SNIRD: Disclosing Rules of Malware Spread in Heterogeneous Wireless Sensor Networks

Heterogeneous wireless sensor networks (WSNs) are widely deployed, owing to their good capabilities in terms of network stability, dependability, and survivability. However, they are prone to the spread of malware because of the limited computational capabilities of sensor nodes. To suppress the spread of malware, a malware spread model is urgently required to discover the rules of malware spread. In this paper, a heterogeneous susceptible-iNsidious-infectious-recovered-dysfunctional (SNIRD) model was proposed, which not only considers the communication connectivity of heterogeneous sensor nodes but also reflects the characteristics of malware hiding and dysfunctional sensor nodes. Then, the fraction evolution equations of heterogeneous sensor nodes in different states in discrete time were obtained. Furthermore, the existence of equilibria for the heterogeneous SNIRD model was proved, and the malware spread threshold was obtained, which indicates whether malware will spread or fade out. Finally, the heterogeneous SNIRD model was simulated and it was contrasted with the conventional SIS and SIR models to validate its effectiveness. The results construct a theoretical guideline for administrators to suppress the spread of malware in heterogeneous WSNs.

[1]  Michael Poss,et al.  MeDrone: On the use of a medical drone to heal a sensor network infected by a malicious epidemic , 2016, Ad Hoc Networks.

[2]  J. D. Hernández Guillén,et al.  Study of the stability of a SEIRS model for computer worm propagation , 2017 .

[3]  John S. Baras,et al.  Selfish Response to Epidemic Propagation , 2010, IEEE Transactions on Automatic Control.

[4]  Li-Ping Feng,et al.  Modeling and Stability Analysis of Worm Propagation in Wireless Sensor Network , 2015 .

[5]  Lin Wang,et al.  Global Stability of Virus Spreading in Complex Heterogeneous Networks , 2008, SIAM J. Appl. Math..

[6]  Saswati Sarkar,et al.  Optimal Patching in Clustered Malware Epidemics , 2014, IEEE/ACM Transactions on Networking.

[7]  Jianhua Liu,et al.  Reliability Evaluation for Clustered WSNs under Malware Propagation , 2016, Sensors.

[8]  Feng Xia,et al.  ROSE: Robustness Strategy for Scale-Free Wireless Sensor Networks , 2017, IEEE/ACM Transactions on Networking.

[9]  Shouhuai Xu,et al.  A Stochastic Model of Multivirus Dynamics , 2012, IEEE Transactions on Dependable and Secure Computing.

[10]  Wanlei Zhou,et al.  Modeling malicious activities in cyber space , 2015, IEEE Network.

[11]  Jemal H. Abawajy,et al.  Malware Threats and Detection for Industrial Mobile-IoT Networks , 2018, IEEE Access.

[12]  Yi Pan,et al.  Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks , 2013, Science China Information Sciences.

[13]  Keqiu Li,et al.  How Can Heterogeneous Internet of Things Build Our Future: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[14]  Jianhua Liu,et al.  A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion , 2017, J. Netw. Comput. Appl..

[15]  Huiyan Kang,et al.  Spreading Dynamics of an SEIR Model with Delay on Scale-Free Networks , 2020, IEEE Transactions on Network Science and Engineering.

[16]  Tailei Zhang,et al.  Epidemic spreading of an SEIRS model in scale-free networks , 2011 .

[17]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[18]  Chun-Ying Huang,et al.  Decapitation via digital epidemics: a bio-inspired transmissive attack , 2016, IEEE Communications Magazine.

[19]  Shui Yu,et al.  Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks , 2018, IEEE Internet of Things Journal.

[20]  Hongjie Li,et al.  A stochastic evolutionary coalition game model of secure and dependable virtual service in Sensor-Cloud , 2015, Appl. Soft Comput..

[21]  Ranjit Kumar Upadhyay,et al.  Bifurcation analysis of an e-epidemic model in wireless sensor network , 2018, Int. J. Comput. Math..

