A novel model for malware propagation on wireless sensor networks

被引:2
作者
Martin-Del Rey A. [1 ]
机构
[1] Universidad de Salamanca, Department of Applied Mathematics, IUFFyM, Salamanca
关键词
basic reproductive number; cybersecurity; malware propagation; mathematical epidemiology; wireless sensor networks;
D O I
10.3934/mbe.2024176
中图分类号
学科分类号
摘要
The main goal of this work was to propose a novel mathematical model for malware propagation on wireless sensor networks (WSN). Specifically, the proposed model was a compartmental and global one whose temporal dynamics were described by means of a system of ordinary differential equations. This proposal was more realistic than others that have appeared in the scientific literature since. On the one hand, considering the specifications of malicious code propagation, several types of nodes were considered (susceptible, patched susceptible, latent noninfectious, latent infectious, compromised non-infectious, compromised infectious, damaged, ad deactivated), and on the other hand, a new and more realistic term of the incidence was defined and used based on some particular characteristics of transmission protocol on wireless sensor networks. © 2024 Author(s).
引用
收藏
页码:3967 / 3998
页数:31
相关论文
共 55 条
  • [1] Steeneken P. G., Kaiser E., Verbiest G. J., ten Veldhuis M. C., Sensors in agriculture: towards an internet of plants, Nat. Rev. Method. Prim, 3, (2023)
  • [2] Garcia-Martin J., Torralba A., Hidalgo-Fort E., Daza D., Gonzalez-Carvajal R., Iot solution for smart water distribution networks based on a low-power wireless network, combined at the device-level: A case study, Int. Things, 22, (2023)
  • [3] Camboim B., Tavares J., Tavares M., Barbosa J., Posture monitoring in healthcare: a systematic mapping study and taxonomy, Med. Biol. Eng. Comput, 61, pp. 1887-1899, (2023)
  • [4] Conti M., Secure Wireless Sensor Networks. Threats and Solutions, (2016)
  • [5] Lopez J., Zhou J., Wireless Sensor Network Security, (2008)
  • [6] Devi P., Jaison B., Protection on wireless sensor network from clone attack using the sdn-enabled hybrid clone node detection mechanisms, Comput. Commun, 152, pp. 316-322, (2020)
  • [7] Elsaid S. A., Albatati N. S., An optimized collaborative intrusion detection system for wireless sensor networks, Soft Comput, 24, pp. 12553-12567, (2020)
  • [8] Salim A., Osamy W., Aziz A., Khedr A., Seedgt: Secure and energy efficient data gathering technique for iot applications based wsns, J. Netw. Comput. Appl, 202
  • [9] Cong D., Zhongwei X., A secure three-factor authentication scheme for multi-gateway wireless sensor networks based on elliptic curve cryptography, Ad Hoc Netw, 127, (2022)
  • [10] Liu X., Guo Z., Ma J., Song Y., A secure authentication scheme for wireless sensor networks based on dac and intel sgx, IEEE Int. Things J, 9, pp. 3533-3547, (2022)