Optimal Quarantining of Wireless Malware Through Reception Gain Control

被引:24
作者
Khouzani, M. H. R. [1 ]
Altman, Eitan [2 ]
Sarkar, Saswati [1 ]
机构
[1] Univ Penn, Dept Elect & Syst Engn, Philadelphia, PA 19104 USA
[2] French Natl Inst Res Comp Sci & Control INRIA, F-06902 Sophia Antipolis, France
基金
美国国家科学基金会;
关键词
Communication system security; optimal control; wireless communication;
D O I
10.1109/TAC.2011.2150350
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Containment of worms constitutes an important challenge in mobile wireless networks as recent outbreaks have revealed actual vulnerabilities. We introduce a defense strategy that quarantines the malware by reducing the communication range. This countermeasure confronts us with a tradeoff: reducing the communication range suppresses the spread of the malware; however, it also deteriorates the network performance. We model the propagation of the malware as a deterministic epidemic. Using an optimal control framework, we select the optimal communication range that captures the above tradeoff by minimizing a global cost function. Using Pontryagin's Maximum Principle, we derive structural characteristics of the optimal communication range as a function of time for general cost functions. Our numerical computations reveal that the dynamic optimal control of the communication range significantly outperforms static choices and is also robust to errors in estimation of the network and attack parameters.
引用
收藏
页码:49 / 61
页数:13
相关论文
共 38 条
  • [1] Anderson S., 2002, P 47 IEEE VEH TECHN, V3, P1587
  • [2] [Anonymous], 2001, ACM SIGMOBILE MOBILE
  • [3] Balanis C.A., 2011, Antenna theory: analysis and design, V3rd
  • [4] Bloem M., 2007, DECISION CONTROL 200, P6059
  • [5] Dynamic control of worm propagation
    Dantu, R
    Cangussu, J
    Yelimeli, A
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 419 - 423
  • [6] Dawson J., 2002, IEEE MTT S INT MICR, V3, P1747
  • [7] Feichtinger G., 2008, OPTIMAL CONTROL NONL
  • [8] The message delay in mobile ad hoc networks
    Groenevelt, R
    Nain, P
    Koole, G
    [J]. PERFORMANCE EVALUATION, 2005, 62 (1-4) : 210 - 228
  • [9] Malware goes mobile
    Hypponen, Mikko
    [J]. SCIENTIFIC AMERICAN, 2006, 295 (05) : 70 - 77
  • [10] Kephart J. O., 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.93CH3290-4), P2, DOI 10.1109/RISP.1993.287647