SCIRD: Revealing Infection of Malicious Software in Edge Computing-Enabled IoT Networks

被引:2
作者
Ye, Jiehao [1 ]
Cheng, Wen [1 ]
Liu, Xiaolong [1 ]
Zhu, Wenyi [1 ]
Wu, Xuan'ang [1 ]
Shen, Shigen [1 ]
机构
[1] Huzhou Univ, Sch Informat Engn, Huzhou 313000, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 79卷 / 02期
关键词
Edge computing; Internet of Things; malicious software; propagation model; heterogeneity; PROPAGATION MODEL; SPREADING MODEL; DYNAMICS; TRANSMISSION; STRATEGIES;
D O I
10.32604/cmc.2024.049985
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has characteristics such as node mobility, node heterogeneity, link heterogeneity, and topology heterogeneity. In the face of the IoT characteristics and the explosive growth of IoT nodes, which brings about large-scale data processing requirements, edge computing architecture has become an emerging network architecture to support IoT applications due to its ability to provide powerful computing capabilities and good service functions. However, the defense mechanism of Edge Computing -enabled IoT Nodes (ECIoTNs) is still weak due to their limited resources, so that they are susceptible to malicious software spread, which can compromise data confidentiality and network service availability. Facing this situation, we put forward an epidemiology -based susceptible -curb -infectious -removed -dead (SCIRD) model. Then, we analyze the dynamics of ECIoTNs with different infection levels under different initial conditions to obtain the dynamic differential equations. Additionally, we establish the presence of equilibrium states in the SCIRD model. Furthermore, we conduct an analysis of the model's stability and examine the conditions under which malicious software will either spread or disappear within Edge Computing -enabled IoT (ECIoT) networks. Lastly, we validate the efficacy and superiority of the SCIRD model through MATLAB simulations. These research findings offer a theoretical foundation for suppressing the propagation of malicious software in ECIoT networks. The experimental results indicate that the theoretical SCIRD model has instructive significance, deeply revealing the principles of malicious software propagation in ECIoT networks. This study solves a challenging security problem of ECIoT networks by determining the malicious software propagation threshold, which lays the foundation for building more secure and reliable ECIoT networks.
引用
收藏
页码:2743 / 2769
页数:27
相关论文
共 41 条
[1]   A Mathematical Modeling of Stuxnet-Style Autonomous Vehicle Malware [J].
Ahn, Haesung ;
Choi, Juyeong ;
Kim, Yong Hoon .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (01) :673-683
[2]   Thwarting Worm Spread in Heterogeneous Networks With Diverse Variant Placement [J].
Ai, Jianjian ;
Guo, Zehua ;
Chen, Hongchang .
IEEE COMMUNICATIONS LETTERS, 2018, 22 (07) :1346-1349
[3]   MalBoT-DRL: Malware Botnet Detection Using Deep Reinforcement Learning in IoT Networks [J].
Al-Fawa'reh, Mohammad ;
Abu-Khalaf, Jumana ;
Szewczyk, Patryk ;
Kang, James Jin .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) :9610-9629
[4]   IoT-Proctor: A Secure and Lightweight Device Patching Framework for Mitigating Malware Spread in IoT Networks [J].
Aman, Muhammad Naveed ;
Javaid, Uzair ;
Sikdar, Biplab .
IEEE SYSTEMS JOURNAL, 2022, 16 (03) :3468-3479
[5]   A Stochastic Numerical Analysis for Computer Virus Model with Vertical Transmission Over the Internet [J].
Arif, Muhammad Shoaib ;
Raza, Ali ;
Shatanawi, Wasfi ;
Rafiq, Muhammad ;
Bibi, Mairaj .
CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 61 (03) :1025-1043
[6]   Clarke Jacobians, Bouligand Jacobians, and compact connected sets of matrices [J].
Bartl, David ;
Fabian, Marian ;
Kolar, Jan .
JOURNAL OF MATHEMATICAL ANALYSIS AND APPLICATIONS, 2022, 516 (01)
[7]   Exact Markov Chain of Random Propagation of Malware With Network-Level Mitigation [J].
Carnier, Rodrigo Matos ;
Li, Yue ;
Fujimoto, Yasutaka ;
Shikata, Junji .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (12) :10933-10947
[8]   Modeling and Analyzing Malware Propagation Over Wireless Networks Based on Hypergraphs [J].
Chen, Jiaxing ;
Sun, Shiwen ;
Xia, Chengyi ;
Shi, Dinghua ;
Chen, Guanrong .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (06) :3767-3778
[9]   Analysis of a SEIR-KS Mathematical Model For Computer Virus Propagation in a Periodic Environment [J].
Coronel, Anibal ;
Huancas, Fernando ;
Hess, Ian ;
Lozada, Esperanza ;
Novoa-Munoz, Francisco .
MATHEMATICS, 2020, 8 (05)
[10]   Modeling and Analyzing the Spatial-Temporal Propagation of Malware in Mobile Wearable IoT Networks [J].
Dou, Jie ;
Xie, Gang ;
Tian, Zhiyi ;
Cui, Lei ;
Yu, Shui .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (02) :2438-2452