Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks

被引:82
作者
Shen, Shigen [1 ,2 ]
Li, Hongjie [2 ]
Han, Risheng [2 ]
Vasilakos, Athanasios V. [3 ]
Wang, Yihan [4 ,5 ]
Cao, Qiying [4 ]
机构
[1] Shaoxing Univ, Coll Engn, Shaoxing 312000, Peoples R China
[2] Jiaxing Univ, Coll Math Phys & Informat Engn, Jiaxing 314001, Peoples R China
[3] Kuwait Univ, Dept Comp Sci, Safat 13060, Kuwait
[4] Donghua Univ, Coll Informat Sci & Technol, Shanghai 201620, Peoples R China
[5] Shanghai Univ Engn Sci, Coll Elect & Elect Engn, Shanghai 201620, Peoples R China
基金
中国国家自然科学基金;
关键词
Differential game; epidemic theory; Malware propagation; wireless sensor networks; WORM PROPAGATION; MODEL; ATTACK;
D O I
10.1109/TIFS.2014.2359333
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless sensor networks (WSNs) are prone to propagating malware because of special characteristics of sensor nodes. Considering the fact that sensor nodes periodically enter sleep mode to save energy, we develop traditional epidemic theory and construct a malware propagation model consisting of seven states. We formulate differential equations to represent the dynamics between states. We view the decision-making problem between system and malware as an optimal control problem; therefore, we formulate a malware-defense differential game in which the system can dynamically choose its strategies to minimize the overall cost whereas the malware intelligently varies its strategies over time to maximize this cost. We prove the existence of the saddle-point in the game. Further, we attain optimal dynamic strategies for the system and malware, which are bang-bang controls that can be conveniently operated and are suitable for sensor nodes. Experiments identify factors that influence the propagation of malware. We also determine that optimal dynamic strategies can reduce the overall cost to a certain extent and can suppress the malware propagation. These results support a theoretical foundation to limit malware in WSNs.
引用
收藏
页码:1962 / 1973
页数:12
相关论文
共 39 条
[1]  
Alpcan T., 2010, Network Security: A Decision and Game-Theoretic Approach
[2]   The Source Identification Game: An Information-Theoretic Perspective [J].
Barni, Mauro ;
Tondi, Benedetta .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (03) :450-463
[3]  
Bensoussan A, 2010, LECT NOTES COMPUT SC, V6442, P135, DOI 10.1007/978-3-642-17197-0_9
[4]   Noncooperative Differential Games [J].
Bressan, Alberto .
MILAN JOURNAL OF MATHEMATICS, 2011, 79 (02) :357-427
[5]   MiniMax Equilibrium of Networked Differential Games [J].
Cao, Hui ;
Ertin, Emre ;
Arora, Anish .
ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 2008, 3 (04)
[6]  
De P., 2008, ALGORITHMS PROTOCOLS, P51
[7]   Deployment-Aware Modeling of Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory [J].
De, Pradip ;
Liu, Yonghe ;
Das, Sajal K. .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2009, 5 (03) :1-33
[8]   An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks [J].
De, Pradip ;
Liu, Yonghe ;
Das, Sajal K. .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2009, 8 (03) :413-425
[9]   A Security Differential Game Model for Sensor Networks in Context of the Internet of Things [J].
Ding, Yan ;
Zhou, Xian-wei ;
Cheng, Zhi-mi ;
Lin, Fu-hong .
WIRELESS PERSONAL COMMUNICATIONS, 2013, 72 (01) :375-388
[10]  
Friedman, 1994, HDB GAME THEORY, V2, P781