Skip to main content

Modeling Malware Propagation in Wireless Sensor Networks with Individual-Based Models

  • Conference paper
  • First Online:
Advances in Artificial Intelligence (CAEPIA 2016)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9868))

Included in the following conference series:

Abstract

The main goal of this work is to propose an individual-based model to simulate malware propagation over a wireless sensor network. Specifically, this is an improvement of the model proposed by Y. Song and G.P. Jiang in 2009 (see [11]) and based on a two-dimensional cellular automata whose cellular space is an homogeneous lattice where sensors are placed. In our model, different types of nodes are now considered (sensor nodes, router nodes and sink nodes) and heterogeneous topologies are used. The simulations computed lead to obtain more realistic scenarios for malware propagation over wireless sensor networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bahi, J.M., Guyeux, C., Hakem, M., Makhoul, A.: Epidemiological approach for data survivability in unattended wireless sensor networks. J. Netw. Comput. Appl. 46, 374–383 (2014)

    Article  Google Scholar 

  2. Cheikhrouhou, O.: Secure group communication in wireless sensor networks: a survey. J. Netw. Comput. Appl. 61, 115–132 (2016)

    Article  Google Scholar 

  3. Fadel, E., Gungor, V.C., Nassef, L., Akkari, N., Malik, M.G.A., Almasri, S., Akyildiz, I.F.: A survey on wireless sensor networks for smart grid. Comput. Commun. 71(1), 22–33 (2015)

    Article  Google Scholar 

  4. Feng, L., Song, L., Zhao, Q., Wanf, H.: Modeling and stability analysis of worm propagation in wireless sensor networks. Math. Probl. Eng. 2015, 8 p. (2015). Article ID 129598 doi:10.1155/2015/129598

    Google Scholar 

  5. Ferng, H.W., Khoa, N.M.: On security of wireless sensor networks: a data authentication protocol using digital signature. Wireless Netw. (2016, in press). doi:10.1007/s11276-016-1208-0

    Google Scholar 

  6. Khan, S., Pathan, A.S.K., Alrajeh, N.A.: Wireless Sensor Networks: Current Status and Future Trends. CRC Press, Boca Raton (2013)

    Google Scholar 

  7. Obaidat, M.S., Misra, S.: Principles of Wireless Sensor Networks. Cambridge University Press, Cambridge (2014)

    Google Scholar 

  8. Ojha, T., Misra, S., Raghuwanshi, N.S.: Wireless sensor networks for agriculture: the state-of-the-art in practice and future challenges. Comput. Electron. Agric. 118, 66–84 (2015)

    Article  Google Scholar 

  9. Li, Q., Zhang, B., Cui, L., Fan, Z., Athanasios, V.V.: Epidemics on small worlds of tree-based wireless sensor networks. J. Syst. Sic. Complex 27, 1095–1120 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  10. Rashid, B., Rehmani, M.H.: Applications of wireless sensor networks for urban areas: a survey. J. Netw. Comput. Appl. 60, 192–219 (2016)

    Article  Google Scholar 

  11. Song, Y., Jiang, G.-P.: Model and dynamic behavior of malware propagation over wireless sensor networks. In: Zhou, J. (ed.) Complex 2009. LNICST, vol. 4, pp. 487–502. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  12. Suciu, G., Suciu, V., Martian, A., Craciunescu, R., Vulpe, A., Marcu, I., Halunga, S., Fratu, O.: Big data, internet of things and cloud convergence - an architecture for secure E-health applications. J. Med. Syst. 39, 141 (2015)

    Article  Google Scholar 

  13. Whitmore, A., Agarwal, A., Xu, L.D.: The internet of things-a survey of topics and trends. Inf. Syst. Front. 17(2), 261–274 (2015)

    Article  Google Scholar 

  14. Yang, S.H.: Wireless Sensor Networks. Principles, Design and Applications. Springer, London (2014)

    Google Scholar 

  15. Zhu, L., Zhao, H., Wang, X.: Stability and bifurcation analysis in a delayed reaction-diffusion malware propagation. Comput. Math. Appl. 69, 852–875 (2015)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This work has been supported by Ministerio de Economía y Competitividad (Spain) and European Union through FEDER funds under grants TIN2014-55325-C2-2-R, and MTM 2015-69138-REDT.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Martín del Rey .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

del Rey, A.M., Guillén, J.D.H., Sánchez, G.R. (2016). Modeling Malware Propagation in Wireless Sensor Networks with Individual-Based Models. In: Luaces , O., et al. Advances in Artificial Intelligence. CAEPIA 2016. Lecture Notes in Computer Science(), vol 9868. Springer, Cham. https://doi.org/10.1007/978-3-319-44636-3_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44636-3_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44635-6

  • Online ISBN: 978-3-319-44636-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics