Abstract
Mobile Wireless Sensor Networks (MWSNs) are employed in many fields, such as intelligent transportation, community health monitoring, and animal behavior monitoring. However, MWSNs may be vulnerable to malicious interference because of the large-scale characteristics. One of the threats is to inject malware into some nodes, especially mobile nodes. When a contaminated node communicates with its neighbors, multiple copies of the malware are transmitted to its neighbors, which may destroy nodes, block regular communications, or even damage the integrity of regular data packets. This work develops a modeling framework which mathematically characterizes the process of malware propagation in MWSNs based on the theory of reaction-diffusion equation. Our proposed model can efficiently predict the temporal dynamic behavior and spatial distribution of malware propagation over time, so that targeted immunization measures can be taken on infected nodes, whereas most of the existing models for malware propagation can only predict the temporal dynamic behavior rather than the spatial distribution of malware propagation over time. We conduct extensive simulations on large-scale MWSNs to evaluate the proposed model. The simulation results indicate that the proposed model and method are efficient, and that the mobile speed, communication range, and packet transmission rate of nodes are the main factors affecting malware propagation in MWSNs.
Similar content being viewed by others
References
Hu J W, Xie L H, Zhang C S. Energy-based multiple target localization and pursuit in mobile sensor networks. IEEE Trans Instrum Meas, 2012, 61: 212–220
Ehsan S, Bradford K, Brugger M, et al. Design and analysis of delay-tolerant sensor networks for monitoring and tracking free-roaming animals. IEEE Trans Wirel Commun, 2012, 11: 1220–1227
Boukerche A, Ren Y L. A secure mobile healthcare system using trust-based multicast scheme. IEEE J Sel Area Commun, 2009, 27: 387–399
Rasheed A, Mahapatra R N. The three-tier security scheme in wireless sensor networks with mobile sinks. IEEE Trans Paral Distr, 2012, 23: 958–965
Khouzani M H R, Sarkar S. Maximum damage battery deletion attack in mobile sensor networks. IEEE Trans Automat Contr, 2011, 56: 2358–2368
Peng S L, Li S S, Liao X K, et al. A scalable code dissemination protocol in heterogeneous wireless sensor networks. Sci China Inf Sci, 2012, 55: 1323–1336
Khouzani M, Sarkar S, Altman E. Optimal control of epidemic evolution. In: Proceedings of IEEE INFOCOM, Shanghai, 2011. 1683–1691
Zhang P T, Wang W, Tan Y. A malware detection model based on a negative selection algorithm with penalty factor. Sci China Inf Sci, 2010, 53: 2461–2471
He Z B, Wang X M. A spatial-temporal model for the malware propagation in MWSNs based on the reaction-diffusion equations. In: Proceedings of WAIM 2012 Workshops, Harbin, 2012. 45–56
Hethcote H W. The mathematics of infectious diseases. SIAM Rev, 2000, 42: 599–653
Chen S Z, Ji C Y. Spatial-temporal modeling of malware propagation in networks. IEEE Trans Neural Netw, 2005, 16: 1291–1303
De P, Liu Y H, Das S K. An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks. IEEE Trans Mob Comput, 2009, 8: 413–425
Chen Z Q, Roussopoulos M, Liang Z Y, et al. Malware characteristics and threats on the Internet ecosystem. J Syst Softw, 2012, 85: 1650–1672
Karyotis V. Markov random fields for malware propagation: the case of chain networks. IEEE Commun Lett, 2010, 14: 875–877
Zanero S. Wireless malware propagation: a reality check. IEEE Secur Priv, 2009, 7: 70–74
Khouzani M H R, Sarkar S, Altman E. Saddle-point strategies in malware attack. IEEE J Sel Area Commun, 2012, 30: 31–43
Gu Q J, Ferguson C, Noorani R. A study of self-propagating mal-packets in sensor networks: attacks and defenses. Comput Secur, 2011, 30: 13–27
Ramachandran K K, Sikdar B. Dynamics of malware spread in decentralized peer-to-peer networks. IEEE Trans Dependable Secure Comput, 2011, 8: 617–623
Wang X M, Li Q L, Li Y S. EiSIRS: a formal model to analyze the dynamics of worm propagation in wireless sensor networks. J Comb Optim, 2010, 20: 47–62
Wang X M, Li Y S. An improved SIR model for analysing the dynamics of worm propagation in wireless sensor networks. Chin J Electron, 2009, 18: 8–12
Verbust F. Nonlinear Differential Equations and Dynamical Systems. Berlin/Heidelberg: Springer-Verlag, 2000
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, X., He, Z., Zhao, X. et al. Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks. Sci. China Inf. Sci. 56, 1–18 (2013). https://doi.org/10.1007/s11432-013-4977-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11432-013-4977-4