An Epidemiology-Based Model for Disclosing Dynamics of Malware Propagation in Heterogeneous and Mobile WSNs

被引:22
作者
Shen, Shigen [1 ]
Zhou, Haiping [1 ]
Feng, Sheng [1 ]
Liu, Jianhua [1 ]
Zhang, Hong [2 ]
Cao, Qiying [2 ]
机构
[1] Shaoxing Univ, Dept Comp Sci & Engn, Shaoxing 312000, Peoples R China
[2] Donghua Univ, Coll Comp Sci & Technol, Shanghai 201620, Peoples R China
基金
中国国家自然科学基金;
关键词
Malware; Mathematical model; Wireless sensor networks; Computational modeling; Stability analysis; Internet of Things; Heterogeneous and mobile wireless sensor networks; malware; epidemic theory; heterogeneity; mobility; BIFURCATION-ANALYSIS; SENSOR; GAME; NETWORK; WORMS; SPREAD; SECURE;
D O I
10.1109/ACCESS.2020.2977966
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Heterogeneous and mobile wireless sensor networks (HMWSNs) are generally practical in constructing smart Internet of Things. However, malware can easily propagate itself over HMWSNs and make harm such as data interception and unauthorized activities. To defend such malware, developing a model to disclose dynamics of malware propagation becomes urgently required. In this context, a heterogeneous and mobile vulnerable-compromised-quarantined-patched-scrapped (VCQPS) model is proposed by considering both the heterogeneity and mobility of HMSNs (heterogeneous and mobile sensor nodes). Then, differential equations of transition proportions among all states are achieved by analyzing the changeable quantities of HMSNs belonging to different states. Further, the existence of the stationary points of the VCQPS model is proved, upon which the malware propagation threshold is derived by calculating the reproduction number. The stability of the malware-free stationary-point is also proved. Experiments are performed to validate the stability of the malware-free stationary-point and show the effectiveness of the VCQPS model by comparing our model with traditional SIS and SIR models.
引用
收藏
页码:43876 / 43887
页数:12
相关论文
共 48 条
[1]   A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology [J].
Bouaziz, Maha ;
Rachedi, Abderrezak .
COMPUTER COMMUNICATIONS, 2016, 74 :3-15
[2]  
Eshghi S., 2014, IEEE ACM T NETWORK, V24, P283
[3]   Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices [J].
Giannetsos, Thanassis ;
Dimitriou, Tassos ;
Krontiris, Ioannis ;
Prasad, Neeli R. .
COMPUTER JOURNAL, 2010, 53 (10) :1576-1593
[4]   A study of self-propagating mal-packets in sensor networks: Attacks and defenses [J].
Gu, Qijun ;
Ferguson, Christopher ;
Noorani, Rizwan .
COMPUTERS & SECURITY, 2011, 30 (01) :13-27
[5]   On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks [J].
Haghighi, Mohammad Sayad ;
Wen, Sheng ;
Xiang, Yang ;
Quinn, Barry ;
Zhou, Wanlei .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) :2854-2865
[6]   Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey [J].
Illiano, Vittorio P. ;
Lupu, Emil C. .
ACM COMPUTING SURVEYS, 2015, 48 (02)
[7]  
Kang H., IEEE T NETW SCI ENG
[8]   Impact of reduced scale free network on wireless sensor network [J].
Keshri, Neha ;
Gupta, Anurag ;
Mishra, Bimal Kumar .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2016, 463 :236-245
[9]  
LaSalle J., 1976, REGIONAL C SERIES AP, DOI 10.1137/1.9781611970432
[10]   Analysis of epidemic spreading of an SIRS model in complex heterogeneous networks [J].
Li, Chun-Hsien ;
Tsai, Chiung-Chiou ;
Yang, Suh-Yuh .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (04) :1042-1054