Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks

The security threat posed by malware in mobile wireless networks can be countered through immunization using security patches. The distribution of patches however consumes bandwidth which is specially scarce in wireless networks, and must therefore be judiciously controlled in order to attain desired trade-offs between security risks and resource consumption. The desired tradeoffs can be attained by activating at any given time only fractions of dispatchers and selecting their packet transmission rates. We formulate the above tradeoffs as optimal control problems that seek to minimize the aggregate network costs that depend on security risks and resource consumed by the countermeasures. We prove that the optimal control strategies have simple structures. When the resource consumption cost rate is concave, the control strategies are bang-bang with at most one jump from the maximum to the minimum value. When the resource consumption cost rate is convex, the above transition is strict but continuous.

[1]  Sajal K. Das,et al.  An Epidemic Theoretic Framework for Evaluating Broadcast Protocols in Wireless Sensor Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[2]  J. Caulkins,et al.  Optimal Control of Nonlinear Processes: With Applications in Drugs, Corruption, and Terror , 2008 .

[3]  Ayalvadi J. Ganesh,et al.  On the effectiveness of automatic patching , 2005, WORM '05.

[4]  A. Helmy,et al.  VACCINE : War of the Worms in Wired and Wireless Networks , 2005 .

[5]  R. Srikant,et al.  Peer to Peer Networks for Defense Against Internet Worms , 2007, IEEE J. Sel. Areas Commun..

[6]  Donald E. Kirk,et al.  Optimal control theory : an introduction , 1970 .

[7]  Ger Koole,et al.  The message delay in mobile ad hoc networks , 2005, Perform. Evaluation.

[8]  T. Başar,et al.  Optimal and robust epidemic response for multiple networks , 2009 .

[9]  T. Kurtz Solutions of ordinary differential equations as limits of pure jump markov processes , 1970, Journal of Applied Probability.

[10]  Christian Bettstetter,et al.  Mobility modeling in wireless networks: categorization, smooth movement, and border effects , 2001, MOCO.

[11]  Eitan Altman,et al.  Optimal quarantining of wireless malware through power control , 2009, 2009 Information Theory and Applications Workshop.

[12]  Yun Zou,et al.  Optimal Internet Worm Treatment Strategy Based on the Two‐Factor Model , 2008 .

[13]  Ram Dantu,et al.  Dynamic control of worm propagation , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..