Skip to main content
Log in

Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

Mobile Wireless Sensor Networks (MWSNs) are employed in many fields, such as intelligent transportation, community health monitoring, and animal behavior monitoring. However, MWSNs may be vulnerable to malicious interference because of the large-scale characteristics. One of the threats is to inject malware into some nodes, especially mobile nodes. When a contaminated node communicates with its neighbors, multiple copies of the malware are transmitted to its neighbors, which may destroy nodes, block regular communications, or even damage the integrity of regular data packets. This work develops a modeling framework which mathematically characterizes the process of malware propagation in MWSNs based on the theory of reaction-diffusion equation. Our proposed model can efficiently predict the temporal dynamic behavior and spatial distribution of malware propagation over time, so that targeted immunization measures can be taken on infected nodes, whereas most of the existing models for malware propagation can only predict the temporal dynamic behavior rather than the spatial distribution of malware propagation over time. We conduct extensive simulations on large-scale MWSNs to evaluate the proposed model. The simulation results indicate that the proposed model and method are efficient, and that the mobile speed, communication range, and packet transmission rate of nodes are the main factors affecting malware propagation in MWSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Hu J W, Xie L H, Zhang C S. Energy-based multiple target localization and pursuit in mobile sensor networks. IEEE Trans Instrum Meas, 2012, 61: 212–220

    Article  Google Scholar 

  2. Ehsan S, Bradford K, Brugger M, et al. Design and analysis of delay-tolerant sensor networks for monitoring and tracking free-roaming animals. IEEE Trans Wirel Commun, 2012, 11: 1220–1227

    Article  Google Scholar 

  3. Boukerche A, Ren Y L. A secure mobile healthcare system using trust-based multicast scheme. IEEE J Sel Area Commun, 2009, 27: 387–399

    Article  Google Scholar 

  4. Rasheed A, Mahapatra R N. The three-tier security scheme in wireless sensor networks with mobile sinks. IEEE Trans Paral Distr, 2012, 23: 958–965

    Article  Google Scholar 

  5. Khouzani M H R, Sarkar S. Maximum damage battery deletion attack in mobile sensor networks. IEEE Trans Automat Contr, 2011, 56: 2358–2368

    Article  MathSciNet  Google Scholar 

  6. Peng S L, Li S S, Liao X K, et al. A scalable code dissemination protocol in heterogeneous wireless sensor networks. Sci China Inf Sci, 2012, 55: 1323–1336

    Article  MathSciNet  MATH  Google Scholar 

  7. Khouzani M, Sarkar S, Altman E. Optimal control of epidemic evolution. In: Proceedings of IEEE INFOCOM, Shanghai, 2011. 1683–1691

    Google Scholar 

  8. Zhang P T, Wang W, Tan Y. A malware detection model based on a negative selection algorithm with penalty factor. Sci China Inf Sci, 2010, 53: 2461–2471

    Article  Google Scholar 

  9. He Z B, Wang X M. A spatial-temporal model for the malware propagation in MWSNs based on the reaction-diffusion equations. In: Proceedings of WAIM 2012 Workshops, Harbin, 2012. 45–56

    Google Scholar 

  10. Hethcote H W. The mathematics of infectious diseases. SIAM Rev, 2000, 42: 599–653

    Article  MathSciNet  MATH  Google Scholar 

  11. Chen S Z, Ji C Y. Spatial-temporal modeling of malware propagation in networks. IEEE Trans Neural Netw, 2005, 16: 1291–1303

    Article  Google Scholar 

  12. De P, Liu Y H, Das S K. An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks. IEEE Trans Mob Comput, 2009, 8: 413–425

    Article  Google Scholar 

  13. Chen Z Q, Roussopoulos M, Liang Z Y, et al. Malware characteristics and threats on the Internet ecosystem. J Syst Softw, 2012, 85: 1650–1672

    Article  Google Scholar 

  14. Karyotis V. Markov random fields for malware propagation: the case of chain networks. IEEE Commun Lett, 2010, 14: 875–877

    Article  Google Scholar 

  15. Zanero S. Wireless malware propagation: a reality check. IEEE Secur Priv, 2009, 7: 70–74

    Article  Google Scholar 

  16. Khouzani M H R, Sarkar S, Altman E. Saddle-point strategies in malware attack. IEEE J Sel Area Commun, 2012, 30: 31–43

    Article  Google Scholar 

  17. Gu Q J, Ferguson C, Noorani R. A study of self-propagating mal-packets in sensor networks: attacks and defenses. Comput Secur, 2011, 30: 13–27

    Article  Google Scholar 

  18. Ramachandran K K, Sikdar B. Dynamics of malware spread in decentralized peer-to-peer networks. IEEE Trans Dependable Secure Comput, 2011, 8: 617–623

    Article  Google Scholar 

  19. Wang X M, Li Q L, Li Y S. EiSIRS: a formal model to analyze the dynamics of worm propagation in wireless sensor networks. J Comb Optim, 2010, 20: 47–62

    Article  MathSciNet  MATH  Google Scholar 

  20. Wang X M, Li Y S. An improved SIR model for analysing the dynamics of worm propagation in wireless sensor networks. Chin J Electron, 2009, 18: 8–12

    Google Scholar 

  21. Verbust F. Nonlinear Differential Equations and Dynamical Systems. Berlin/Heidelberg: Springer-Verlag, 2000

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to XiaoMing Wang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, X., He, Z., Zhao, X. et al. Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks. Sci. China Inf. Sci. 56, 1–18 (2013). https://doi.org/10.1007/s11432-013-4977-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-013-4977-4

Keywords

Navigation