[22]  Min Chen,et al.  Analytical Model of Spread of Epidemics in Open Finite Regions , 2017, IEEE Access.

[23]  J. Watmough,et al.  Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission. , 2002, Mathematical biosciences.

[24]  Arun Kumar Sangaiah,et al.  An Improved Routing Schema with Special Clustering Using PSO Algorithm for Heterogeneous Wireless Sensor Network , 2019, Sensors.

[25]  Basel Alomair,et al.  Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach , 2016, IEEE Transactions on Control of Network Systems.

[26]  Hongjie Li,et al.  Optimal Report Strategies for WBANs Using a Cloud-Assisted IDS , 2015, Int. J. Distributed Sens. Networks.

[27]  Jianhua Liu,et al.  A Markov Detection Tree-Based Centralized Scheme to Automatically Identify Malicious Webpages on Cloud Platforms , 2018, IEEE Access.

[28]  Athanasios V. Vasilakos,et al.  Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks , 2014, IEEE Transactions on Information Forensics and Security.

[29]  Jianhua Liu,et al.  Energy-Efficient Two-Layer Cooperative Defense Scheme to Secure Sensor-Clouds , 2018, IEEE Transactions on Information Forensics and Security.

[30]  Hasmukh Morarji,et al.  A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts , 2017, IEEE Access.

[31]  Emil C. Lupu,et al.  Detecting Malicious Data Injections in Wireless Sensor Networks , 2015, ACM Comput. Surv..

[32]  Suh-Yuh Yang,et al.  Analysis of epidemic spreading of an SIRS model in complex heterogeneous networks , 2014, Commun. Nonlinear Sci. Numer. Simul..

[33]  Jin Wang,et al.  A PSO based Energy Efficient Coverage Control Algorithm for Wireless Sensor Networks , 2018 .

[34]  Guanrong Chen,et al.  Global attractivity of a network-based epidemic SIS model with nonlinear infectivity , 2012 .

[35]  Wanlei Zhou,et al.  On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.

[36]  Bimal Kumar Mishra,et al.  Mathematical model on the transmission of worms in wireless sensor network , 2013 .

[37]  Dafang Zhang,et al.  Energy-Aware Routing for SWIPT in Multi-Hop Energy-Constrained Wireless Network , 2018, IEEE Access.

[38]  Yonghong Chen,et al.  Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks , 2017, Sensors.

[39]  Amit K. Awasthi,et al.  Modeling and Analysis of Worm Propagation in Wireless Sensor Networks , 2017, Wireless Personal Communications.

[40]  Liang Xiao,et al.  Cloud-Based Malware Detection Game for Mobile Devices with Offloading , 2017, IEEE Transactions on Mobile Computing.

[41]  Lu-Xing Yang,et al.  Heterogeneous virus propagation in networks: a theoretical study , 2017 .

[42]  Wang,et al.  A Pulse Immunization Model for Inhibiting Malware Propagation in Mobile Wireless Sensor Networks , 2014 .

[43]  Bimal Kumar Mishra,et al.  Two time-delay dynamic model on the transmission of malicious signals in wireless sensor network , 2014 .

[44]  Qijun Gu,et al.  A study of self-propagating mal-packets in sensor networks: Attacks and defenses , 2011, Comput. Secur..

[45]  Bo Qu,et al.  SIS Epidemic Spreading with Heterogeneous Infection Rates , 2015, IEEE Transactions on Network Science and Engineering.

[46]  George J. Pappas,et al.  Optimal Resource Allocation for Control of Networked Epidemic Models , 2017, IEEE Transactions on Control of Network Systems.

[47]  Xiaoming Wang,et al.  Bifurcation analysis of a delay reaction-diffusion malware propagation model with feedback control , 2015, Commun. Nonlinear Sci. Numer. Simul..

[48]  Song Guo,et al.  Malware Propagation in Large-Scale Networks , 2015, IEEE Transactions on Knowledge and Data Engineering.