of Things: Perspectives and challenges. Wirel. Netw. 2014, 20, 2481–2501. [Google Scholar] [CrossRef]
  4. Sandra, S.H.; Natarajan, S.; Sakir, S. A survey of security in software defined networks. IEEE Commun. Surv. Tutorials 2015, 2015, 623–654. [Google Scholar]
  5. Kulkarni, R.V.; Förster, A.; Venayagamoorthy, G.K. Computational intelligence in wireless sensor networks: A survey. IEEE Commun. Surv. Tutorials 2010, 13, 68–96. [Google Scholar] [CrossRef]
  6. Farash, M.S.; Turkanović, M.; Kumari, S.; Hölbl, M. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Netw. 2016, 36, 152–176. [Google Scholar] [CrossRef]
  7. Butun, I.; Morgera, S.D.; Sankar, R. A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutorials 2013, 16, 266–282. [Google Scholar] [CrossRef]
  8. Ren, Q.C.; Liang, Q.L. Energy and quality aware query processing in wireless sensor database systems. Inf. Sci. 2007, 177, 2188–2205. [Google Scholar] [CrossRef]
  9. Lenin, R.B.; Ramaswamy, S. Anosov flows with stable and unstable differentiable distributions. Ann. Oper. Res. 2015, 233, 237–261. [Google Scholar] [CrossRef]
  10. Kephart, J.O.; White, S.R. Directed-graph epidemiological models of computer viruses. In Computation: The Micro and the Macro View; World Scientific: Singapore, 1992; pp. 71–102. [Google Scholar]
  11. Kephart, J.O.; White, S.R. Measuring and modeling computer virus prevalence. In Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, 24–26 May 1993; pp. 2–15. [Google Scholar]
  12. Liu, W.P.; Liu, C.; Yang, Z.; Liu, X.Y.; Zheng, Y.H.; Wei, Z.X. Modeling the propagation of mobile malware on complex networks. Commun. Nonlinear Sci. Numer. Simul. 2016, 37, 249–264. [Google Scholar] [CrossRef]
  13. Zhu, L.H.; Zhou, X.; Li, Y.M. Global dynamics analysis and control of a rumor spreading model in online social networks. Phys. A Stat. Mech. Its Appl. 2019, 526, 120903. [Google Scholar] [CrossRef]
  14. Li, J.X.; Ning, R.; Zhen, J. An SICR rumor spreading model in heterogeneous networks. Discret. Contin. Dyn.-Syst.-B 2020, 25, 1497. [Google Scholar] [CrossRef] [Green Version]
  15. Choi, S.H.; Seo, H.; Yoo, M. A multi-stage SIR model for rumor spreading. Discret. Contin. Dyn. Syst.-B. 2020, 25, 2351. [Google Scholar] [CrossRef] [Green Version]
  16. Huang, Y.A.; Tang, M.; Zou, Y.; Zhou, J. Hybrid phase transitions of spreading dynamics in multiplex networks. Chin. J. Phys. 2018, 56, 1166–1172. [Google Scholar] [CrossRef]
  17. Khayam, S.A.; Radha, H. Using signal processing techniques to model worm propagation over wireless sensor networks. IEEE Signal Process. Mag. 2006, 23, 164–169. [Google Scholar] [CrossRef]
  18. Feng, L.P.; Song, L.P.; Zhao, Q.S.; Wang, H.B. Modeling and stability analysis of worm propagation in wireless sensor network. Math. Probl. Eng. 2015, 2015, 129598. [Google Scholar] [CrossRef] [Green Version]
  19. Singh, A.; Awasthi, A.K.; Singh, K.; Srivastava, P.K. Modeling and analysis of worm propagation in wireless sensor networks. Wirel. Pers. Commun. 2018, 98, 2535–2551. [Google Scholar] [CrossRef]
  20. Ojha, R.P.; Srivastava, P.K.; Sanyal, G.; Gupta, N.S. Improved model for the stability analysis of wireless sensor network against malware attacks. Wireless Personal Commun. 2021, 116, 2525–2548. [Google Scholar] [CrossRef]
