Virus Propagation in Wireless Sensor Networks with Media Access Control Mechanism

In wireless sensor networks, network security against virus propagation is one of the challenges with the applications. In severe cases, the network system may become paralyzed. In order to study the process of virus propagation in wireless sensor networks with the media access control mechanism, this paper uses the susceptible-infectious-removed (SIR) model to analyze the spreading process. It provides a theoretical basis for the development of virus immune mechanisms to solve network virus attack hidden dangers. The research shows that the media access control (MAC) mechanism in the wireless sensor network can inhibit the process of virus propagation, reduce the network virus propagating speed, and decrease the scale of infected nodes. The listen/sleep duty cycle of this mechanism will affect the suppression effect of virus propagation. The smaller the listen/sleep duty cycle, the stronger the suppression effect. Energy consumption has a peak value under specific infection probability. Meanwhile, it is also found that the spreading scale of the virus in wireless sensor networks can be effectively inhibited by the MAC mechanism.

[1]  J. Kleinberg Computing: the wireless epidemic. , 2007, Nature.

[2]  Brian L. Mark,et al.  Analysis of virus spread in wireless sensor networks: An epidemic model , 2009, 2009 7th International Workshop on Design of Reliable Communication Networks.

[3]  S. C. Sharma,et al.  Energy optimization of energy aware routing protocol and bandwidth assessment for wireless sensor network , 2014, International Journal of System Assurance Engineering and Management.

[4]  George Ledin Not teaching viruses and worms is harmful , 2005, CACM.

[5]  Bo Jiang,et al.  Trust based energy efficient data collection with unmanned aerial vehicle in edge network , 2020, Trans. Emerg. Telecommun. Technol..

[6]  Barry Sandywell,et al.  Monsters in cyberspace cyberphobia and cultural panic in the information age , 2006 .

[7]  Imran Khan An introduction to computer viruses: problems and solutions , 2012 .

[8]  Rudra Pratap Ojha,et al.  Stability Analysis of SIDR Model for Worm Propagation in Wireless Sensor Network , 2016 .

[9]  Xiao-Yuan Yang,et al.  Virus spreading in wireless sensor networks with a medium access control mechanism , 2013 .

[10]  A. Nageswar Rao,et al.  Optimization of energy in wireless sensor networks using clustering techniques , 2016, 2016 International Conference on Communication and Electronics Systems (ICCES).

[11]  Peng Li,et al.  Influence of node mobility on virus spreading behaviors in multi-hop network , 2016, EURASIP J. Wirel. Commun. Netw..

[12]  S. S. Patil,et al.  Identification of Lung Cancer Related Genes Using Enhanced Floyd Warshall Algorithm in a Protein to Protein Interaction Network , 2018, International Journal of Intelligent Engineering and Systems.

[13]  Li-Ping Feng,et al.  Modeling and Stability Analysis of Worm Propagation in Wireless Sensor Network , 2015 .

[14]  Yurong Song,et al.  The Model of Malware Propagation in Wireless Sensor Networks with Regional Detection Mechanism , 2014, CWSN.

[15]  A. Rachadi,et al.  Modeling the spread of virus in packets on scale free network , 2016 .

[16]  Nirvana Meratnia,et al.  Potential of Wake-Up Radio-Based MAC Protocols for Implantable Body Sensor Networks (IBSN)—A Survey , 2016, Sensors.

[17]  Yuxia Li,et al.  Virus Propagation Model for Wireless Sensor Networks Based on IPv6 , 2018, Int. J. Online Eng..

[18]  Zhigeng Pan,et al.  Using SIR Model to Simulate Emotion Contagion in Dynamic Crowd Aggregation Process , 2018 .

[19]  Bimal Kumar Mishra,et al.  Mathematical model on the transmission of worms in wireless sensor network , 2013 .

[20]  Yonghong Chen,et al.  Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks , 2017, Sensors.

[21]  Amit K. Awasthi,et al.  Modeling and Analysis of Worm Propagation in Wireless Sensor Networks , 2017, Wireless Personal Communications.

[22]  Wei Liu,et al.  Trust data collections via vehicles joint with unmanned aerial vehicles in the smart Internet of Things , 2020, Trans. Emerg. Telecommun. Technol..

[23]  Paul D. Mitchell,et al.  Reservation Packet Medium Access Control for Wireless Sensor Networks , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.

[24]  Vasileios Vlachos,et al.  Epidemic model for malware targeting telephony networks , 2016, 2016 23rd International Conference on Telecommunications (ICT).

[25]  Quan-Hui Liu,et al.  Predicting the epidemic threshold of the susceptible-infected-recovered model , 2015, Scientific Reports.

[26]  Zhao Yang Dong,et al.  A Framework for Cyber-Topology Attacks: Line-Switching and New Attack Scenarios , 2019, IEEE Transactions on Smart Grid.

[27]  Yan Gao,et al.  Modeling of Node Energy Consumption for Wireless Sensor Networks , 2011, Wirel. Sens. Netw..

[28]  H. G. Miller,et al.  Waxman’s algorithm for non-Hermitian Hamiltonian operators , 2017, 1710.08411.

[29]  Zhiwen Zeng,et al.  A trust-based minimum cost and quality aware data collection scheme in P2P network , 2020, Peer-to-Peer Netw. Appl..

[30]  Maziar Nekovee,et al.  Worm epidemics in wireless ad hoc networks , 2007, ArXiv.

[31]  Ranjit Kumar Upadhyay,et al.  Bifurcation analysis of an e-epidemic model in wireless sensor network , 2018, Int. J. Comput. Math..

[32]  Jungmin So,et al.  Node Scheduling Control Inspired by Epidemic Theory for Data Dissemination in Wireless Sensor-Actuator Networks With Delay Constraints , 2016, IEEE Transactions on Wireless Communications.