WANG Xiaoming, HE Zaobo, ZHANG Lichen, “A Pulse Immunization Model for Inhibiting Malware Propagation in Mobile Wireless Sensor Networks,” Chinese Journal of Electronics, vol. 23, no. 4, pp. 810-815, 2014,
Citation: WANG Xiaoming, HE Zaobo, ZHANG Lichen, “A Pulse Immunization Model for Inhibiting Malware Propagation in Mobile Wireless Sensor Networks,” Chinese Journal of Electronics, vol. 23, no. 4, pp. 810-815, 2014,

A Pulse Immunization Model for Inhibiting Malware Propagation in Mobile Wireless Sensor Networks

Funds:  This work is supported by the National Natural Science Foundation of China (No.61173094, No.61373083) and the Fundamental Research Funds for the Central Universities of China (No.GK201401002, No.GK201302024).
  • Received Date: 2013-06-01
  • Rev Recd Date: 2014-04-01
  • Publish Date: 2014-10-05
  • Mobile wireless sensor networks (MWSNs) may be under attack due to their large-scale characteristics. One of the main threats is to inject malware into some nodes. To prevent malware from spreading in a largescale MWSN, an effective measure is to immunize susceptible nodes by disseminating and installing security patches. This work suggests a novel modeling framework and some mathematical models based on the pulse differential equation and the epidemic theory, in which the immunization operations are implemented on susceptible nodes in a pulse way. The maximum immunization period of time is derived to minimine the number of immunization operations while ensuring malware extinct over time in the MWSN. The theoretical results are confirmed by extensive simulations.
  • loading
  • S. Ehsan, K. Bradford, M. Brugger and B. Hamdaoui, Design and analysis of delay-tolerant sensor networks for monitoring and tracking free-roaming animals, IEEE Transactions on Wireless Communications, Vol.11, No.3, pp.1220-1227, 2012.
    J.J. Guo, C. Cho, Y. Wang and K.M. Lee, Wireless mobile sensor network for the system identification of a space frame bridge, IEEE/ASME Transactions on Mechatronics, Vol.17, No.3, pp.499-507, 2012.
    D.R. Zhu, J.H. Han, J. Ou and J. Min, Single beacon cruise positioning algorithm in wireless sensor networks, Chinese Journal of Electronics, Vol.22, No.3, pp.559-562, 2013.
    S.L. Xu and S.S. Lee, Route optimization algorithm for vehicle to vehicle communication using location information, Chinese Journal of Electronics, Vol.21, No.4, pp.583-588, 2012.
    M.Y. Ko and N. Gautam, Epidemic-based information dissemination in wireless mobile sensor networks, IEEE/ACM Transactions on Networking, Vol.18, No.6, pp.1738-1751, 2010.
    P. Li and R.C. Wang, Research of malicious code attack effect based on synthetic entropy method, Chinese Journal of Electronics, Vol.22, No.3, pp.449-454, 2013.
    S. Zanero, Wireless malware propagation: A reality check, IEEE Security & Privacy, Vol.7, No.5, pp.70-74, 2009.
    M.H.R. Khouzani and S. Sarkar, Maximum damage battery deletion attack in mobile sensor networks, IEEE Transactions on Automatic Control, Vol.56, No.10, pp.2358-2368, 2011.
    X.M. Wang, Z.B. He, X.Q. Zhao, C. Lin, Y. Pan and Z.P. Cai, Reaction-diffusion modeling of the malware propagation in mobile wireless sensor networks, Science China Information Sciences, Vol.56, No.9, pp.092303:1-092303:18, 2013.
    J. Zong, A. Li and L.S. Wen, SHIS model of e-mail virus propagation, Chinese Journal of Electronics, Vol.21, No.4, pp.619-622, 2012.
    Y. Yao, L. Guo, H. Guo, G. Yu, F. Gao and X. Tong, Pulse quarantine strategy of Internet worm propagation: Modeling and analysis, Computers and Electrical Engineering, Vol.38, pp.1047-1061, 2012.
    F. Verbust, Nonlinear Differential Equations and Dynamical Systems, Springer-Verlag, Berlin, Germany, 2000.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (645) PDF downloads(1111) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return