  21. Muthukrishnan, S.; Muthukumar, S.; Chinnadurai, V. Optimal control of malware spreading model with tracing and patching in wireless sensor networks. Wirel. Pers. Commun. 2021, 117, 2061–2083. [Google Scholar] [CrossRef]
  22. Ye, X.T.; Xie, S.S.; Shen, S.G. SIR1R2:Characterizing Malware Propagation in WSNs With Second Immunization. IEEE Access 2021, 9, 82083–82093. [Google Scholar] [CrossRef]
  23. Gharaei, N.; Al-Otaibi, Y.D.; Rahim, S.; Alyamani, H.J.; Khani, N.A.K.K.; Malebary, S.J. Broker-Based Nodes Recharging Scheme for Surveillance Wireless Rechargeable Sensor Networks. IEEE Sens. J. 2021, 21, 9242–9249. [Google Scholar] [CrossRef]
  24. Qin, C.; Sun, Y.H.; Zhang, Y.H.; Ai, M.T. A novel path planning of mobile charger in wireless rechargeable sensor networks. In Proceedings of the 2017 29th Chinese Control And Decision Conference (CCDC), Chongqing, China, 28–30 May 2017; pp. 2063–2067. [Google Scholar]
  25. Lin, C.; Shang, Z.; Du, W.; Ren, J.K.; Wang, L.; Wu, G.W. CoDoC: A novel attack for wireless rechargeable sensor networks through denial of charge. In Proceedings of the IEEE INFOCOM 2019-IEEE Conference on Computer Communications, Paris, France, 29 April–2 May 2019; pp. 856–864. [Google Scholar]
  26. Li, P.D.; Yang, L.X.; Yang, X.F.; Zhong, X.; Wen, J.H.; Xiong, Q.Y. Energy-efficient patching strategy for wireless sensor networks. Sensors 2019, 19, 262. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  27. Liu, G.Y.; Huang, Z.Y.; Wu, X.L.; Liang, Z.W.; Hong, F.H.; Su, X.K. Modelling and Analysis of the Epidemic Model under Pulse Charging in Wireless Rechargeable Sensor Networks. Entropy 2021, 23, 927. [Google Scholar] [CrossRef] [PubMed]
  28. Liu, G.Y.; Su, X.K.; Hong, F.H.; Zhong, X.J.; Liang, Z.W.; Wu, X.L.; Huang, Z.Y. A Novel Epidemic Model Base on Pulse Charging in Wireless Rechargeable Sensor Networks. Entropy 2022, 24, 302. [Google Scholar] [CrossRef] [PubMed]
  29. Keshri, N.; Mishra, B.K. Two time-delay dynamic model on the transmission of malicious signals in wireless sensor network. Chaos Solitons Fractals 2014, 56, 151–158. [Google Scholar] [CrossRef]
  30. Zhang, Z.Z.; Zou, J.C.; Upadhyay, R.K.; ur Rahman, G. An epidemic model with multiple delays for the propagation of worms in wireless sensor networks. Results Phys. 2000, 19, 103424. [Google Scholar] [CrossRef]
  31. Song, Y.L.; Wei, J.J. Local Hopf bifurcation and global periodic solutions in a delayed predator–prey system. J. Math. Anal. Appl. 2005, 301, 1–21. [Google Scholar] [CrossRef] [Green Version]
  32. Xu, J.; Lu, Q.S. Hopf bifurcation of time-delay Lienard equation. Int. J. Bifurc. Chaos 1999, 9, 939–951. [Google Scholar] [CrossRef]
  33. Wulf, V.; Ford, N.J. Numerical Hopf bifurcation for a class of delay differential equations. J. Comput. Appl. Math. 2000, 115, 601–616. [Google Scholar] [CrossRef] [Green Version]
  34. Liu, G.Y.; Peng, B.H.; Zhong, X.J. A novel epidemic model for wireless rechargeable sensor network security. Sensors 2020, 21, 123. [Google Scholar] [CrossRef]
  35. Nurtay, A.; Hennessy, M.G.; Sardanyés, J.; Alsedà, L.; Elena, S.F. Theoretical conditions for the coexistence of viral strains with differences in phenotypic traits: A bifurcation analysis. R. Soc. Open Sci. 2019, 6, 181179. [Google Scholar] [CrossRef] [Green Version]
