A Pulse Immunization Model for Inhibiting Malware Propagation in Mobile Wireless Sensor Networks

被引:0
作者
Wang Xiaoming [1 ]
He Zaobo [1 ,2 ]
Zhang Lichen [1 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
[2] Georgia State Univ, Dept Comp Sci, Atlanta, GA 30303 USA
基金
中国国家自然科学基金;
关键词
MWSN; Malware propagation; Susceptible-infected-recovered (SIR); Pulse differential equation; Maximum immunization period of time; ATTACK;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile wireless sensor networks (MWSNs) may be under attack due to their large-scale characteristics. One of the main threats is to inject malware into some nodes. To prevent malware from spreading in a large-scale MWSN, an effective measure is to immunize susceptible nodes by disseminating and installing security patches. This work suggests a novel modeling framework and some mathematical models based on the pulse differential equation and the epidemic theory, in which the immunization operations are implemented on susceptible nodes in a pulse way. The maximum immunization period of time is derived to minimine the number of immunization operations while ensuring malware extinct over time in the MWSN. The theoretical results are confirmed by extensive simulations.
引用
收藏
页码:810 / 815
页数:6
相关论文
共 12 条
  • [1] Design and Analysis of Delay-Tolerant Sensor Networks for Monitoring and Tracking Free-Roaming Animals
    Ehsan, Samina
    Bradford, Kyle
    Brugger, Max
    Hamdaoui, Bechir
    Kovchegov, Yevgeniy
    Johnson, Douglas
    Louhaichi, Mounir
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (03) : 1220 - 1227
  • [2] Maximum Damage Battery Depletion Attack in Mobile Sensor Networks
    Khouzani, M. H. R.
    Sarkar, Saswati
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2011, 56 (10) : 2358 - 2368
  • [3] Epidemic-Based Information Dissemination in Wireless Mobile Sensor Networks
    Ko, Young Myoung
    Gautam, Natarajan
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (06) : 1738 - 1751
  • [4] Li P, 2013, CHINESE J ELECTRON, V22, P449
  • [5] Verbust F., 2000, NONLINEAR DIFFERENTI
  • [6] Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks
    Wang XiaoMing
    He ZaoBo
    Zhao XueQing
    Lin Chuang
    Pan Yi
    Cai ZhiPeng
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (09) : 1 - 18
  • [7] Xu S, 2012, CHINESE J ELECTRON, V21, P583
  • [8] Pulse quarantine strategy of internet worm propagation: Modeling and analysis
    Yao, Yu
    Guo, Lei
    Guo, Hao
    Yu, Ge
    Gao, Fu-xiang
    Tong, Xiao-jun
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (05) : 1047 - 1061
  • [9] Wireless Malware Propagation: A Reality Check
    Zanero, Stefano
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (05) : 70 - 74
  • [10] Zhong J, 2012, CHINESE J ELECTRON, V21, P619