Skip to main content
Log in

The Impact of Memory-Efficient Bots on IoT-WSN Botnet Propagation

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

A Correction to this article was published on 03 May 2021

This article has been updated

Abstract

By successfully infecting certain numbers of nodes in an Internet of Things (IoT) platform, botmaster often relies on specific bots (infected nodes) to scan and gather information about the target nodes for onward propagation of the attack. Therefore, the bot’s processing capability to scan and executes the botmaster’s instructions relied on its memory capability. Hence, the bot’s memory efficiency determines the selection or the abandonment of the bot by the botmaster during the propagation of the attack. To defend against IoT botnets attack, there is need to accurately analyze the dynamic characteristics of the botnet propagation in a network. Although conventional IoT botnet propagation models considered certain characteristics of IoT wireless sensor networks (IoT-WSN) in analyzing the propagation time and the size of the botnet infection, the models do not consider the impact of memory-efficient bots on the size of the botnet infection. As such they are not applicable to defend the network against them. To complement this gap, this study proposed an IoT- Susceptible-Infectious-Abandon (IoT-SIA) model to analyze the impact of the memory-efficient bots on the size of the botnet infection. Consequently, based on the numerical simulation results, the memory-efficient bots have shown a direct impact on the size of the botnet infection and the propagation time of the attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

(Source: Ji et al. [5])

Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Change history

References

  1. Singh, A., Awasthi, A. K., Singh, K., & Srivastava, P. K. (2018). Modeling and analysis of worm propagation in wireless sensor networks. Wireless Personal Communications, 98(3), 2535–2551.

    Article  Google Scholar 

  2. Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., & Kumar, D. (2017). Understanding the mirai botnet. In 26th USENIX Security Symposium (USENIX Security 17) (pp. 1093–1110).

  3. Acarali, D., Rajarajan, M., Komninos, N., & Zarpelão, B. B. (2019). Modelling the spread of botnet malware in IoT-based wireless sensor networks. Security and Communication Networks, 2019, 1–13.

    Article  Google Scholar 

  4. Giannetsos, T., Dimitriou, T., & Prasad, N. R. (2009). Self-propagating worms in wireless sensor networks ACM CoNEXT-student workshop. (pp. 31–32).

  5. Ji, Y., Yao, L., Liu, S., Yao, H., Ye, Q., & Wang, R. (2018). The study on the botnet and its prevention policies in the internet of things. In 22nd International Conference on Computer Supported Cooperative Work in Design ((CSCWD)) (pp. 837–842). IEEE.

  6. Mingyong, Y., Xingshu, C., Qixu, W., Wei, W., & Yulong, W. (2019). Dynamics on hybrid complex network: Botnet modeling and analysis of medical IoT. Security and Communication Networks, 2019, 1–14.

    Google Scholar 

  7. Mishra, B. K., & Keshri, N. (2013). Mathematical model on the transmission of worms in wireless sensor network. Applied Mathematical Modelling, 37, 4103–4111.

    Article  MathSciNet  Google Scholar 

  8. Feng, L., Song, L., Zhao, Q., & Wang, H. (2015). Modeling and stability analysis of worm propagation in wireless sensor network.Mathematical Problems in Engineering, (pp.1–8).

  9. Khanh, N. H. (2016). Dynamics of a worm propagation model with quarantine in wireless sensor networks. Applications of Mathematics, 10, 1739–1746.

    Google Scholar 

  10. Wang, T., Wu, Q., Wen, S., Cai, Y., Tian, H., Chen, Y., & Wang, B. (2017). Propagation modeling and defending of a mobile sensor worm in wireless sensor and actuator network. Sensors, 17, 1–17.

    Article  Google Scholar 

  11. Gardner, M.T., C. Beard, & D. Medhi. (2017). Using SEIRS epidemic models for IoT botnets attacks. In Proceeding of 13th International Conference on Design of Reliable Communication Networks, Munich, Germany, VDE: Berlin, Germany, (pp. 62–69) March 08–10.

  12. Hui, X., Li, L., Xiangguo, C., Xiuzhen C., & Tie, Q. (2020). Modeling and analysis botnet propagation in social Internet of Things. IEEE Internet of Things Journal, vol. XX, (pp. 1–12).

  13. Eslahi, M., Salleh, R., & Anuar, N.B. (2013). Bots and botnets: An overview of characteristics, detection and challenges. In Procceeding of IEEE International Conference on Control System, Computing and Engineering, Penang, Malaysia, 23-25 November, 2012, (pp. 349–354), IEEE.

  14. Hejazi, P., & Ferrari, G. (2018). Energy and memory efficient data loss prevention in wireless sensor networks. Sensors, 2017, 1–18.

    Google Scholar 

  15. John, H. How Much Storage is Needed for Video Surveillance?. https://ipvm.com/reports/storage-needed-for-video-surveillance.

  16. Akamai. (2016). State of the Internet Security Q3 2016. https://www.intelligentcio.com/me/2016/11/20/akamai-releases-q3-2016-state-of-the-internet-security-report/.

  17. Abu, R. M. K., Chris, J. B., & Simon, D. (2014). Failure detection in wireless sensor networks: A sequence-based dynamic approach. ACM Transactions on Sensor Networking, 10(2), 1–29.

    Google Scholar 

Download references

Acknowledgements

The authors are very thankful to the Nigerian Tertiary Education Trust Fund (TETFund) and we acknowledge that this research received support from the Faculty of Computer Science and Information Technology, Universiti Putra Malaysia and the Fundamental Research Grant Scheme FRGS/1/2019/ICT03/UPM/02/1 awarded by Malaysian Ministry of Education.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed Ibrahim.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original version of this article has been revised: The Acknowledgements section has been corrected.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ibrahim, M., Abdullah, M.T., Abdullah, A. et al. The Impact of Memory-Efficient Bots on IoT-WSN Botnet Propagation. Wireless Pers Commun 119, 2093–2105 (2021). https://doi.org/10.1007/s11277-021-08320-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08320-7

Keywords

Navigation