  36. Avllazagaj, E.; Zhu, Z.Y.; Bilge, L.; Balzarotti, D.; Dumitras, T. When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World. In Proceedings of the 30th USENIX Security Symposium, online, 11–13 August 2021; pp. 3487–3504. [Google Scholar]
  37. Li, D.M.; Li, C.C.; Xu, Y.J. The Stability of a Class of SEIR Epidemic Model with Virus Mutate. J. Harbin Univ. Sci. Technol. 2014, 19, 105–109. [Google Scholar]
  38. Li, D.M.; Fu, Y.L.; Gao, T.Q.; Li, C.C. Stability analysis of a class of SIR epidemic model with delayed spontaneous variation of vrius. J. Harbin Univ. Sci. Technol. 2020, 25, 2. [Google Scholar]
  39. Hao, R.J. Epidemic Spreading Model with Virus Variation and Its Stability; Nanjing University of Posts and Telecommunications: Nanjing, China, 2016. [Google Scholar]
  40. Xu, D.G.; Xu, X.Y.; Su, Z.F. Novel SIVR epidemic spreading model with virus variation in complex networks. In Proceedings of the 27th Chinese Control and Decision Conference (2015 CCDC), Qingdao, China, 23–25 May 2015; pp. 5164–5169. [Google Scholar]
  41. Cao, Y.L.; Wang, X.M.; He, Z.B. Optimal security strategy for malware propagation in mobile wireless sensor networks. Acta Electonica Sin. 2016, 44, 1851. [Google Scholar]
  42. Zhang, L.; Liu, M.X.; Xie, B.L. Optimal control of an SIQRS epidemic model with three measures on networks. Nonlinear Dyn. 2021, 103, 2097–2107. [Google Scholar] [CrossRef]
  43. Zhu, L.H.; Guan, G.; Li, Y.M. Nonlinear dynamical analysis and control strategies of a network-based SIS epidemic model with time delay. Appl. Math. Model. 2019, 70, 512–531. [Google Scholar] [CrossRef]
  44. Chen, L.J.; Hattaf, K.; Sun, J. Optimal control of a delayed SLBS computer virus model. Phys. A Stat. Mech. Its Appl. 2015, 427, 244–250. [Google Scholar] [CrossRef]
  45. Pei, Y.Z.; Chen, M.M.; Liang, X.Y.; Xia, Z.M.; Lv, Y.F.; Li, C.G. Optimal control problem in an epidemic disease SIS model with stages and delays. Int. J. Biomath. 2016, 9, 1650072. [Google Scholar] [CrossRef]
  46. Li, L.L.; Sun, C.X.; Jia, J.W. Optimal control of a delayed SIRC epidemic model with saturated incidence rate. Optim. Control Appl. Methods 2019, 40, 367–374. [Google Scholar] [CrossRef]
  47. Wan, C.; Li, T.; Zhang, W.; Dong, J. Dynamics of epidemic spreading model with drug-resistant variation on scale-free networks. Phys. A Stat. Mech. Its Appl. 2018, 493, 17–28. [Google Scholar] [CrossRef]
  48. Liu, G.Y.; Peng, Z.M.; Liang, Z.W.; Li, J.Q.; Cheng, L.F. Dynamics Analysis of a Wireless Rechargeable Sensor Network for Virus Mutation Spreading. Entropy 2021, 23, 572. [Google Scholar] [CrossRef]
  49. Liu, G.Y.; Chen, J.Y.; Liang, Z.W.; Peng, Z.M.; Li, J.Q. Dynamical Analysis and Optimal Control for a SEIR Model Based on Virus Mutation in WSNs. Mathematics 2021, 9, 929. [Google Scholar] [CrossRef]
  50. Liu, Y.; Chu, D.H.; Zou, Y.X.; Su, H. Stabilization of stochastic complex networks with switching jump diffusions based on adaptive aperiodically intermittent control. Nonlinear Dyn. 2021, 104, 3737–3751. [Google Scholar] [CrossRef]
  51. Achar, S.J.; Baishya, C.; Kaabar, K.A. Dynamics of the worm transmission in wireless sensor network in the framework of fractional derivatives. Math. Methods Appl. Sci. 2022, 45, 4278–4294. [Google Scholar] [CrossRef]
Figure 1. Relationship of the basic reproductive number and parameters. (a) The relationship among d, β 1 , and R 1 . (b) The relationship among d, β 2 , and R 2 .
