Energy-Efficient Patching Strategy for Wireless Sensor Networks

Wireless sensor networks (WSNs) are vulnerable to computer viruses. To protect WSNs from virus attack, the virus library associated with each sensor node must be updated in a timely way. This article is devoted to developing energy-efficient patching strategies for WSNs. First, we model the original problem as an optimal control problem in which (a) each control stands for a patching strategy, and (b) the objective functional to be optimized stands for the energy efficiency of a patching strategy. Second, we prove that the optimal control problem is solvable. Next, we derive the optimality system for solving the optimal control problem, accompanied with a few examples. Finally, we examine the effects of some factors on the optimal control. The obtained results help improve the security of WSNs.

[1]  Tansu Alpcan A Decision and Game Theoretic Approach to Networked System Security with Applications to Power Grid (Invited Lecture) , 2013, AISC.

[2]  Yuan Yan Tang,et al.  Defending against the Advanced Persistent Threat: An Optimal Control Approach , 2018, Secur. Commun. Networks.

[3]  Limin Wang,et al.  Energy-efficient multihop reprogramming for sensor networks , 2009, TOSN.

[4]  Yuan Yan Tang,et al.  Dynamic malware containment under an epidemic model with alert , 2017 .

[5]  Piet Van Mieghem,et al.  The N-intertwined SIS epidemic network model , 2011, Computing.

[6]  Jitender Grover,et al.  Probabilistic Density Based Adaptive Clustering scheme to improve network survivability in WSN , 2014, Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[7]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[8]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[9]  E. Stein,et al.  Real Analysis: Measure Theory, Integration, and Hilbert Spaces , 2005 .

[10]  Tansu Alpcan,et al.  Network Security , 2010 .

[11]  Shensheng Tang,et al.  An epidemic model with adaptive virus spread control for Wireless Sensor Networks , 2011, Int. J. Secur. Networks.

[12]  Shouhuai Xu,et al.  Push- and pull-based epidemic spreading in networks: Thresholds and deeper insights , 2012, TAAS.

[13]  R. Robinson,et al.  An Introduction to Dynamical Systems: Continuous and Discrete , 2004 .

[14]  Donald E. Kirk,et al.  Optimal control theory : an introduction , 1970 .

[15]  Wanlei Zhou,et al.  On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.

[16]  William J. Stewart,et al.  Probability, Markov Chains, Queues, and Simulation: The Mathematical Basis of Performance Modeling , 2009 .

[17]  Hiroshi Furukawa,et al.  Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey , 2016, Sensors.

[18]  Peter Szor,et al.  The Art of Computer Virus Research and Defense , 2005 .

[19]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[20]  Wanlei Zhou,et al.  A Differential Game Approach to Patch Injection , 2018, IEEE Access.

[21]  Brian L. Mark,et al.  Analysis of virus spread in wireless sensor networks: An epidemic model , 2009, 2009 7th International Workshop on Design of Reliable Communication Networks.

[22]  Wei Dong,et al.  Reprogramming over Low Power Link Layer in Wireless Sensor Networks , 2013, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems.

[23]  Yuan Yan Tang,et al.  A Bi-Virus Competing Spreading Model with Generic Infection Rates , 2018, IEEE Transactions on Network Science and Engineering.

[24]  Jitender Grover,et al.  Wireless Sensor Network in Railway Signalling System , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.

[25]  Yingshu Li,et al.  EiSIRS: a formal model to analyze the dynamics of worm propagation in wireless sensor networks , 2010, J. Comb. Optim..

[26]  Hossam Mahmoud Ahmad Fahmy Wireless Sensor Networks: Concepts, Applications, Experimentation and Analysis , 2016 .

[27]  Zhu Han,et al.  Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .

[28]  Shouhuai Xu,et al.  Adaptive Epidemic Dynamics in Networks , 2013, ACM Trans. Auton. Adapt. Syst..

[29]  Pengpeng Zhao,et al.  Discount pricing in word-of-mouth marketing: An optimal control approach , 2018, Physica A: Statistical Mechanics and its Applications.

[30]  Jan Willemson,et al.  Privacy Protection for Wireless Medical Sensor Data , 2016, IEEE Transactions on Dependable and Secure Computing.

[31]  Daniel Liberzon,et al.  Calculus of Variations and Optimal Control Theory: A Concise Introduction , 2012 .

[32]  Yonghong Chen,et al.  Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks , 2017, Sensors.

[33]  Li-Ping Feng,et al.  Modeling and Stability Analysis of Worm Propagation in Wireless Sensor Network , 2015 .

[34]  Shensheng Tang A Modified Epidemic Model for Virus Spread Control in Wireless Sensor Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[35]  P. Van Mieghem,et al.  Virus Spread in Networks , 2009, IEEE/ACM Transactions on Networking.

[36]  Shouhuai Xu,et al.  Preventive and Reactive Cyber Defense Dynamics Is Globally Stable , 2016, IEEE Transactions on Network Science and Engineering.

[37]  Amit K. Awasthi,et al.  Modeling and Analysis of Worm Propagation in Wireless Sensor Networks , 2017, Wireless Personal Communications.

[38]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[39]  Fei Yu,et al.  A Survey of Game Theory in Wireless Sensor Networks Security , 2011, J. Networks.

[40]  Yazeed Al-Sbou,et al.  Introduction to Mobile Ad-Hoc and Vehicular Networks , 2015 .

[41]  Yuan Yan Tang,et al.  Security Evaluation of the Cyber Networks Under Advanced Persistent Threats , 2017, IEEE Access.

[42]  Wanlei Zhou,et al.  Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach , 2019, IEEE Transactions on Information Forensics and Security.

[43]  Yuan Yan Tang,et al.  A Risk Management Approach to Defending Against the Advanced Persistent Threat , 2020, IEEE Transactions on Dependable and Secure Computing.

[44]  Yuan Yan Tang,et al.  On the competition of two conflicting messages , 2018 .

[45]  C. Scoglio,et al.  On the existence of a threshold for preventive behavioral responses to suppress epidemic spreading , 2012, Scientific Reports.

[46]  Saswati Sarkar,et al.  Maximum Damage Battery Depletion Attack in Mobile Sensor Networks , 2011, IEEE Transactions on Automatic Control.

[47]  Daniel Minoli,et al.  Wireless Sensor Networks: Technology, Protocols, and Applications , 2007 .

[48]  Lu-Xing Yang,et al.  Heterogeneous virus propagation in networks: a theoretical study , 2017 .

[49]  Ryan A. Rossi,et al.  The Network Data Repository with Interactive Graph Analytics and Visualization , 2015, AAAI.

[50]  Shouhuai Xu,et al.  A Stochastic Model of Active Cyber Defense Dynamics , 2015, Internet Math..

[51]  Ángel Martín del Rey,et al.  Malware propagation in Wireless Sensor Networks: global models vs Individual-based models , 2017, DCAI 2017.

[52]  Xiaofan Yang,et al.  The impact of patch forwarding on the prevalence of computer virus: A theoretical assessment approach , 2017 .

[53]  Lu-Xing Yang,et al.  The Impact of the Network Topology on the Viral Prevalence: A Node-Based Approach , 2015, PloS one.

[54]  Qiang Wang,et al.  Reprogramming wireless sensor networks: challenges and approaches , 2006, IEEE Network.

[55]  Yuan Yan Tang,et al.  Effectiveness analysis of a mixed rumor-quelling strategy , 2018, J. Frankl. Inst..

[56]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[57]  Hayder Radha,et al.  Using signal processing techniques to model worm propagation over wireless sensor networks , 2006 .