Figure 1. Relationship of the basic reproductive number and parameters. (a) The relationship among d, β 1 , and R 1 . (b) The relationship among d, β 2 , and R 2 .
Mathematics 10 02376 g001
Figure 2. The variation in the state nodes under τ = 6.368 < τ 10 .
Figure 2. The variation in the state nodes under τ = 6.368 < τ 10 .
Mathematics 10 02376 g002
Figure 3. τ = 8.1593 > τ 10 = 8.1591 . (a) The variation in the state nodes. (b) Left of Figure 3b is the relationship between S and R; right of Figure 3b is relationship between S and L.
Figure 3. τ = 8.1593 > τ 10 = 8.1591 . (a) The variation in the state nodes. (b) Left of Figure 3b is the relationship between S and R; right of Figure 3b is relationship between S and L.
Mathematics 10 02376 g003
Figure 4. The variation diagram of state nodes. (a) The variation in the state nodes when τ = 5.891 < τ 20 = 8.4822 . (b) The variation in the state nodes when τ = 8.4922 > τ 20 .
Figure 4. The variation diagram of state nodes. (a) The variation in the state nodes when τ = 5.891 < τ 20 = 8.4822 . (b) The variation in the state nodes when τ = 8.4922 > τ 20 .
Mathematics 10 02376 g004
Figure 5. The variation diagram of state nodes. (a) The variation in the state nodes when τ = 3.2049 < τ 30 = 4.9049 . (b) The variation in the state nodes when τ = 4.9050 > τ 30 .
Figure 5. The variation diagram of state nodes. (a) The variation in the state nodes when τ = 3.2049 < τ 30 = 4.9049 . (b) The variation in the state nodes when τ = 4.9050 > τ 30 .
Mathematics 10 02376 g005
Figure 6. The optimal control curves when τ = 2.2.
Figure 6. The optimal control curves when τ = 2.2.
Mathematics 10 02376 g006
Figure 7. The cost curves.
Figure 7. The cost curves.
Mathematics 10 02376 g007
Figure 8. The optimal control curves when τ = 3.2.
Figure 8. The optimal control curves when τ = 3.2.
Mathematics 10 02376 g008
Figure 9. The optimal control curves when τ = 5.2.
Figure 9. The optimal control curves when τ = 5.2.
Mathematics 10 02376 g009
Figure 10. The diagram of proportion of nodes.
Figure 10. The diagram of proportion of nodes.
Mathematics 10 02376 g010
Figure 11. Variation in node numbers: (a) Optimal control; (b) No treatment control; (c) Average control; (d) Full treatment control.
Figure 11. Variation in node numbers: (a) Optimal control; (b) No treatment control; (c) Average control; (d) Full treatment control.
Mathematics 10 02376 g011
Table 1. Notation.
Table 1. Notation.
NThe number of all nodes in the WSN
μ The proportion of birth and death sensor nodes
ξ The proportion of susceptible nodes becoming infected nodes
ω The proportion of susceptible nodes becoming recovered nodes
γ The proportion of infected nodes becoming recovered nodes
ϵ The proportion of recovered nodes becoming susceptible nodes
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Liu, G.; Peng, Z.; Liang, Z.; Zhong, X.; Xia, X. Analysis and Control of Malware Mutation Model in Wireless Rechargeable Sensor Network with Charging Delay. Mathematics 2022, 10, 2376. https://doi.org/10.3390/math10142376

AMA Style

Liu G, Peng Z, Liang Z, Zhong X, Xia X. Analysis and Control of Malware Mutation Model in Wireless Rechargeable Sensor Network with Charging Delay. Mathematics. 2022; 10(14):2376. https://doi.org/10.3390/math10142376

Chicago/Turabian Style

Liu, Guiyun, Zhimin Peng, Zhongwei Liang, Xiaojing Zhong, and Xinhai Xia. 2022. "Analysis and Control of Malware Mutation Model in Wireless Rechargeable Sensor Network with Charging Delay" Mathematics 10, no. 14: 2376. https://doi.org/10.3390/math10142376

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop